WorldWideScience

Sample records for network address lookup

  1. Integrated Optical Content Addressable Memories (CAM and Optical Random Access Memories (RAM for Ultra-Fast Address Look-Up Operations

    Directory of Open Access Journals (Sweden)

    Christos Vagionas

    2017-07-01

    Full Text Available Electronic Content Addressable Memories (CAM implement Address Look-Up (AL table functionalities of network routers; however, they typically operate in the MHz regime, turning AL into a critical network bottleneck. In this communication, we demonstrate the first steps towards developing optical CAM alternatives to enable a re-engineering of AL memories. Firstly, we report on the photonic integration of Semiconductor Optical Amplifier-Mach Zehnder Interferometer (SOA-MZI-based optical Flip-Flop and Random Access Memories on a monolithic InP platform, capable of storing the binary prefix-address data-bits and the outgoing port information for next hop routing, respectively. Subsequently the first optical Binary CAM cell (B-CAM is experimentally demonstrated, comprising an InP Flip-Flop and a SOA-MZI Exclusive OR (XOR gate for fast search operations through an XOR-based bit comparison, yielding an error-free 10 Gb/s operation. This is later extended via physical layer simulations in an optical Ternary-CAM (T-CAM cell and a 4-bit Matchline (ML configuration, supporting a third state of the “logical X” value towards wildcard bits of network subnet masks. The proposed functional CAM and Random Access Memories (RAM sub-circuits may facilitate light-based Address Look-Up tables supporting search operations at 10 Gb/s and beyond, paving the way towards minimizing the disparity with the frantic optical transmission linerates, and fast re-configurability through multiple simultaneous Wavelength Division Multiplexed (WDM memory access requests.

  2. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  3. A Pipelined IP Address Lookup Module for 100 Gbps Line Rates and beyond

    Science.gov (United States)

    Teuchert, Domenic; Hauger, Simon

    New Internet services and technologies call for higher packet switching capacities in the core network. Thus, a performance bottleneck arises at the backbone routers, as forwarding of Internet Protocol (IP) packets requires to search the most specific entry in a forwarding table that contains up to several hundred thousand address prefixes. The Tree Bitmap algorithm provides a well-balanced solution in respect of storage needs as well as of search and update complexity. In this paper, we present a pipelined lookup module based on this algorithm, which allows for an easy adaption to diverse protocol and hardware constraints. We determined the pipelining degree required to achieve the throughput for a 100 Gbps router line card by analyzing a representative sub-unit for various configured sizes. The module supports IPv4 and IPv6 configurations providing this throughput, as we determined the performance of our design to achieve a processing rate of 178 million packets per second.

  4. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  5. The 2005 CHF look-up table

    International Nuclear Information System (INIS)

    Groeneveld, D.C.; Vasic, A.Z.; Leung, L.K.H.; Durmayaz, A.; Shan, J.Q.; Yang, J.; Cheng, S.C.

    2005-01-01

    Full text of publication follows: CHF Look-up tables have been used widely for the prediction of the Critical Heat Flux (CHF) The CHF look-up table is basically a normalized data bank. The first CHF look-up table was constructed by Doroshchuk et al. (1975), using a limited database of 5 000 data points. This table, and all subsequent tables, contain normalized CHF values for a vertical 8 mm water-cooled tube for various pressures, mass fluxes and qualities. The CHF table development work has since been in progress at various institutions (e.g. CENG-Grenoble, University of Ottawa (UO), Ottawa, IPPE, Obninsk, and AECL, Chalk River) using an ever increasing data base. The 1995 CHF look-up table employs a data base containing about 30 000 CHF points and provides CHF values for an 8 mm ID, water-cooled tube, for 19 pressures, 20 mass fluxes, and 23 qualities. covering the full range of conditions of practical interest. The 2005 CHF LUT is an update to the 1995 LUT and addresses several concerns raised in the literature. The major improvements made are: - enhancement of the quality of the data base of the CHF look-up table (identify outliers, improve screening procedures); - increase in the data base by adding recently obtained data; - employment of greater subdivision of the look-up table by using smaller intervals in the independent parameters (pressure, mass flux and quality) at conditions where the variation in CHF is significant; - improvement of the smoothness of the CHF look-up table. This was done by the use of logarithmic functions for CHF, using optimum Spline functions etc. A discussion of the impact of these changes on the prediction accuracy and table smoothness is presented. It will be shown that the 2005 CHF look-up table is characterized by a significant improvement in accuracy and smoothness. [1] D. Groeneveld is the corresponding author. He is an Adjunct Professor at the University of Ottawa. (authors)

  6. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  7. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  8. An Ad Hoc Adaptive Hashing Technique forNon-Uniformly Distributed IP Address Lookup in Computer Networks

    Directory of Open Access Journals (Sweden)

    Christopher Martinez

    2007-02-01

    Full Text Available Hashing algorithms long have been widely adopted to design a fast address look-up process which involves a search through a large database to find a record associated with a given key. Hashing algorithms involve transforming a key inside each target data to a hash value hoping that the hashing would render the database a uniform distribution with respect to this new hash value. The close the final distribution is to uniform, the less search time would be required when a query is made. When the database is already key-wise uniformly distributed, any regular hashing algorithm, such as bit-extraction, bit-group XOR, etc., would easily lead to a statistically perfect uniform distribution after the hashing. On the other hand, if records in the database are instead not uniformly distributed as in almost all known practical applications, then even different regular hash functions would lead to very different performance. When the target database has a key with a highly skewed distributed value, performance delivered by regular hashing algorithms usually becomes far from desirable. This paper aims at designing a hashing algorithm to achieve the highest probability in leading to a uniformly distributed hash result from a non-uniformly distributed database. An analytical pre-process on the original database is first performed to extract critical information that would significantly benefit the design of a better hashing algorithm. This process includes sorting on the bits of the key to prioritize the use of them in the XOR hashing sequence, or in simple bit extraction, or even a combination of both. Such an ad hoc hash design is critical to adapting to all real-time situations when there exists a changing (and/or expanding database with an irregular non-uniform distribution. Significant improvement from simulation results is obtained in randomly generated data as well as real data.

  9. UnoHop: Efficient Distributed Hash Table with O(1 Lookup Performance

    Directory of Open Access Journals (Sweden)

    Herry Sitepu

    2008-05-01

    Full Text Available Distributed Hash Tables (DHTs with O(1 lookup performance strive to minimize the maintenance traffic which required for propagating membership changes information (events. These events distribution allows each node in the peer-to-peer network maintains accurate routing tables with complete membership information. We present UnoHop, a novel DHT protocol with O(1 lookup performance. The protocol uses an efficient mechanism to distribute events through a dissemination tree that constructed dynamically rooted at the node that detect the events. Our protocol produces symmetric bandwidth usage at all nodes while decreasing the events propagation delay.

  10. IP lookup with low memory requirement and fast update

    DEFF Research Database (Denmark)

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...

  11. Medicare Physician and Other Supplier Look-up Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This look-up tool is a searchable database that allows you to look up a provider by National Provider Identifier (NPI), or by name and location. The look-up tool...

  12. Towards Terabit Carrier Ethernet and Energy Efficient Optical Transport Networks

    DEFF Research Database (Denmark)

    Rasmussen, Anders

    This thesis focuses on the challenges of scaling current network node technology to support connection speeds of 100Gbps and beyond. Out of the many exiting aspects of reaching this goal, the main scope of this thesis is to investigate packet processing (address lookup and scheduling), forward....... The more advanced schemes also require more complex calculations to process each bit. This thesis will investigate how both the standard OTN FEC as well as more advanced FEC schemes can be implemented for 100G and above operation. As the networks are expanded to run at increasingly higher speeds...... error correction and energy efficiency. Scheduling and address lookup are key functions and potential bottle necks in high speed network nodes, as the minimum packet/frame sizes in both the popular Ethernet protocol, as well as the Internet Protocol (IP) still remains constant (84B and 40B, respectively...

  13. Parallel inverse halftoning by look-up table (LUT) partitioning

    International Nuclear Information System (INIS)

    Siddiqui, Umair F.; Sait, Sadiq M.

    2008-01-01

    The Look-Up Table (LUT) method for inverse halftoning is not only computation-less and fast but yields good results. The method employs a single LUT that is stored in a ROM and contains pre-computed contone (gray level) values for inverse halftone operation. This paper proposes an algorithm that can perform parallel inverse halftone operations by partitioning the single LUT into N smaller look-Up Tables (s- LUTs). Therefore, up to k (k<-N) pixels can be concurrently fetched from the halftone image and their contone values fetched concurrently from separate s- LUT. Obviously, this parallelization increases the speed of inverse halftoning by upto k times. In this proposed method, the total entries in all s- LUTs remain equal to the entries in the single LUT of the serial LUT method. Some degradation in image quality is also possible due to pixel loss during fetching. This is because some other contone value is being fetched from that s-LUT. The complete implementation of the algorithm requires two CPLDs (Complex Programmable Logic Devices) for the computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs. (author)

  14. A Cheap Linear Attention Mechanism with Fast Lookups and Fixed-Size Representations

    OpenAIRE

    de Brébisson, Alexandre; Vincent, Pascal

    2016-01-01

    The softmax content-based attention mechanism has proven to be very beneficial in many applications of recurrent neural networks. Nevertheless it suffers from two major computational limitations. First, its computations for an attention lookup scale linearly in the size of the attended sequence. Second, it does not encode the sequence into a fixed-size representation but instead requires to memorize all the hidden states. These two limitations restrict the use of the softmax attention mechani...

  15. A look-up table for fully developed film-boiling heat transfer

    International Nuclear Information System (INIS)

    Groeneveld, D.C.; Leung, L.K.H.; Vasic, A.Z.; Guo, Y.J.; Cheng, S.C.

    2003-01-01

    An improved look-up table for film-boiling heat-transfer coefficients has been derived for steam-water flow inside vertical tubes. Compared to earlier versions of the look-up table, the following improvements were made: - The database has been expanded significantly. The present database contains 77,234 film-boiling data points obtained from 36 sources. - The upper limit of the thermodynamic quality range was increased from 1.2 to 2.0. The wider range was needed as non-equilibrium effects at low flows can extend well beyond the point where the thermodynamic quality equals unity. - The surface heat flux has been replaced by the surface temperature as an independent parameter. - The new look-up table is based only on fully developed film-boiling data. - The table entries at flow conditions for which no data are available is based on the best of five different film-boiling prediction methods. The new film-boiling look-up table predicts the database for fully developed film-boiling data with an overall rms error in heat-transfer coefficient of 10.56% and an average error of 1.71%. A comparison of the prediction accuracy of the look-up table with other leading film-boiling prediction methods shows that the look-up table results in a significant improvement in prediction accuracy

  16. The film boiling look-up table: an improvement in predicting post-chf temperatures

    International Nuclear Information System (INIS)

    Groeneveld, D.C.; Leung, L.K.H.; Vasic, A.Z.; Guo, Y.J.; El Nakla, M.; Cheng, S.C.

    2002-01-01

    During the past 50 years more than 60 film boiling prediction methods have been proposed (Groeneveld and Leung, 2000). These prediction methods generally are applicable over limited ranges of flow conditions and do not provide reasonable predictions when extrapolated well outside the range of their respective database. Leung et al. (1996, 1997) and Kirillov et al. (1996) have proposed the use of a film-boiling look-up table as an alternative to the many models, equations and correlations for the inverted annular film boiling (IAFB) and the dispersed flow film-boiling (DFFB) regime. The film-boiling look-up table is a logical follow-up to the development of the successful CHF look-up table (Groeneveld et al., 1996). It is basically a normalized data bank of heat-transfer coefficients for discrete values of pressure, mass flux, quality and heat flux or surface-temperature. The look-up table proposed by Leung et al. (1996, 1997), and referred to as PDO-LW-96, was based on 14,687 data and predicted the surface temperature with an average error of 1.2% and an rms error of 6.73%. The heat-transfer coefficient was predicted with an average error of -4.93% and an rms error of 16.87%. Leung et al. clearly showed that the look-up table approach, as a general predictive tool for film-boiling heat transfer, was superior to the correlation or model approach. Error statistics were not provided for the look-up table proposed by Kirillov et al. (1996). This paper reviews the look-up table approach and describes improvements to the derivation of the film-boiling look-up table. These improvements include: (i) a larger data base, (ii) a wider range of thermodynamic qualities, (iii) use of the wall temperature instead of the heat flux as an independent parameter, (iv) employment of fully-developed film-boiling data only for the derivation of the look-up table, (v) a finer subdivision and thus more table entries, (vi) smoother table, and (vii) use of the best of five prediction methods

  17. Generic and updatable XML value indices covering equality and range lookups

    NARCIS (Netherlands)

    E. Sidirourgos (Eleftherios); P.A. Boncz (Peter)

    2008-01-01

    htmlabstractWe describe a collection of indices for XML text, element, and attribute node values that (i) consume little storage, (ii) have low maintenance overhead, (iii) permit fast equi-lookup on string values, and (iv) support range-lookup on any XML typed value (e.g., double, dateTime). The

  18. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  19. Medicare Part D Prescriber Look-up Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This look-up tool is a searchable database that allows you to look up a Medicare Part D prescriber by National Provider Identifier (NPI), or by name and location....

  20. An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n. This paper presents a concept to extend existing approximate matching algorithms, which reduces the lookup complexity from O(n to O(log(n. Our proposed approach is based on the well-known divide and conquer paradigm and builds a Bloom filter-based tree data structure in order to enable an efficient lookup of similarity digests. Further, it is demonstrated that the presented technique is highly scalable operating a trade-off between storage requirements and computational efficiency. We perform a theoretical assessment based on recently published results and reasonable magnitudes of input data, and show that the complexity reduction achieved by the proposed technique yields a 220-fold acceleration of look-up costs.

  1. A source-controlled data center network model.

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  2. A source-controlled data center network model

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS. PMID:28328925

  3. OLS Dialog: An open-source front end to the Ontology Lookup Service

    Directory of Open Access Journals (Sweden)

    Eidhammer Ingvar

    2010-01-01

    Full Text Available Abstract Background With the growing amount of biomedical data available in public databases it has become increasingly important to annotate data in a consistent way in order to allow easy access to this rich source of information. Annotating the data using controlled vocabulary terms and ontologies makes it much easier to compare and analyze data from different sources. However, finding the correct controlled vocabulary terms can sometimes be a difficult task for the end user annotating these data. Results In order to facilitate the location of the correct term in the correct controlled vocabulary or ontology, the Ontology Lookup Service was created. However, using the Ontology Lookup Service as a web service is not always feasible, especially for researchers without bioinformatics support. We have therefore created a Java front end to the Ontology Lookup Service, called the OLS Dialog, which can be plugged into any application requiring the annotation of data using controlled vocabulary terms, making it possible to find and use controlled vocabulary terms without requiring any additional knowledge about web services or ontology formats. Conclusions As a user-friendly open source front end to the Ontology Lookup Service, the OLS Dialog makes it straightforward to include controlled vocabulary support in third-party tools, which ultimately makes the data even more valuable to the biomedical community.

  4. Application of the Critical Heat Flux Look-Up Table to Large Diameter Tubes

    Directory of Open Access Journals (Sweden)

    M. El Nakla

    2013-01-01

    Full Text Available The critical heat flux look-up table was applied to a large diameter tube, namely 67 mm inside diameter tube, to predict the occurrence of the phenomenon for both vertical and horizontal uniformly heated tubes. Water was considered as coolant. For the vertical tube, a diameter correction factor was directly applied to the 1995 critical heat flux look-up table. To predict the occurrence of critical heat flux in horizontal tube, an extra correction factor to account for flow stratification was applied. Both derived tables were used to predict the effect of high heat flux and tube blockage on critical heat flux occurrence in boiler tubes. Moreover, the horizontal tube look-up table was used to predict the safety limits of the operation of boiler for 50% allowable heat flux.

  5. Improving the dictionary lookup approach for disease normalization using enhanced dictionary and query expansion

    Science.gov (United States)

    Jonnagaddala, Jitendra; Jue, Toni Rose; Chang, Nai-Wen; Dai, Hong-Jie

    2016-01-01

    The rapidly increasing biomedical literature calls for the need of an automatic approach in the recognition and normalization of disease mentions in order to increase the precision and effectivity of disease based information retrieval. A variety of methods have been proposed to deal with the problem of disease named entity recognition and normalization. Among all the proposed methods, conditional random fields (CRFs) and dictionary lookup method are widely used for named entity recognition and normalization respectively. We herein developed a CRF-based model to allow automated recognition of disease mentions, and studied the effect of various techniques in improving the normalization results based on the dictionary lookup approach. The dataset from the BioCreative V CDR track was used to report the performance of the developed normalization methods and compare with other existing dictionary lookup based normalization methods. The best configuration achieved an F-measure of 0.77 for the disease normalization, which outperformed the best dictionary lookup based baseline method studied in this work by an F-measure of 0.13. Database URL: https://github.com/TCRNBioinformatics/DiseaseExtract PMID:27504009

  6. Improving the dictionary lookup approach for disease normalization using enhanced dictionary and query expansion.

    Science.gov (United States)

    Jonnagaddala, Jitendra; Jue, Toni Rose; Chang, Nai-Wen; Dai, Hong-Jie

    2016-01-01

    The rapidly increasing biomedical literature calls for the need of an automatic approach in the recognition and normalization of disease mentions in order to increase the precision and effectivity of disease based information retrieval. A variety of methods have been proposed to deal with the problem of disease named entity recognition and normalization. Among all the proposed methods, conditional random fields (CRFs) and dictionary lookup method are widely used for named entity recognition and normalization respectively. We herein developed a CRF-based model to allow automated recognition of disease mentions, and studied the effect of various techniques in improving the normalization results based on the dictionary lookup approach. The dataset from the BioCreative V CDR track was used to report the performance of the developed normalization methods and compare with other existing dictionary lookup based normalization methods. The best configuration achieved an F-measure of 0.77 for the disease normalization, which outperformed the best dictionary lookup based baseline method studied in this work by an F-measure of 0.13.Database URL: https://github.com/TCRNBioinformatics/DiseaseExtract. © The Author(s) 2016. Published by Oxford University Press.

  7. Improved look-up table method of computer-generated holograms.

    Science.gov (United States)

    Wei, Hui; Gong, Guanghong; Li, Ni

    2016-11-10

    Heavy computation load and vast memory requirements are major bottlenecks of computer-generated holograms (CGHs), which are promising and challenging in three-dimensional displays. To solve these problems, an improved look-up table (LUT) method suitable for arbitrarily sampled object points is proposed and implemented on a graphics processing unit (GPU) whose reconstructed object quality is consistent with that of the coherent ray-trace (CRT) method. The concept of distance factor is defined, and the distance factors are pre-computed off-line and stored in a look-up table. The results show that while reconstruction quality close to that of the CRT method is obtained, the on-line computation time is dramatically reduced compared with the LUT method on the GPU and the memory usage is lower than that of the novel-LUT considerably. Optical experiments are carried out to validate the effectiveness of the proposed method.

  8. Technical note: New table look-up lossless compression method ...

    African Journals Online (AJOL)

    Technical note: New table look-up lossless compression method based on binary index archiving. ... International Journal of Engineering, Science and Technology ... This paper intends to present a common use archiver, made up following the dictionary technique and using the index archiving method as a simple and ...

  9. Name-Based Address Mapping for Virtual Private Networks

    Science.gov (United States)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  10. Tool Support for Software Lookup Table Optimization

    Directory of Open Access Journals (Sweden)

    Chris Wilcox

    2011-01-01

    Full Text Available A number of scientific applications are performance-limited by expressions that repeatedly call costly elementary functions. Lookup table (LUT optimization accelerates the evaluation of such functions by reusing previously computed results. LUT methods can speed up applications that tolerate an approximation of function results, thereby achieving a high level of fuzzy reuse. One problem with LUT optimization is the difficulty of controlling the tradeoff between performance and accuracy. The current practice of manual LUT optimization adds programming effort by requiring extensive experimentation to make this tradeoff, and such hand tuning can obfuscate algorithms. In this paper we describe a methodology and tool implementation to improve the application of software LUT optimization. Our Mesa tool implements source-to-source transformations for C or C++ code to automate the tedious and error-prone aspects of LUT generation such as domain profiling, error analysis, and code generation. We evaluate Mesa with five scientific applications. Our results show a performance improvement of 3.0× and 6.9× for two molecular biology algorithms, 1.4× for a molecular dynamics program, 2.1× to 2.8× for a neural network application, and 4.6× for a hydrology calculation. We find that Mesa enables LUT optimization with more control over accuracy and less effort than manual approaches.

  11. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  12. Learning Receptive Fields and Quality Lookups for Blind Quality Assessment of Stereoscopic Images.

    Science.gov (United States)

    Shao, Feng; Lin, Weisi; Wang, Shanshan; Jiang, Gangyi; Yu, Mei; Dai, Qionghai

    2016-03-01

    Blind quality assessment of 3D images encounters more new challenges than its 2D counterparts. In this paper, we propose a blind quality assessment for stereoscopic images by learning the characteristics of receptive fields (RFs) from perspective of dictionary learning, and constructing quality lookups to replace human opinion scores without performance loss. The important feature of the proposed method is that we do not need a large set of samples of distorted stereoscopic images and the corresponding human opinion scores to learn a regression model. To be more specific, in the training phase, we learn local RFs (LRFs) and global RFs (GRFs) from the reference and distorted stereoscopic images, respectively, and construct their corresponding local quality lookups (LQLs) and global quality lookups (GQLs). In the testing phase, blind quality pooling can be easily achieved by searching optimal GRF and LRF indexes from the learnt LQLs and GQLs, and the quality score is obtained by combining the LRF and GRF indexes together. Experimental results on three publicly 3D image quality assessment databases demonstrate that in comparison with the existing methods, the devised algorithm achieves high consistent alignment with subjective assessment.

  13. Optoelectronic switch matrix as a look-up table for residue arithmetic.

    Science.gov (United States)

    Macdonald, R I

    1987-10-01

    The use of optoelectronic matrix switches to perform look-up table functions in residue arithmetic processors is proposed. In this application, switchable detector arrays give the advantage of a greatly reduced requirement for optical sources by comparison with previous optoelectronic residue processors.

  14. Generic and Updatable XML Value Indices Covering Equality and Range Lookups

    NARCIS (Netherlands)

    E. Sidirourgos (Eleftherios); P.A. Boncz (Peter)

    2009-01-01

    textabstractWe describe a collection of indices for XML text, element, and attribute node values that (i) consume little storage, (ii) have low maintenance overhead, (iii) permit fast equilookup on string values, and (iv) support range-lookup on any XML typed value (e.g., double, dateTime). The

  15. Generation of Look-Up Tables for Dynamic Job Shop Scheduling Decision Support Tool

    Science.gov (United States)

    Oktaviandri, Muchamad; Hassan, Adnan; Mohd Shaharoun, Awaluddin

    2016-02-01

    Majority of existing scheduling techniques are based on static demand and deterministic processing time, while most job shop scheduling problem are concerned with dynamic demand and stochastic processing time. As a consequence, the solutions obtained from the traditional scheduling technique are ineffective wherever changes occur to the system. Therefore, this research intends to develop a decision support tool (DST) based on promising artificial intelligent that is able to accommodate the dynamics that regularly occur in job shop scheduling problem. The DST was designed through three phases, i.e. (i) the look-up table generation, (ii) inverse model development and (iii) integration of DST components. This paper reports the generation of look-up tables for various scenarios as a part in development of the DST. A discrete event simulation model was used to compare the performance among SPT, EDD, FCFS, S/OPN and Slack rules; the best performances measures (mean flow time, mean tardiness and mean lateness) and the job order requirement (inter-arrival time, due dates tightness and setup time ratio) which were compiled into look-up tables. The well-known 6/6/J/Cmax Problem from Muth and Thompson (1963) was used as a case study. In the future, the performance measure of various scheduling scenarios and the job order requirement will be mapped using ANN inverse model.

  16. Multiple Lookup Table-Based AES Encryption Algorithm Implementation

    Science.gov (United States)

    Gong, Jin; Liu, Wenyi; Zhang, Huixin

    Anew AES (Advanced Encryption Standard) encryption algorithm implementation was proposed in this paper. It is based on five lookup tables, which are generated from S-box(the substitution table in AES). The obvious advantages are reducing the code-size, improving the implementation efficiency, and helping new learners to understand the AES encryption algorithm and GF(28) multiplication which are necessary to correctly implement AES[1]. This method can be applied on processors with word length 32 or above, FPGA and others. And correspondingly we can implement it by VHDL, Verilog, VB and other languages.

  17. Addressing congestion on single allocation hub-and-spoke networks

    Directory of Open Access Journals (Sweden)

    Ricardo Saraiva de Camargo

    2012-12-01

    Full Text Available When considering hub-and-spoke networks with single allocation, the absence of alternative routes makes this kind of systems specially vulnerable to congestion effects. In order to improve the design of such networks, congestion costs must be addressed. This article deploys two different techniques for addressing congestion on single allocation hub-and-spoke networks: the Generalized Benders Decomposition and the Outer Approximation method. Both methods are able to solve large scale instances. Computational experiments show how the adoption of advanced solution strategies, such as Pareto-optimal cut generation on the Master Problem branch-and-bound tree, may be decisive. They also demonstrate that the solution effort is not only associated with the size of the instances, but also with their combination of the installation and congestion costs.

  18. Effect of menus on EFL learners' look-up processes | Tono | Lexikos

    African Journals Online (AJOL)

    This paper emphasizes the importance of empirical research on dictionary users and, in particular, investigates the effect of the so-called "menu" (a list of definitions at the beginning of a polysemous article) on the EFL (English as a Foreign Language) learners' dictionary look-up processes. The menu has been increasingly ...

  19. Searching in small-world networks

    International Nuclear Information System (INIS)

    Moura, Alessandro P.S. de; Motter, Adilson E.; Grebogi, Celso

    2003-01-01

    We study the average time it takes to find a desired node in the Watts-Strogatz family of networks. We consider the case when the look-up time can be neglected and when it is important, where the look-up time is the time needed to choose one among all the neighboring nodes of a node at each step in the search. We show that in both cases, the search time is minimum in the small-world regime, when an appropriate distance between the nodes is defined. Through an analytical model, we show that the search time scales as N 1/D(D+1) for small-world networks, where N is the number of nodes and D is the dimension of the underlying lattice. This model is shown to be in agreement with numerical simulations

  20. Non-tables look-up search algorithm for efficient H.264/AVC context-based adaptive variable length coding decoding

    Science.gov (United States)

    Han, Yishi; Luo, Zhixiao; Wang, Jianhua; Min, Zhixuan; Qin, Xinyu; Sun, Yunlong

    2014-09-01

    In general, context-based adaptive variable length coding (CAVLC) decoding in H.264/AVC standard requires frequent access to the unstructured variable length coding tables (VLCTs) and significant memory accesses are consumed. Heavy memory accesses will cause high power consumption and time delays, which are serious problems for applications in portable multimedia devices. We propose a method for high-efficiency CAVLC decoding by using a program instead of all the VLCTs. The decoded codeword from VLCTs can be obtained without any table look-up and memory access. The experimental results show that the proposed algorithm achieves 100% memory access saving and 40% decoding time saving without degrading video quality. Additionally, the proposed algorithm shows a better performance compared with conventional CAVLC decoding, such as table look-up by sequential search, table look-up by binary search, Moon's method, and Kim's method.

  1. An On-Chip Learning Neuromorphic Autoencoder With Current-Mode Transposable Memory Read and Virtual Lookup Table.

    Science.gov (United States)

    Cho, Hwasuk; Son, Hyunwoo; Seong, Kihwan; Kim, Byungsub; Park, Hong-June; Sim, Jae-Yoon

    2018-02-01

    This paper presents an IC implementation of on-chip learning neuromorphic autoencoder unit in a form of rate-based spiking neural network. With a current-mode signaling scheme embedded in a 500 × 500 6b SRAM-based memory, the proposed architecture achieves simultaneous processing of multiplications and accumulations. In addition, a transposable memory read for both forward and backward propagations and a virtual lookup table are also proposed to perform an unsupervised learning of restricted Boltzmann machine. The IC is fabricated using 28-nm CMOS process and is verified in a three-layer network of encoder-decoder pair for training and recovery of images with two-dimensional pixels. With a dataset of 50 digits, the IC shows a normalized root mean square error of 0.078. Measured energy efficiencies are 4.46 pJ per synaptic operation for inference and 19.26 pJ per synaptic weight update for learning, respectively. The learning performance is also estimated by simulations if the proposed hardware architecture is extended to apply to a batch training of 60 000 MNIST datasets.

  2. CAN Tree Routing for Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao LI

    2014-01-01

    Full Text Available We propose a novel topology to improve the routing performance of Content- Addressable Network overlays while minimizing the maintenance overhead during nodes churn. The key idea of our approach is to establish a P2P tree structure (CAN tree by means of equipping each node with a few long links towards some distant nodes. The long links enhance routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is O(log n, which is much better than a uniform greedy routing, while each node maintains two long links in average.

  3. The effect of DAD timeout period on address autoconfiguration in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2011-09-01

    Full Text Available Lack of manual management mechanisms in wireless ad-hoc networks means that automatic configuration of IP addresses and other related network parameters are very crucial. Many IP address autoconfiguration mechanisms have been proposed in literature...

  4. An empirical correlation for the entrainment fraction at the onset of annular flow based on 2006 CHF look-up table

    Energy Technology Data Exchange (ETDEWEB)

    Jiao, Bo; Yang, Dongyu [Department of Mechanical Engineering, Rongcheng Campus, Harbin University of Science and Technology, Rongcheng 264300, Shandong (China); Gan, Zhihua, E-mail: gan_zhihua@zju.edu.cn [Institute of Refrigeration and Cryogenics, Zhejiang University, Hangzhou (China); Key Laboratory of Refrigeration and Cryogenic Technology of Zhejiang Province, Hangzhou (China); National Quality Inspection Center of Refrigeration Equipment (Henan), Minquan (China)

    2017-06-15

    Highlights: • A parallel look-up table for the entrainment fraction at annular point was developed. • A correlation was given based on the selected database from 2006 CHF look-up table. • Its reliability on the other conditions in the look-up table was discussed. - Abstract: The critical heat flux (CHF) of gas-liquid flow plays an important role in the safety of industrial equipment. At present, the liquid film dryout model is widely used for predicting CHF in gas-liquid annular flow. Most parameters in this model can be determined by some empirical correlations which are valid under different conditions. However, up to now, the entrainment fraction at the onset of annular flow is always assumed due to the lack of relevant experimental data. In this paper, the normalized data of the 2006 CHF look-up table (LUT) which has been adopted widely, especially in the nuclear industry, were used. Firstly, the empirical correlations, provided for the onset of annular flow and the limiting quality, were employed. In the valid pressure and mass flux range of these correlations, the selected database from LUT was confirmed. Secondly, the liquid film model was built. The entrainment fraction at the onset of annular flow was obtained when the calculated CHF by the model agreed with the corresponding value in LUT. A parallel look-up table for it was developed. Its correlation including the Weber and the liquid Reynolds number at outlet was proposed. The errors are mostly within ±30%. Finally, its reliability on the other conditions in LUT, which are beyond the valid range of the empirical correlations used for determining the database, was discussed. All the conditions whose errors are outside ±30% of the predictions by the provided correlation were marked in the tables.

  5. Exploring social recommenders for teacher networks to address challenges of starting teachers

    NARCIS (Netherlands)

    Fazeli, Soude; Drachsler, Hendrik; Brouns, Francis; Sloep, Peter

    2012-01-01

    Fazeli, S., Drachsler, H., Brouns, F., & Sloep, P. B. (2012, 4 April). Exploring social recommenders for teacher networks to address challenges of starting teachers. Presentation at the Eighth International Conference on Networked Learning 2012, Maastricht, The Netherlands.

  6. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks: A fuzzy set Qualitative Comparative Analysis.

    Science.gov (United States)

    Peters, D T J M; Verweij, S; Grêaux, K; Stronks, K; Harting, J

    2017-12-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different policy instruments. However, such network diversity may increase network complexity and therefore hamper network performance. Network complexity may be reduced by network management and the provision of financial resources. This study examined whether network diversity - amidst the other conditions - is indeed needed to address environmental determinants of health behavior. We included 25 intersectoral policy networks in Dutch municipalities aimed at reducing overweight, smoking, and alcohol/drugs abuse. For our fuzzy set Qualitative Comparative Analysis we used data from three web-based surveys among (a) project leaders regarding network diversity and size (n = 38); (b) project leaders and project partners regarding management (n = 278); and (c) implementation professionals regarding types of environmental determinants addressed (n = 137). Data on budgets were retrieved from project application forms. Contrary to their intentions, most policy networks typically addressed personal determinants. If the environment was addressed too, it was mostly the social environment. To address environmental determinants of health behavior, network diversity (>50% of the actors are non-public health) was necessary in networks that were either small (policy networks in improving health behaviors by addressing a variety of environmental determinants. Copyright © 2017. Published by Elsevier Ltd.

  7. Intrinsic fluorescence of protein in turbid media using empirical relation based on Monte Carlo lookup table

    Science.gov (United States)

    Einstein, Gnanatheepam; Udayakumar, Kanniyappan; Aruna, Prakasarao; Ganesan, Singaravelu

    2017-03-01

    Fluorescence of Protein has been widely used in diagnostic oncology for characterizing cellular metabolism. However, the intensity of fluorescence emission is affected due to the absorbers and scatterers in tissue, which may lead to error in estimating exact protein content in tissue. Extraction of intrinsic fluorescence from measured fluorescence has been achieved by different methods. Among them, Monte Carlo based method yields the highest accuracy for extracting intrinsic fluorescence. In this work, we have attempted to generate a lookup table for Monte Carlo simulation of fluorescence emission by protein. Furthermore, we fitted the generated lookup table using an empirical relation. The empirical relation between measured and intrinsic fluorescence is validated using tissue phantom experiments. The proposed relation can be used for estimating intrinsic fluorescence of protein for real-time diagnostic applications and thereby improving the clinical interpretation of fluorescence spectroscopic data.

  8. A shower look-up table to trace the dynamics of meteoroid streams and their sources

    Science.gov (United States)

    Jenniskens, Petrus

    2018-04-01

    Meteor showers are caused by meteoroid streams from comets (and some primitive asteroids). They trace the comet population and its dynamical evolution, warn of dangerous long-period comets that can pass close to Earth's orbit, outline volumes of space with a higher satellite impact probability, and define how meteoroids evolve in the interplanetary medium. Ongoing meteoroid orbit surveys have mapped these showers in recent years, but the surveys are now running up against a more and more complicated scene. The IAU Working List of Meteor Showers has reached 956 entries to be investigated (per March 1, 2018). The picture is even more complicated with the discovery that radar-detected streams are often different, or differently distributed, than video-detected streams. Complicating matters even more, some meteor showers are active over many months, during which their radiant position gradually changes, which makes the use of mean orbits as a proxy for a meteoroid stream's identity meaningless. The dispersion of the stream in space and time is important to that identity and contains much information about its origin and dynamical evolution. To make sense of the meteor shower zoo, a Shower Look-Up Table was created that captures this dispersion. The Shower Look-Up Table has enabled the automated identification of showers in the ongoing CAMS video-based meteoroid orbit survey, results of which are presented now online in near-real time at http://cams.seti.org/FDL/. Visualization tools have been built that depict the streams in a planetarium setting. Examples will be presented that sample the range of meteoroid streams that this look-up table describes. Possibilities for further dynamical studies will be discussed.

  9. Experimental demonstrations of all-optical networking functions for WDM optical networks

    Science.gov (United States)

    Gurkan, Deniz

    The deployment of optical networks will enable high capacity links between users but will introduce the problems associated with transporting and managing more channels. Many network functions should be implemented in optical domain; main reasons are: to avoid electronic processing bottlenecks, to achieve data-format and data-rate independence, to provide reliable and cost efficient control and management information, to simultaneously process multiple wavelength channel operation for wavelength division multiplexed (WDM) optical networks. The following novel experimental demonstrations of network functions in the optical domain are presented: Variable-bit-rate recognition of the header information in a data packet. The technique is reconfigurable for different header sequences and uses optical correlators as look-up tables. The header is processed and a signal is sent to the switch for a series of incoming data packets at 155 Mb/s, 622 Mb/s, and 2.5 Gb/s in a reconfigurable network. Simultaneous optical time-slot-interchange and wavelength conversion of the bits in a 2.5-Gb/s data stream to achieve a reconfigurable time/wavelength switch. The technique uses difference-frequency-generation (DFG) for wavelength conversion and fiber Bragg gratings (FBG) as wavelength-dependent optical time buffers. The WDM header recognition module simultaneously recognizing two header bits on each of two 2.5-Gbit/s WDM packet streams. The module is tunable to enable reconfigurable look-up tables. Simultaneous and independent label swapping and wavelength conversion of two WDM channels for a multi-protocol label switching (MPLS) network. Demonstration of label swapping of distinct 8-bit-long labels for two WDM data channels is presented. Two-dimensional code conversion module for an optical code-division multiple-access (O-CDMA) local area network (LAN) system. Simultaneous wavelength conversion and time shifting is achieved to enable flexible code conversion and increase code re

  10. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2007-01-01

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the

  11. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge Bow-Nan Cheng, Greg Kuperman, Patricia Deutsch, Logan...been a large push in the U.S. Department of Defense to move to an all Internet Protocol (IP) infrastructure, particularly on the tactical edge . IP and...lossy links, and scaling to large numbers of users. Unfortunately, these are the exact conditions military tactical edge networks must operate within

  12. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  13. Image Coding Based on Address Vector Quantization.

    Science.gov (United States)

    Feng, Yushu

    Image coding is finding increased application in teleconferencing, archiving, and remote sensing. This thesis investigates the potential of Vector Quantization (VQ), a relatively new source coding technique, for compression of monochromatic and color images. Extensions of the Vector Quantization technique to the Address Vector Quantization method have been investigated. In Vector Quantization, the image data to be encoded are first processed to yield a set of vectors. A codeword from the codebook which best matches the input image vector is then selected. Compression is achieved by replacing the image vector with the index of the code-word which produced the best match, the index is sent to the channel. Reconstruction of the image is done by using a table lookup technique, where the label is simply used as an address for a table containing the representative vectors. A code-book of representative vectors (codewords) is generated using an iterative clustering algorithm such as K-means, or the generalized Lloyd algorithm. A review of different Vector Quantization techniques are given in chapter 1. Chapter 2 gives an overview of codebook design methods including the Kohonen neural network to design codebook. During the encoding process, the correlation of the address is considered and Address Vector Quantization is developed for color image and monochrome image coding. Address VQ which includes static and dynamic processes is introduced in chapter 3. In order to overcome the problems in Hierarchical VQ, Multi-layer Address Vector Quantization is proposed in chapter 4. This approach gives the same performance as that of the normal VQ scheme but the bit rate is about 1/2 to 1/3 as that of the normal VQ method. In chapter 5, a Dynamic Finite State VQ based on a probability transition matrix to select the best subcodebook to encode the image is developed. In chapter 6, a new adaptive vector quantization scheme, suitable for color video coding, called "A Self -Organizing

  14. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    We propose an energy-efficient service discovery protocol for wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the communication

  15. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    We propose an energy-efficient service discovery protocol for wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the communication

  16. A Lookup-Table-Based Approach to Estimating Surface Solar Irradiance from Geostationary and Polar-Orbiting Satellite Data

    Directory of Open Access Journals (Sweden)

    Hailong Zhang

    2018-03-01

    Full Text Available Incoming surface solar irradiance (SSI is essential for calculating Earth’s surface radiation budget and is a key parameter for terrestrial ecological modeling and climate change research. Remote sensing images from geostationary and polar-orbiting satellites provide an opportunity for SSI estimation through directly retrieving atmospheric and land-surface parameters. This paper presents a new scheme for estimating SSI from the visible and infrared channels of geostationary meteorological and polar-orbiting satellite data. Aerosol optical thickness and cloud microphysical parameters were retrieved from Geostationary Operational Environmental Satellite (GOES system images by interpolating lookup tables of clear and cloudy skies, respectively. SSI was estimated using pre-calculated offline lookup tables with different atmospheric input data of clear and cloudy skies. The lookup tables were created via the comprehensive radiative transfer model, Santa Barbara Discrete Ordinate Radiative Transfer (SBDART, to balance computational efficiency and accuracy. The atmospheric attenuation effects considered in our approach were water vapor absorption and aerosol extinction for clear skies, while cloud parameters were the only atmospheric input for cloudy-sky SSI estimation. The approach was validated using one-year pyranometer measurements from seven stations in the SURFRAD (SURFace RADiation budget network. The results of the comparison for 2012 showed that the estimated SSI agreed with ground measurements with correlation coefficients of 0.94, 0.69, and 0.89 with a bias of 26.4 W/m2, −5.9 W/m2, and 14.9 W/m2 for clear-sky, cloudy-sky, and all-sky conditions, respectively. The overall root mean square error (RMSE of instantaneous SSI was 80.0 W/m2 (16.8%, 127.6 W/m2 (55.1%, and 99.5 W/m2 (25.5% for clear-sky, cloudy-sky (overcast sky and partly cloudy sky, and all-sky (clear-sky and cloudy-sky conditions, respectively. A comparison with other state

  17. Addressing cancer disparities via community network mobilization and intersectoral partnerships: a social network analysis.

    Directory of Open Access Journals (Sweden)

    Shoba Ramanadhan

    Full Text Available Community mobilization and collaboration among diverse partners are vital components of the effort to reduce and eliminate cancer disparities in the United States. We studied the development and impact of intersectoral connections among the members of the Massachusetts Community Network for Cancer Education, Research, and Training (MassCONECT. As one of the Community Network Program sites funded by the National Cancer Institute, this infrastructure-building initiative utilized principles of Community-based Participatory Research (CBPR to unite community coalitions, researchers, policymakers, and other important stakeholders to address cancer disparities in three Massachusetts communities: Boston, Lawrence, and Worcester. We conducted a cross-sectional, sociometric network analysis four years after the network was formed. A total of 38 of 55 members participated in the study (69% response rate. Over four years of collaboration, the number of intersectoral connections reported by members (intersectoral out-degree increased, as did the extent to which such connections were reported reciprocally (intersectoral reciprocity. We assessed relationships between these markers of intersectoral collaboration and three intermediate outcomes in the effort to reduce and eliminate cancer disparities: delivery of community activities, policy engagement, and grants/publications. We found a positive and statistically significant relationship between intersectoral out-degree and community activities and policy engagement (the relationship was borderline significant for grants/publications. We found a positive and statistically significant relationship between intersectoral reciprocity and community activities and grants/publications (the relationship was borderline significant for policy engagement. The study suggests that intersectoral connections may be important drivers of diverse intermediate outcomes in the effort to reduce and eliminate cancer disparities

  18. A region segmentation based algorithm for building a crystal position lookup table in a scintillation detector

    International Nuclear Information System (INIS)

    Wang Haipeng; Fan Xin; Yun Mingkai; Liu Shuangquan; Cao Xuexiang; Chai Pei; Shan Baoci

    2015-01-01

    In a scintillation detector, scintillation crystals are typically made into a 2-dimensional modular array. The location of incident gamma-ray needs be calibrated due to spatial response nonlinearity. Generally, position histograms-the characteristic flood response of scintillation detectors-are used for position calibration. In this paper, a position calibration method based on a crystal position lookup table which maps the inaccurate location calculated by Anger logic to the exact hitting crystal position has been proposed. Firstly, the position histogram is preprocessed, such as noise reduction and image enhancement. Then the processed position histogram is segmented into disconnected regions, and crystal marking points are labeled by finding the centroids of regions. Finally, crystal boundaries are determined and the crystal position lookup table is generated. The scheme is evaluated by the whole-body positron emission tomography (PET) scanner and breast dedicated single photon emission computed tomography scanner developed by the Institute of High Energy Physics, Chinese Academy of Sciences. The results demonstrate that the algorithm is accurate, efficient, robust and applicable to any configurations of scintillation detector. (authors)

  19. On the look-up tables for the critical heat flux in tubes (history and problems)

    Energy Technology Data Exchange (ETDEWEB)

    Kirillov, P.L.; Smogalev, I.P. [Institute of Physics and Power Engineering, Kaluga (Russian Federation)

    1995-09-01

    The complication of critical heat flux (CHF) problem for boiling in channels is caused by the large number of variable factors and the variety of two-phase flows. The existence of several hundreds of correlations for the prediction of CHF demonstrates the unsatisfactory state of this problem. The phenomenological CHF models can provide only the qualitative predictions of CHF primarily in annular-dispersed flow. The CHF look-up tables covered the results of numerous experiments received more recognition in the last 15 years. These tables are based on the statistical averaging of CHF values for each range of pressure, mass flux and quality. The CHF values for regions, where no experimental data is available, are obtained by extrapolation. The correction of these tables to account for the diameter effect is a complicated problem. There are ranges of conditions where the simple correlations cannot produce the reliable results. Therefore, diameter effect on CHF needs additional study. The modification of look-up table data for CHF in tubes to predict CHF in rod bundles must include a method which to take into account the nonuniformity of quality in a rod bundle cross section.

  20. On the look-up tables for the critical heat flux in tubes (history and problems)

    International Nuclear Information System (INIS)

    Kirillov, P.L.; Smogalev, I.P.

    1995-01-01

    The complication of critical heat flux (CHF) problem for boiling in channels is caused by the large number of variable factors and the variety of two-phase flows. The existence of several hundreds of correlations for the prediction of CHF demonstrates the unsatisfactory state of this problem. The phenomenological CHF models can provide only the qualitative predictions of CHF primarily in annular-dispersed flow. The CHF look-up tables covered the results of numerous experiments received more recognition in the last 15 years. These tables are based on the statistical averaging of CHF values for each range of pressure, mass flux and quality. The CHF values for regions, where no experimental data is available, are obtained by extrapolation. The correction of these tables to account for the diameter effect is a complicated problem. There are ranges of conditions where the simple correlations cannot produce the reliable results. Therefore, diameter effect on CHF needs additional study. The modification of look-up table data for CHF in tubes to predict CHF in rod bundles must include a method which to take into account the nonuniformity of quality in a rod bundle cross section

  1. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  2. Water property lookup table (sanwat) for use with the two-phase computational code shaft

    International Nuclear Information System (INIS)

    Sherman, M.P.; Eaton, R.R.

    1980-10-01

    A lookup table for water thermodynamic and transport properties (SANWAT) has been constructed for use with the two-phase computational code, SHAFT. The table, which uses density and specific internal energy as independent variables, covers the liquid, two-phase, and vapor regions. The liquid properties of water are contained in a separate subtable in order to obtain high accuracy for this nearly incompressible region that is frequently encountered in studies of the characteristics of nuclear-waste repositories

  3. SU-F-T-406: Verification of Total Body Irradiation Commissioned MU Lookup Table Accuracy Using Treatment Planning System for Wide Range of Patient Sizes

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, D; Chi, P; Tailor, R; Aristophanous, M; Tung, S [UT MD Anderson Cancer Center, Houston, TX (United States)

    2016-06-15

    Purpose: To verify the accuracy of total body irradiation (TBI) measurement commissioning data using the treatment planning system (TPS) for a wide range of patient separations. Methods: Our institution conducts TBI treatments with an 18MV photon beam at 380cm extended SSD using an AP/PA technique. Currently, the monitor units (MU) per field for patient treatments are determined using a lookup table generated from TMR measurements in a water phantom (75 × 41 × 30.5 cm3). The dose prescribed to an umbilicus midline point at spine level is determined based on patient separation, dose/ field and dose rate/MU. One-dimensional heterogeneous dose calculations from Pinnacle TPS were validated with thermoluminescent dosimeters (TLD) placed in an average adult anthropomorphic phantom and also in-vivo on four patients with large separations. Subsequently, twelve patients with various separations (17–47cm) were retrospectively analyzed. Computed tomography (CT) scans were acquired in the left and right decubitus positions from vertex to knee. A treatment plan for each patient was generated. The ratio of the lookup table MU to the heterogeneous TPS MU was compared. Results: TLD Measurements in the anthropomorphic phantom and large TBI patients agreed with Pinnacle calculated dose within 2.8% and 2%, respectively. The heterogeneous calculation compared to the lookup table agreed within 8.1% (ratio range: 1.014–1.081). A trend of reduced accuracy was observed when patient separation increases. Conclusion: The TPS dose calculation accuracy was confirmed by TLD measurements, showing that Pinnacle can model the extended SSD dose without commissioning a special beam model for the extended SSD geometry. The difference between the lookup table and TPS calculation potentially comes from lack of scatter during commissioning when compared to extreme patient sizes. The observed trend suggests the need for development of a correction factor between the lookup table and TPS dose

  4. The Ontology Lookup Service: more data and better tools for controlled vocabulary queries.

    Science.gov (United States)

    Côté, Richard G; Jones, Philip; Martens, Lennart; Apweiler, Rolf; Hermjakob, Henning

    2008-07-01

    The Ontology Lookup Service (OLS) (http://www.ebi.ac.uk/ols) provides interactive and programmatic interfaces to query, browse and navigate an ever increasing number of biomedical ontologies and controlled vocabularies. The volume of data available for querying has more than quadrupled since it went into production and OLS functionality has been integrated into several high-usage databases and data entry tools. Improvements have been made to both OLS query interfaces, based on user feedback and requirements, to improve usability and service interoperability and provide novel ways to perform queries.

  5. An Aerosol Extinction-to-Backscatter Ratio Database Derived from the NASA Micro-Pulse Lidar Network: Applications for Space-based Lidar Observations

    Science.gov (United States)

    Welton, Ellsworth J.; Campbell, James R.; Spinhime, James D.; Berkoff, Timothy A.; Holben, Brent; Tsay, Si-Chee; Bucholtz, Anthony

    2004-01-01

    Backscatter lidar signals are a function of both backscatter and extinction. Hence, these lidar observations alone cannot separate the two quantities. The aerosol extinction-to-backscatter ratio, S, is the key parameter required to accurately retrieve extinction and optical depth from backscatter lidar observations of aerosol layers. S is commonly defined as 4*pi divided by the product of the single scatter albedo and the phase function at 180-degree scattering angle. Values of S for different aerosol types are not well known, and are even more difficult to determine when aerosols become mixed. Here we present a new lidar-sunphotometer S database derived from Observations of the NASA Micro-Pulse Lidar Network (MPLNET). MPLNET is a growing worldwide network of eye-safe backscatter lidars co-located with sunphotometers in the NASA Aerosol Robotic Network (AERONET). Values of S for different aerosol species and geographic regions will be presented. A framework for constructing an S look-up table will be shown. Look-up tables of S are needed to calculate aerosol extinction and optical depth from space-based lidar observations in the absence of co-located AOD data. Applications for using the new S look-up table to reprocess aerosol products from NASA's Geoscience Laser Altimeter System (GLAS) will be discussed.

  6. Using Neural Networks to Improve the Performance of Radiative Transfer Modeling Used for Geometry Dependent LER Calculations

    Science.gov (United States)

    Fasnacht, Z.; Qin, W.; Haffner, D. P.; Loyola, D. G.; Joiner, J.; Krotkov, N. A.; Vasilkov, A. P.; Spurr, R. J. D.

    2017-12-01

    In order to estimate surface reflectance used in trace gas retrieval algorithms, radiative transfer models (RTM) such as the Vector Linearized Discrete Ordinate Radiative Transfer Model (VLIDORT) can be used to simulate the top of the atmosphere (TOA) radiances with advanced models of surface properties. With large volumes of satellite data, these model simulations can become computationally expensive. Look up table interpolation can improve the computational cost of the calculations, but the non-linear nature of the radiances requires a dense node structure if interpolation errors are to be minimized. In order to reduce our computational effort and improve the performance of look-up tables, neural networks can be trained to predict these radiances. We investigate the impact of using look-up table interpolation versus a neural network trained using the smart sampling technique, and show that neural networks can speed up calculations and reduce errors while using significantly less memory and RTM calls. In future work we will implement a neural network in operational processing to meet growing demands for reflectance modeling in support of high spatial resolution satellite missions.

  7. Exploring social recommenders for teacher networks to address challenges of starting teachers

    NARCIS (Netherlands)

    Fazeli, Soude; Brouns, Francis; Drachsler, Hendrik; Sloep, Peter

    2012-01-01

    Fazeli, S., Brouns, F., Drachsler, H., & Sloep, P. B. (2012). Exploring social recommenders for teacher networks to address challenges of starting teachers. In V. Hodgson, C. Jones, M. de Laat, D. McConnell, T. Ryberg, & P. Sloep (Eds.), Proceedings of the Eighth International Conference on

  8. The Ontology Lookup Service, a lightweight cross-platform tool for controlled vocabulary queries

    Directory of Open Access Journals (Sweden)

    Apweiler Rolf

    2006-02-01

    Full Text Available Abstract Background With the vast amounts of biomedical data being generated by high-throughput analysis methods, controlled vocabularies and ontologies are becoming increasingly important to annotate units of information for ease of search and retrieval. Each scientific community tends to create its own locally available ontology. The interfaces to query these ontologies tend to vary from group to group. We saw the need for a centralized location to perform controlled vocabulary queries that would offer both a lightweight web-accessible user interface as well as a consistent, unified SOAP interface for automated queries. Results The Ontology Lookup Service (OLS was created to integrate publicly available biomedical ontologies into a single database. All modified ontologies are updated daily. A list of currently loaded ontologies is available online. The database can be queried to obtain information on a single term or to browse a complete ontology using AJAX. Auto-completion provides a user-friendly search mechanism. An AJAX-based ontology viewer is available to browse a complete ontology or subsets of it. A programmatic interface is available to query the webservice using SOAP. The service is described by a WSDL descriptor file available online. A sample Java client to connect to the webservice using SOAP is available for download from SourceForge. All OLS source code is publicly available under the open source Apache Licence. Conclusion The OLS provides a user-friendly single entry point for publicly available ontologies in the Open Biomedical Ontology (OBO format. It can be accessed interactively or programmatically at http://www.ebi.ac.uk/ontology-lookup/.

  9. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Choi Jeonghee

    2008-01-01

    Full Text Available Abstract So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  10. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yongwan Park

    2008-12-01

    Full Text Available So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  11. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  12. Implementation of a fast digital optical matrix-vector multiplier using a holographic look-up table and residue arithmetic

    Science.gov (United States)

    Habiby, Sarry F.; Collins, Stuart A., Jr.

    1987-01-01

    The design and implementation of a digital (numerical) optical matrix-vector multiplier are presented. A Hughes liquid crystal light valve, the residue arithmetic representation, and a holographic optical memory are used to construct position coded optical look-up tables. All operations are performed in effectively one light valve response time with a potential for a high information density.

  13. A 3D simulation look-up library for real-time airborne gamma-ray spectroscopy

    Science.gov (United States)

    Kulisek, Jonathan A.; Wittman, Richard S.; Miller, Erin A.; Kernan, Warnick J.; McCall, Jonathon D.; McConn, Ron J.; Schweppe, John E.; Seifert, Carolyn E.; Stave, Sean C.; Stewart, Trevor N.

    2018-01-01

    A three-dimensional look-up library consisting of simulated gamma-ray spectra was developed to leverage, in real-time, the abundance of data provided by a helicopter-mounted gamma-ray detection system consisting of 92 CsI-based radiation sensors and exhibiting a highly angular-dependent response. We have demonstrated how this library can be used to help effectively estimate the terrestrial gamma-ray background, develop simulated flight scenarios, and to localize radiological sources. Source localization accuracy was significantly improved, particularly for weak sources, by estimating the entire gamma-ray spectra while accounting for scattering in the air, and especially off the ground.

  14. An independent assessment of Groeneveld et al.'s 1995 CHF look-up table

    International Nuclear Information System (INIS)

    Baek, W.-P.; Kim, H.-C.; Heung Chang, S.

    1997-01-01

    The prediction capability of the 1995 CHF look-up table (Groeneveld D.C., et al., Nucl. Eng. Des. 163 (1996) 1-23) is independently assessed based on the KAIST data base consisting of 10822 data for uniformly-heated, vertical, round tubes. This confirms the error statistics for the heat balance method reported by Groeneveld et al. and shows overall average and RMS errors of 4.2 and 36.7%, respectively, for the direct substitution method. The new 1995 table shows better prediction capability than the 1986 AECL-UO table (Groeneveld et al., 1986), especially for the low-pressure, low-flow region. The error analysis indicates the length effect even for significantly long tubes. (orig.)

  15. Fingerprinting Software Defined Networks and Controllers

    Science.gov (United States)

    2015-03-01

    rps requests per second RTT Round-Trip Time SDN Software Defined Networking SOM Self-Organizing Map STP Spanning Tree Protocol TRW-CB Threshold Random...Protocol ( STP ) updates), in which case the frame will be “punted” from the forwarding lookup process and processed by the route processor [9]. The act of...environment 20 to accomplish the needs of B4. In addition to Google, the SDN market is expected to grow beyond $35 billion by April 2018 [31]. The rate

  16. A Low-Complexity and High-Performance 2D Look-Up Table for LDPC Hardware Implementation

    Science.gov (United States)

    Chen, Jung-Chieh; Yang, Po-Hui; Lain, Jenn-Kaie; Chung, Tzu-Wen

    In this paper, we propose a low-complexity, high-efficiency two-dimensional look-up table (2D LUT) for carrying out the sum-product algorithm in the decoding of low-density parity-check (LDPC) codes. Instead of employing adders for the core operation when updating check node messages, in the proposed scheme, the main term and correction factor of the core operation are successfully merged into a compact 2D LUT. Simulation results indicate that the proposed 2D LUT not only attains close-to-optimal bit error rate performance but also enjoys a low complexity advantage that is suitable for hardware implementation.

  17. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar; Rashid, Abdul B M Harun Ur; Hussain, Muhammad Mustafa

    2010-01-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  18. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar

    2010-06-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  19. Network-oriented modeling addressing complexity of cognitive, affective and social interactions

    CERN Document Server

    Treur, Jan

    2016-01-01

    This book presents a new approach that can be applied to complex, integrated individual and social human processes. It provides an alternative means of addressing complexity, better suited for its purpose than and effectively complementing traditional strategies involving isolation and separation assumptions. Network-oriented modeling allows high-level cognitive, affective and social models in the form of (cyclic) graphs to be constructed, which can be automatically transformed into executable simulation models. The modeling format used makes it easy to take into account theories and findings about complex cognitive and social processes, which often involve dynamics based on interrelating cycles. Accordingly, it makes it possible to address complex phenomena such as the integration of emotions within cognitive processes of all kinds, of internal simulations of the mental processes of others, and of social phenomena such as shared understandings and collective actions. A variety of sample models – including ...

  20. A Table Lookup Method for Exact Analytical Solutions of Nonlinear Fractional Partial Differential Equations

    Directory of Open Access Journals (Sweden)

    Ji Juan-Juan

    2017-01-01

    Full Text Available A table lookup method for solving nonlinear fractional partial differential equations (fPDEs is proposed in this paper. Looking up the corresponding tables, we can quickly obtain the exact analytical solutions of fPDEs by using this method. To illustrate the validity of the method, we apply it to construct the exact analytical solutions of four nonlinear fPDEs, namely, the time fractional simplified MCH equation, the space-time fractional combined KdV-mKdV equation, the (2+1-dimensional time fractional Zoomeron equation, and the space-time fractional ZKBBM equation. As a result, many new types of exact analytical solutions are obtained including triangular periodic solution, hyperbolic function solution, singular solution, multiple solitary wave solution, and Jacobi elliptic function solution.

  1. Modeling and simulation of adaptive Neuro-fuzzy based intelligent system for predictive stabilization in structured overlay networks

    Directory of Open Access Journals (Sweden)

    Ramanpreet Kaur

    2017-02-01

    Full Text Available Intelligent prediction of neighboring node (k well defined neighbors as specified by the dht protocol dynamism is helpful to improve the resilience and can reduce the overhead associated with topology maintenance of structured overlay networks. The dynamic behavior of overlay nodes depends on many factors such as underlying user’s online behavior, geographical position, time of the day, day of the week etc. as reported in many applications. We can exploit these characteristics for efficient maintenance of structured overlay networks by implementing an intelligent predictive framework for setting stabilization parameters appropriately. Considering the fact that human driven behavior usually goes beyond intermittent availability patterns, we use a hybrid Neuro-fuzzy based predictor to enhance the accuracy of the predictions. In this paper, we discuss our predictive stabilization approach, implement Neuro-fuzzy based prediction in MATLAB simulation and apply this predictive stabilization model in a chord based overlay network using OverSim as a simulation tool. The MATLAB simulation results present that the behavior of neighboring nodes is predictable to a large extent as indicated by the very small RMSE. The OverSim based simulation results also observe significant improvements in the performance of chord based overlay network in terms of lookup success ratio, lookup hop count and maintenance overhead as compared to periodic stabilization approach.

  2. Application of artificial neural networks in analysis of CHF experimental data in round tubes

    International Nuclear Information System (INIS)

    Huang Yanping; Chen Bingde; Lang Xuemei; Wang Xiaojun; Shan Jianqiang; Jia Dounan

    2004-01-01

    Artificial neural networks (ANNs) are applied successfully to analyze the critical heat flux (CHF) experimental data from some round tubes in this paper. A set of software adopting artificial neural network method for predicting CHF in round tube and a set of CHF database are gotten. Comparing with common CHF correlations and CHF look-up table, ANN method has stronger ability of allow-wrong and nice robustness. The CHF predicting software adopting artificial neural network technology can improve the predicting accuracy in a wider parameter range, and is easier to update and to use. The artificial neural network method used in this paper can be applied to some similar physical problems. (authors)

  3. A Novel CAN Tree Coordinate Routing in Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao Li

    2014-09-01

    Full Text Available In this paper, we propose a novel approach to improve coordination routing while minimizing the maintenance overhead during nodes churn. It bases on “CAN Tree Routing for Content- Addressable Network” 1 which is a solution for peer-to-peer routing. We concentrated on coordinate routing in this paper. The key idea of our approach is a recursion process to calculate target zone code and search in CAN tree 1. Because the hops are via long links in CAN, it enhances routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is , which is much better than a uniform greedy routing, while each node maintains two long links in average.

  4. Filling gaps in a large reserve network to address freshwater conservation needs.

    Science.gov (United States)

    Hermoso, Virgilio; Filipe, Ana Filipa; Segurado, Pedro; Beja, Pedro

    2015-09-15

    Freshwater ecosystems and biodiversity are among the most threatened at global scale, but efforts for their conservation have been mostly peripheral to terrestrial conservation. For example, Natura 2000, the world's largest network of protected areas, fails to cover adequately the distribution of rare and endangered aquatic species, and lacks of appropriate spatial design to make conservation for freshwater biodiversity effective. Here, we develop a framework to identify a complementary set of priority areas and enhance the conservation opportunities of Natura 2000 for freshwater biodiversity, using the Iberian Peninsula as a case study. We use a systematic planning approach to identify a minimum set of additional areas that would help i) adequately represent all freshwater fish, amphibians and aquatic reptiles at three different target levels, ii) account for key ecological processes derived from riverscape connectivity, and iii) minimize the impact of threats, both within protected areas and propagated from upstream unprotected areas. Addressing all these goals would need an increase in area between 7 and 46%, depending on the conservation target used and strength of connectivity required. These new priority areas correspond to subcatchments inhabited by endangered and range restricted species, as well as additional subcatchments required to improve connectivity among existing protected areas and to increase protection against upstream threats. Our study should help guide future revisions of the design of Natura 2000, while providing a framework to address deficiencies in reserve networks for adequately protecting freshwater biodiversity elsewhere. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Laboratory Demographics Lookup Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This website provides demographic information about laboratories, including CLIA number, facility name and address, where the laboratory testing is performed, the...

  6. Application of a neural network to control a pressurized water reactor

    International Nuclear Information System (INIS)

    Lin, C.; Ku, C.C.; Lee, C.S.

    1993-01-01

    A neural network has been trained to control a pressurized water reactor. The inputs of the training pattern are the plant signals, and the outputs are the control rod actions. The training patterns are some kind of lookup table of control action. The table is designed by the heuristic method, which is based on the designer's knowledge of the controlled system and the operation experience. This method has two advantages: The controller's performance does not depend on the mathematical model of the plant, and the controller could be a nonlinear one. The advantages of using neural networks to implement the controller are to save computing time and overcome partial hardware failure

  7. Expanding the National Drug Abuse Treatment Clinical Trials Network to address the management of substance use disorders in general medical settings

    Directory of Open Access Journals (Sweden)

    Tai B

    2014-07-01

    Full Text Available Betty Tai, Steven Sparenborg, Udi E Ghitza, David Liu Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, Maryland, USA Abstract: The Patient Protection and Affordable Care Act (2010 and the Mental Health Parity and Addiction Equity Act (2008 expand substance use disorder (SUD care services in the USA into general medical settings. Care offered in these settings will engage substance-using patients in an integrated and patient-centered environment that addresses physical and mental health comorbidities and follows a chronic care model. This expansion of SUD services presents a great need for evidence-based practices useful in general medical settings, and reveals several research gaps to be addressed. The National Drug Abuse Treatment Clinical Trials Network of the National Institute on Drug Abuse can serve an important role in this endeavor. High-priority research gaps are highlighted in this commentary. A discussion follows on how the National Drug Abuse Treatment Clinical Trials Network can transform to address changing patterns in SUD care to efficiently generate evidence to guide SUD treatment practice within the context of recent US health care legislation. Keywords: Patient Protection and Affordable Care Act, National Drug Abuse Treatment Clinical Trials Network, substance use disorders, practice-based research network, electronic health records

  8. The exploitation of neural networks in automotive engine management systems

    Energy Technology Data Exchange (ETDEWEB)

    Shayler, P.J.; Goodman, M. [University of Nottingham (United Kingdom); Ma, T. [Ford Motor Company, Dagenham (United Kingdom). Research and Engineering Centre

    2000-07-01

    The use of electronic engine control systems on spark ignition engines has enabled a high degree of performance optimisation to be achieved. The range of functions performed by these systems, and the level of performance demanded, is rising and thus so are development times and costs. Neural networks have attracted attention as having the potential to simplify software development and improve the performance of this software. The scope and nature of possible applications is described. In particular, the pattern recognition and classification abilities of networks are applied to crankshaft speed fluctuation data for engine-fault diagnosis, and multidimensional mapping capabilities are investigated as an alternative to large 'lookup' tables and calibration functions. (author)

  9. A Memory-Based Programmable Logic Device Using Look-Up Table Cascade with Synchronous Static Random Access Memories

    Science.gov (United States)

    Nakamura, Kazuyuki; Sasao, Tsutomu; Matsuura, Munehiro; Tanaka, Katsumasa; Yoshizumi, Kenichi; Nakahara, Hiroki; Iguchi, Yukihiro

    2006-04-01

    A large-scale memory-technology-based programmable logic device (PLD) using a look-up table (LUT) cascade is developed in the 0.35-μm standard complementary metal oxide semiconductor (CMOS) logic process. Eight 64 K-bit synchronous SRAMs are connected to form an LUT cascade with a few additional circuits. The features of the LUT cascade include: 1) a flexible cascade connection structure, 2) multi phase pseudo asynchronous operations with synchronous static random access memory (SRAM) cores, and 3) LUT-bypass redundancy. This chip operates at 33 MHz in 8-LUT cascades at 122 mW. Benchmark results show that it achieves a comparable performance to field programmable gate array (FPGAs).

  10. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the sub-systems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  11. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the subsystems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  12. Software Defined Networking to support IP address mobility in future LTE network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; van den Berg, Hans Leo; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    The existing LTE network architecture dose not scale well to increasing demands due to its highly centralized and hierarchical composition. In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture. Next, we develop two IP

  13. Addressing practical challenges in utility optimization of mobile wireless sensor networks

    Science.gov (United States)

    Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin

    2008-04-01

    This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.

  14. Networking: Addressing Urban Students' Self-Esteem.

    Science.gov (United States)

    Tobias, Randolf; Turner, Thomas M.

    1997-01-01

    Describes Network in the Schools (NIS), a project to enhance teens' academic achievement and self-esteem, which uses small group classroom discussions regarding self-affirmation, social concerns, self-improvement, and reflection, and meetings for group sharing and self-expression. Presents findings that the program results in enhanced parent…

  15. IMPLEMENTASI NETWORK ADDRESS TRANSLATION (NAT MENGGUNAKAN KERIO CONTROL VERSI 7.4.1 DI PUSAT PENELITIAN BIOTEKNOLOGI – LIPI

    Directory of Open Access Journals (Sweden)

    Tutang Tutang

    2016-03-01

    Full Text Available Biotechnology Research Center as an institution engaged in the research, the need for data and updated information is an absolute thing. This requirement can be met one of them is the use of information technology either by using the internet. With the increasing number of Internet users in Biotechnology Research Center and order for all users who are members of the Local Area Network (LAN can utilize the internet needed a good network management. While, during the network management Indonesian Institute of Sciences (LIPI, under the supervision of the Joint Network Team (TGJ – LIPI only provide one local IP segment which is limited to only 250 users. While number of internet users in Biotechnology Research Center and more than that number will continue to grow. To overcome these problems, then the LAN network at the Research Center for Biotechnology service facility utilizes Network Address Translation (NAT contained in Kerio Control software version 7.4.1. The subject of this article is limited to the implementation and configuration of NAT using Kerio Control 7.4.1 version. From these results, we concluded that the implementation of NAT helps all users in the network LAN Biotechnology Research Center get Public IP, so that it can connect to the internet properly.

  16. Design of a magnetic-tunnel-junction-oriented nonvolatile lookup table circuit with write-operation-minimized data shifting

    Science.gov (United States)

    Suzuki, Daisuke; Hanyu, Takahiro

    2018-04-01

    A magnetic-tunnel-junction (MTJ)-oriented nonvolatile lookup table (LUT) circuit, in which a low-power data-shift function is performed by minimizing the number of write operations in MTJ devices is proposed. The permutation of the configuration memory cell for read/write access is performed as opposed to conventional direct data shifting to minimize the number of write operations, which results in significant write energy savings in the data-shift function. Moreover, the hardware cost of the proposed LUT circuit is small since the selector is shared between read access and write access. In fact, the power consumption in the data-shift function and the transistor count are reduced by 82 and 52%, respectively, compared with those in a conventional static random-access memory-based implementation using a 90 nm CMOS technology.

  17. Address Translation Problems in IMS Based Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Balazs Godor

    2006-01-01

    Full Text Available The development of packed based multimedia networks reached a turning point when the ITU-T and the ETSIhave incorporated the IMS to the NGN. With the fast development of mobile communication more and more services andcontent are available. In contrast with fix network telephony both the services and the devices are personalized in the “mobileworld”. Services, known from the Internet - like e-mail, chat, browsing, presence, etc. – are already available via mobiledevices as well. The IMS originally wanted to exploit both the benefits of mobile networks and the fancy services of theInternet. But today it is already more than that. IMS is the core of the next generation telecommunication networks and abasis for fix-mobile convergent services. The fact however that IMS was originally a “mobile” standard, where IPv6 was notoddity generated some problems for the fix networks, where IPv4 is used. In this article I give an overview of these problemsand mention some solutions as well.

  18. Recurrent fuzzy neural network by using feedback error learning approaches for LFC in interconnected power system

    International Nuclear Information System (INIS)

    Sabahi, Kamel; Teshnehlab, Mohammad; Shoorhedeli, Mahdi Aliyari

    2009-01-01

    In this study, a new adaptive controller based on modified feedback error learning (FEL) approaches is proposed for load frequency control (LFC) problem. The FEL strategy consists of intelligent and conventional controllers in feedforward and feedback paths, respectively. In this strategy, a conventional feedback controller (CFC), i.e. proportional, integral and derivative (PID) controller, is essential to guarantee global asymptotic stability of the overall system; and an intelligent feedforward controller (INFC) is adopted to learn the inverse of the controlled system. Therefore, when the INFC learns the inverse of controlled system, the tracking of reference signal is done properly. Generally, the CFC is designed at nominal operating conditions of the system and, therefore, fails to provide the best control performance as well as global stability over a wide range of changes in the operating conditions of the system. So, in this study a supervised controller (SC), a lookup table based controller, is addressed for tuning of the CFC. During abrupt changes of the power system parameters, the SC adjusts the PID parameters according to these operating conditions. Moreover, for improving the performance of overall system, a recurrent fuzzy neural network (RFNN) is adopted in INFC instead of the conventional neural network, which was used in past studies. The proposed FEL controller has been compared with the conventional feedback error learning controller (CFEL) and the PID controller through some performance indices

  19. Enhancing continental-scale understanding of agriculture: Integrating the National Ecological Observatory Network (NEON) with existing research networks to address global change.

    Science.gov (United States)

    Kelly, G.

    2015-12-01

    Over the past decade, there has been a resurgence of interest in the sustainability of the world's food system and its contributions to feeding the world's population as well as to ensuring environmental sustainability of the planet. The elements of this grand challenge are by now well known. Analysis of agricultural sustainability is made more challenging by the fact that the local responses to these global drivers of change are extremely variable in space and time due to the biophysical and geopolitical heterogeneity across the United States, and the world. Utilizing research networks allows the scientific community to leverage existing knowledge, models and data to develop a framework for understanding the interplay between global change drivers, regional, and continental sustainability of US agriculture. For example, well-established instrumented and calibrated research networks will allow for the examination of the potential tradeoffs between: 1) crop production, 2) land use and carbon emissions and sequestration, 3) groundwater depletion, and 4) nitrogen dynamics. NEON represents a major investment in scientific infrastructure in support of ecological research at a continental scale and is intended to address multiple ecological grand challenges. NEON will collect data from automated sensors and sample organisms and ecological variables in 20 eco-climatic domains. We will provide examples of how NEON's full potential can be realized when these data are combined with long term experimental results and other sensor networks [e.g., Ameriflux, Fluxnet, the Long-term Ecological Research Program (LTER), the Long-term Agroecosystem Research Network (LTAR)], Critical Zone Observatory (CZO).

  20. Three neural network based sensor systems for environmental monitoring

    International Nuclear Information System (INIS)

    Keller, P.E.; Kouzes, R.T.; Kangas, L.J.

    1994-05-01

    Compact, portable systems capable of quickly identifying contaminants in the field are of great importance when monitoring the environment. One of the missions of the Pacific Northwest Laboratory is to examine and develop new technologies for environmental restoration and waste management at the Hanford Site. In this paper, three prototype sensing systems are discussed. These prototypes are composed of sensing elements, data acquisition system, computer, and neural network implemented in software, and are capable of automatically identifying contaminants. The first system employs an array of tin-oxide gas sensors and is used to identify chemical vapors. The second system employs an array of optical sensors and is used to identify the composition of chemical dyes in liquids. The third system contains a portable gamma-ray spectrometer and is used to identify radioactive isotopes. In these systems, the neural network is used to identify the composition of the sensed contaminant. With a neural network, the intense computation takes place during the training process. Once the network is trained, operation consists of propagating the data through the network. Since the computation involved during operation consists of vector-matrix multiplication and application of look-up tables unknown samples can be rapidly identified in the field

  1. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  2. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  3. Addressing the Issue of Routing Unfairness in Opportunistic Backhaul Networks for Collecting Sensed Data

    Directory of Open Access Journals (Sweden)

    Tekenate E. Amah

    2017-12-01

    Full Text Available Widely deploying sensors in the environment and embedding them in physical objects is a crucial step towards realizing smart and sustainable cities. To cope with rising resource demands and limited budgets, opportunistic networks (OppNets offer a scalable backhaul option for collecting delay-tolerant data from sensors to gateways in order to enable efficient urban operations and services. While pervasive devices such as smartphones and tablets contribute significantly to the scalability of OppNets, closely following human movement patterns and social structure introduces network characteristics that pose routing challenges. Our study on the impact of these characteristics reveals that existing routing protocols subject a key set of devices to higher resource consumption, to which their users may respond by withdrawing participation. Unfortunately, existing solutions addressing this unfairness do not guarantee achievable throughput since they are not specifically designed for sensed data collection scenarios. Based on concepts derived from the study, we suggest design guidelines for adapting applicable routing protocols to sensed data collection scenarios. We also follow our design guidelines to propose the Fair Locality Aware Routing (FLARoute technique. Evaluating FLARoute within an existing routing protocol confirms improved fairness and throughput under conditions that compromise the performance of existing solutions.

  4. Integration between WSNs and Internet based on Address Internetworking for Web

    OpenAIRE

    Jeong Hee Kim; Do Hyeun Kim; Ho Young Kwak; Yung Cheol Byun

    2012-01-01

    There has been an increasing interest in wireless sensor networks as a new technology to realize ubiquitous computing, and demands for internetworking technology between the wireless sensor networks and the Internet which is based on IP address. For this purpose, this paper proposes and implements the internetworking scheme which assigns IP addresses to the sensor nodes and internetworks based on the gateway-based integration for internetworking between the wireless sensor networks and the In...

  5. SDN-enabled dynamic WDM networks to address routing information inaccuracy

    CSIR Research Space (South Africa)

    Ravhuanzwo, Lusani

    2016-11-01

    Full Text Available Large dynamic wavelength-division multiplexed (WDM) networks based on the distributed control mechanism are susceptible to routing information inaccuracies. Factors such as non-negligible propagation delays, infrequent network state updates...

  6. Developing a European research network to address unmet needs in anxiety disorders.

    Science.gov (United States)

    Baldwin, David S; Pallanti, Stefano; Zwanzger, Peter

    2013-12-01

    Anxiety disorders are common, typically have an early onset, run a chronic or relapsing course, cause substantial personal distress, impair social and occupational function, reduce quality of life, and impose a substantial economic burden: they are often comorbid with major depression, bipolar disorder, schizophrenia, substance misuse and physical illness, and are associated with increased risks of suicidal behaviour. As such, anxiety disorders should be regarded as a significant public health problem. However the causes of anxiety disorders remain largely unknown, which hinders accurate diagnosis, the prediction of prognosis, and the development of refined treatment approaches. In clinical practice, many patients with anxiety disorders do not present or are not recognised, the standard of care they receive is often sub-optimal, and the effectiveness of pharmacological and psychological treatment interventions in real-world clinical practice can be disappointing. The current substantial unmet public health, clinical and research needs in anxiety disorders could be addressed in part by developing independent collaborative European networks. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Toward Petascale Biologically Plausible Neural Networks

    Science.gov (United States)

    Long, Lyle

    This talk will describe an approach to achieving petascale neural networks. Artificial intelligence has been oversold for many decades. Computers in the beginning could only do about 16,000 operations per second. Computer processing power, however, has been doubling every two years thanks to Moore's law, and growing even faster due to massively parallel architectures. Finally, 60 years after the first AI conference we have computers on the order of the performance of the human brain (1016 operations per second). The main issues now are algorithms, software, and learning. We have excellent models of neurons, such as the Hodgkin-Huxley model, but we do not know how the human neurons are wired together. With careful attention to efficient parallel computing, event-driven programming, table lookups, and memory minimization massive scale simulations can be performed. The code that will be described was written in C + + and uses the Message Passing Interface (MPI). It uses the full Hodgkin-Huxley neuron model, not a simplified model. It also allows arbitrary network structures (deep, recurrent, convolutional, all-to-all, etc.). The code is scalable, and has, so far, been tested on up to 2,048 processor cores using 107 neurons and 109 synapses.

  8. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  9. Design and optimization of color lookup tables on a simplex topology.

    Science.gov (United States)

    Monga, Vishal; Bala, Raja; Mo, Xuan

    2012-04-01

    An important computational problem in color imaging is the design of color transforms that map color between devices or from a device-dependent space (e.g., RGB/CMYK) to a device-independent space (e.g., CIELAB) and vice versa. Real-time processing constraints entail that such nonlinear color transforms be implemented using multidimensional lookup tables (LUTs). Furthermore, relatively sparse LUTs (with efficient interpolation) are employed in practice because of storage and memory constraints. This paper presents a principled design methodology rooted in constrained convex optimization to design color LUTs on a simplex topology. The use of n simplexes, i.e., simplexes in n dimensions, as opposed to traditional lattices, recently has been of great interest in color LUT design for simplex topologies that allow both more analytically tractable formulations and greater efficiency in the LUT. In this framework of n-simplex interpolation, our central contribution is to develop an elegant iterative algorithm that jointly optimizes the placement of nodes of the color LUT and the output values at those nodes to minimize interpolation error in an expected sense. This is in contrast to existing work, which exclusively designs either node locations or the output values. We also develop new analytical results for the problem of node location optimization, which reduces to constrained optimization of a large but sparse interpolation matrix in our framework. We evaluate our n -simplex color LUTs against the state-of-the-art lattice (e.g., International Color Consortium profiles) and simplex-based techniques for approximating two representative multidimensional color transforms that characterize a CMYK xerographic printer and an RGB scanner, respectively. The results show that color LUTs designed on simplexes offer very significant benefits over traditional lattice-based alternatives in improving color transform accuracy even with a much smaller number of nodes.

  10. Addressing water incidents by using pipe network models

    CSIR Research Space (South Africa)

    Yoyo, Sonwabiso

    2016-05-01

    Full Text Available quantities like flow rate and pressure with water meters. Such an approach provides a highly exact and realistic understanding, but is potentially very expensive to implement. This is especially so in view of the large number water infrastructure networks...

  11. Implementation of a digital optical matrix-vector multiplier using a holographic look-up table and residue arithmetic

    Science.gov (United States)

    Habiby, Sarry F.

    1987-01-01

    The design and implementation of a digital (numerical) optical matrix-vector multiplier are presented. The objective is to demonstrate the operation of an optical processor designed to minimize computation time in performing a practical computing application. This is done by using the large array of processing elements in a Hughes liquid crystal light valve, and relying on the residue arithmetic representation, a holographic optical memory, and position coded optical look-up tables. In the design, all operations are performed in effectively one light valve response time regardless of matrix size. The features of the design allowing fast computation include the residue arithmetic representation, the mapping approach to computation, and the holographic memory. In addition, other features of the work include a practical light valve configuration for efficient polarization control, a model for recording multiple exposures in silver halides with equal reconstruction efficiency, and using light from an optical fiber for a reference beam source in constructing the hologram. The design can be extended to implement larger matrix arrays without increasing computation time.

  12. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  13. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  14. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  15. Control Of DC 30V/15A Power Supply Using AT89C Micro controller By Look-Up Table Method For Magnetization System Application

    International Nuclear Information System (INIS)

    Abdillah, Arieko; Hermanto, Lingga; Manaf, Azwar

    2003-01-01

    Experiment of Control System Dc current based on micro controller Atm el AT89C52 has been done. Micro controller controls the transistors that will be activate. These transistors will allow the DC current passed trough to produce a homogeneous of magnetic field. This system produce DC current from 1,8 A to 12 A that produce the magnetic field measures from 23 mT to 325 mT. All manner of data using look-up table method. Micro controller and power supply circuit were isolated by optocoupler. This system can be used as first prototypes of control system of magnetic field for magnetize purpose

  16. Addressing challenges for future strategic-level emergency management: reframing, networking, and capacity-building.

    Science.gov (United States)

    Bosomworth, Karyn; Owen, Christine; Curnin, Steven

    2017-04-01

    The mounting frequency and intensity of natural hazards, alongside growing interdependencies between social-technical and ecological systems, are placing increased pressure on emergency management. This is particularly true at the strategic level of emergency management, which involves planning for and managing non-routine, high-consequence events. Drawing on the literature, a survey, and interviews and workshops with Australia's senior emergency managers, this paper presents an analysis of five core challenges that these pressures are creating for strategic-level emergency management. It argues that emphasising 'emergency management' as a primary adaptation strategy is a retrograde step that ignores the importance of addressing socio-political drivers of vulnerabilities. Three key suggestions are presented that could assist the country's strategic-level emergency management in tackling these challenges: (i) reframe emergency management as a component of disaster risk reduction rather than them being one and the same; (ii) adopt a network governance approach; and (iii) further develop the capacities of strategic-level emergency managers. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  17. Addressing therapeutic boundaries in social networking.

    Science.gov (United States)

    Ginory, Almari; Sabatier, Laura Mayol; Eth, Spencer

    2012-01-01

    Facebook is the leading social networking website, with over 500 million users. Prior studies have shown an increasing number of housestaff accessing the site. While Facebook can be used to foster camaraderie, it can also create difficulties in the doctor-patient relationship, especially when boundaries are crossed. This study explored the prevalence of such boundary crossings and offers recommendations for training. An anonymous voluntary survey regarding Facebook use was distributed to current psychiatry residents through the American Psychiatric Association (APA) listserv. Of the 182 respondents, 95.7% had current Facebook profiles, and 9.7% had received friend requests from patients. In addition, 18.7% admitted to viewing patient profiles on Facebook. There is a substantial utilization of Facebook among psychiatric residents as compared with prior studies. Specific guidance regarding social media websites and the potential for ethical difficulties should be offered to trainees. © 2012 Guilford Publications, Inc.

  18. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  19. An addressable conducting network for autonomic structural health management of composite structures

    International Nuclear Information System (INIS)

    Takahashi, Kosuke; Park, Jong Se; Thomas Hahn, H

    2010-01-01

    The electrical resistance change method (ERCM) has long been an area of interest as an in-service health monitoring system. To apply the ERCM to existing structures, a new concept, the addressable conducting network (ACN), is proposed for autonomic structural health management of graphite/polymer composites. The ACN consists of two sets of conducting lines normal to each other, where one set resides on the top surface of the laminate and the other on the bottom surface. Damage can be detected by monitoring the resistance change 'through the laminate thickness' between two lines. By using a thermally mendable polymer as the matrix, the same conducting lines can be used to supply the electric current needed for resistive heating, thereby allowing the detected damage to be healed. As shown experimentally, the electrical resistance change method using an ACN distinguishes between laminates made of properly and improperly cured prepreg as well as revealing damage generated during three-point bending tests. Finite element analysis was performed to examine the feasibility of the ACN and indicated that the damage can be easily located from the spatial distribution of resistance changes and that the damaged area can be locally heated by supplying a large amount of current to selected conducting lines

  20. An addressable conducting network for autonomic structural health management of composite structures

    Science.gov (United States)

    Takahashi, Kosuke; Park, Jong Se; Hahn, H. Thomas

    2010-10-01

    The electrical resistance change method (ERCM) has long been an area of interest as an in-service health monitoring system. To apply the ERCM to existing structures, a new concept, the addressable conducting network (ACN), is proposed for autonomic structural health management of graphite/polymer composites. The ACN consists of two sets of conducting lines normal to each other, where one set resides on the top surface of the laminate and the other on the bottom surface. Damage can be detected by monitoring the resistance change 'through the laminate thickness' between two lines. By using a thermally mendable polymer as the matrix, the same conducting lines can be used to supply the electric current needed for resistive heating, thereby allowing the detected damage to be healed. As shown experimentally, the electrical resistance change method using an ACN distinguishes between laminates made of properly and improperly cured prepreg as well as revealing damage generated during three-point bending tests. Finite element analysis was performed to examine the feasibility of the ACN and indicated that the damage can be easily located from the spatial distribution of resistance changes and that the damaged area can be locally heated by supplying a large amount of current to selected conducting lines.

  1. Analyzing the Messages of the State of the Union Address

    Science.gov (United States)

    Kissling, Mark T.; Martell, Christopher C.

    2014-01-01

    In the era of smartphones and 24-hour news networks, the State of the Union address is a major event. All national media outlets--in print, on television, on the Internet--report on the address, some almost exclusively in the days leading up to and after the speech. In this article, considering their experiences teaching about the address, and…

  2. Addressing unknown constants and metabolic network behaviors through petascale computing: understanding H2 production in green algae

    International Nuclear Information System (INIS)

    Chang, Christopher; Alber, David; Graf, Peter; Kim, Kwiseon; Seibert, Michael

    2007-01-01

    The Genomics Revolution has resulted in a massive and growing quantity of whole-genome DNA sequences, which encode the metabolic catalysts necessary for life. However, gene annotations can rarely be complete, and measurement of the kinetic constants associated with the encoded enzymes can not possibly keep pace, necessitating the use of careful modeling to explore plausible network behaviors. Key challenges are (1) quantitatively formulating kinetic laws governing each transformation in a fixed model network; (2) characterizing the stable solution (if any) of the associated ordinary differential equations (ODEs); (3) fitting the latter to metabolomics data as it becomes available; and (4) optimizing a model output against the possible space of kinetic parameters, with respect to properties such as robustness of network response, or maximum consumption/production. This SciDAC-2 project addresses this large-scale uncertainty in the genome-scale metabolic network of the water-splitting, H 2 -producing green alga Chlamydomonas reinhardtii. Each metabolic transformation is formulated as an irreversible steady-state process, such that the vast literature on known enzyme mechanisms may be incorporated directly. To start, glycolysis, the tricarboxylic acid cycle, and basic fermentation pathways have been encoded in Systems Biology Markup Language (SBML) with careful annotation and consistency with the KEGG database, yielding a model with 3 compartments, 95 species, 38 reactions, and 109 kinetic constants. To study and optimize such models with a view toward larger models, we have developed a system which takes as input an SBML model, and automatically produces C code that when compiled and executed optimizes the model's kinetic parameters according to test criteria. We describe the system and present numerical results. Further development, including overlaying of a parallel multistart algorithm, will allow optimization of thousands of parameters on high-performance systems

  3. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework......Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...

  4. Fast computation of hologram patterns of a 3D object using run-length encoding and novel look-up table methods.

    Science.gov (United States)

    Kim, Seung-Cheol; Kim, Eun-Soo

    2009-02-20

    In this paper we propose a new approach for fast generation of computer-generated holograms (CGHs) of a 3D object by using the run-length encoding (RLE) and the novel look-up table (N-LUT) methods. With the RLE method, spatially redundant data of a 3D object are extracted and regrouped into the N-point redundancy map according to the number of the adjacent object points having the same 3D value. Based on this redundancy map, N-point principle fringe patterns (PFPs) are newly calculated by using the 1-point PFP of the N-LUT, and the CGH pattern for the 3D object is generated with these N-point PFPs. In this approach, object points to be involved in calculation of the CGH pattern can be dramatically reduced and, as a result, an increase of computational speed can be obtained. Some experiments with a test 3D object are carried out and the results are compared to those of the conventional methods.

  5. A theoretical design for learning model addressing the networked society

    DEFF Research Database (Denmark)

    Levinsen, Karin; Nielsen, Janni; Sørensen, Birgitte Holm

    2010-01-01

    The transition from the industrial to the networked society produces contradictions that challenges the educational system and force it to adapt to new conditions. In a Danish virtual Master in Information and Communication Technologies and Learning (MIL) these contradictions appear as a field of...... which enables students to develop Networked Society competencies and maintain progression in the learning process also during the online periods. Additionally we suggest that our model contributes to the innovation of a networked society's design for learning....... is continuously decreasing. We teach for deep learning but are confronted by students' cost-benefit strategies when they navigate through the study programme under time pressure. To meet these challenges a Design for Learning Model has been developed. The aim is to provide a scaffold that ensures students......' acquisition of the subject matter within a time limit and at a learning quality that support their deep learning process during a subsequent period of on-line study work. In the process of moving from theory to application the model passes through three stages: 1) Conceptual modelling; 2) Orchestration, and 3...

  6. Networks: structure and action : steering in and steering by policy networks

    NARCIS (Netherlands)

    Dassen, A.

    2010-01-01

    This thesis explores the opportunities to build a structural policy network model that is rooted in social network theories. By making a distinction between a process of steering in networks, and a process of steering by networks, it addresses the effects of network structures on network dynamics as

  7. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  8. Introduction to Artificial Neural Networks

    DEFF Research Database (Denmark)

    Larsen, Jan

    1999-01-01

    The note addresses introduction to signal analysis and classification based on artificial feed-forward neural networks.......The note addresses introduction to signal analysis and classification based on artificial feed-forward neural networks....

  9. A Fuzzy Obstacle Avoidance Controller Using a Lookup-Table Sharing Method and Its Applications for Mobile Robots

    Directory of Open Access Journals (Sweden)

    Jinwook Kim

    2011-11-01

    Full Text Available A Lookup-Table (LUT based design enhances the processing speed of a fuzzy obstacle avoidance controller by reducing the operation time. Also, a LUT sharing method provides efficient ways of reducing the LUT memory size. In order to share the LUT which is used for a fuzzy obstacle avoidance controller, an idea of using a basis function is developed. As applications of the shared LUT-based fuzzy controller, a laser-sensor-based fuzzy controller and an ultrasonic-sensor-based fuzzy controller are introduced in this paper. This paper suggests a LUT sharing method that reduces the LUT buffer size without a significant degradation of the performance. The LUT sharing method makes the buffer size independent of the fuzzy system's complexity. A simulation using MSRDS (Microsoft Robotics Developer Studio is used to evaluate the proposed method. To investigate the performance of the controller, experiments are carried out using a Pioneer P3-DX with LabVIEW as an integration tool. Although the simulation and experiments show little difference between the fully valued LUT-based method and the LUT sharing method in terms of the operation time, the LUT sharing method reduces almost 95% of the full-valued LUT-based buffer size.

  10. Understanding veterinary students' use of and attitudes toward the social networking site, Facebook, to assist in developing curricula to address online professionalism.

    Science.gov (United States)

    Coe, Jason B; Weijs, Cynthia A; Muise, Amy; Christofides, Emily; Desmarais, Serge

    2012-01-01

    Social media is an increasingly common form of communication, with Facebook being the preferred social-networking site among post-secondary students. Numerous studies suggest post-secondary students practice high self-disclosure on Facebook. Research evaluating veterinary students' use of social media found a notable proportion of student-posted content deemed inappropriate. Lack of discretion in posting content can have significant repercussions for aspiring veterinary professionals, their college of study, and the veterinary profession they represent. Veterinarians-in-training at three veterinary colleges across Canada were surveyed to explore their use of and attitude toward the social networking site, Facebook. Students were invited to complete an online survey with questions relating to their knowledge of privacy in relation to using Facebook, their views on the acceptability of posting certain types of information, and their level of professional accountability online. Linear regression modeling was used to further examine factors related to veterinary students' disclosure of personal information on Facebook. Need for popularity (pFacebook. Understanding veterinary students' use of and attitudes toward social media, such as Facebook, reveals a need, and provides a basis, for developing educational programs to address online professionalism. Educators and administrators at veterinary schools may use this information to assist in developing veterinary curricula that addresses the escalating issue of online professionalism.

  11. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  12. Addressing unknown constants and metabolic network behaviors through petascale computing: understanding H{sub 2} production in green algae

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Christopher; Alber, David; Graf, Peter; Kim, Kwiseon; Seibert, Michael [National Renewable Energy Laboratory (NREL), Golden, CO 80401 (United States)

    2007-07-15

    The Genomics Revolution has resulted in a massive and growing quantity of whole-genome DNA sequences, which encode the metabolic catalysts necessary for life. However, gene annotations can rarely be complete, and measurement of the kinetic constants associated with the encoded enzymes can not possibly keep pace, necessitating the use of careful modeling to explore plausible network behaviors. Key challenges are (1) quantitatively formulating kinetic laws governing each transformation in a fixed model network; (2) characterizing the stable solution (if any) of the associated ordinary differential equations (ODEs); (3) fitting the latter to metabolomics data as it becomes available; and (4) optimizing a model output against the possible space of kinetic parameters, with respect to properties such as robustness of network response, or maximum consumption/production. This SciDAC-2 project addresses this large-scale uncertainty in the genome-scale metabolic network of the water-splitting, H{sub 2}-producing green alga Chlamydomonas reinhardtii. Each metabolic transformation is formulated as an irreversible steady-state process, such that the vast literature on known enzyme mechanisms may be incorporated directly. To start, glycolysis, the tricarboxylic acid cycle, and basic fermentation pathways have been encoded in Systems Biology Markup Language (SBML) with careful annotation and consistency with the KEGG database, yielding a model with 3 compartments, 95 species, 38 reactions, and 109 kinetic constants. To study and optimize such models with a view toward larger models, we have developed a system which takes as input an SBML model, and automatically produces C code that when compiled and executed optimizes the model's kinetic parameters according to test criteria. We describe the system and present numerical results. Further development, including overlaying of a parallel multistart algorithm, will allow optimization of thousands of parameters on high

  13. CIRM Alpha Stem Cell Clinics: Collaboratively Addressing Regenerative Medicine Challenges.

    Science.gov (United States)

    Jamieson, Catriona H M; Millan, Maria T; Creasey, Abla A; Lomax, Geoff; Donohoe, Mary E; Walters, Mark C; Abedi, Mehrdad; Bota, Daniela A; Zaia, John A; Adams, John S

    2018-06-01

    The California Institute for Regenerative Medicine (CIRM) Alpha Stem Cell Clinic (ASCC) Network was launched in 2015 to address a compelling unmet medical need for rigorous, FDA-regulated, stem cell-related clinical trials for patients with challenging, incurable diseases. Here, we describe our multi-center experiences addressing current and future challenges. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. Artificial neural network applications in the calibration of spark-ignition engines: An overview

    Directory of Open Access Journals (Sweden)

    Richard Fiifi Turkson

    2016-09-01

    Full Text Available Emission legislation has become progressively tighter, making the development of new internal combustion engines very challenging. New engine technologies for complying with these regulations introduce an exponential dependency between the number of test combinations required for obtaining optimum results and the time and cost outlays. This makes the calibration task very expensive and virtually impossible to carry out. The potential use of trained neural networks in combination with Design of Experiments (DoE methods for engine calibration has been a subject of research activities in recent times. This is because artificial neural networks, compared with other data-driven modeling techniques, perform better in satisfying a majority of the modeling requirements for engine calibration including the curse of dimensionality; the use of DoE for obtaining few measurements as practicable, with the aim of reducing engine calibration costs; the required flexibility that allows model parameters to be optimized to avoid overfitting; and the facilitation of automated online optimization during the engine calibration process that eliminates the need for user intervention. The purpose of this review is to give an overview of the various applications of neural networks in the calibration of spark-ignition engines. The identified and discussed applications include system identification for rapid prototyping, virtual sensing, use of neural networks as look-up table surrogates, emerging control strategies and On-Board Diagnostic (OBD applications. The demerits of neural networks, future possibilities and alternatives were also discussed.

  15. Smart Multiple Access Topologi Employing Intelligent Physical Layer for addressing the Mobile Node

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi

    2014-01-01

    of the mobile users, the cell size of the mobile network will shrink. Eventually, there will be an upsurge of signaling messages interchanged between the device and the network due to an increase in handover related operations. Attempt should be made to reduce the interaction with the network and simplify...... the mobility and location management related processes. In this thesis we set out a technical architecture of a mobile network to abridge the intricate mobility and location management processes as well as the addressing principle to render more operational efficiency and cater to the needs of the data hungry......, for example, addressing of a node. If we have a method to actuate user identification for the purpose of mobility management by implementing lower layer processes, we can simplify or eliminate the layer 7 processes and hence reduce the intricacy and costs of mobile network elements and user equipment...

  16. A Novel Algorithm for Flow-Rule Placement in SDN Switches

    DEFF Research Database (Denmark)

    Kentis, Angelos Mimidis; Pilimon, Artur; Soler, José

    2018-01-01

    power consumption and high silicon footprint. To counter this limitation, some commercial switches offer both, hardware and software flow table implementations, termed hybrid flow table architecture in this paper. The software-based tables are stored in non-TCAM memory modules, which offer higher...... flow rule should be placed in a hardware (expensive) or a software (cheap) table. The placement decisions are based on a number of criteria with the goal to increase the utilization of the software-based table, without introducing performance degradation in the network in terms of significant delay......The forwarding rules, used by the legacy and SDN network devices to perform routing/forwarding decisions, are generally stored in Ternary Content Addressable Memory (TCAM) modules, which offer constant look-up times, but have limited capacity, due to their high capital and operational costs, high...

  17. Reliability in automotive ethernet networks

    DEFF Research Database (Denmark)

    Soares, Fabio L.; Campelo, Divanilson R.; Yan, Ying

    2015-01-01

    This paper provides an overview of in-vehicle communication networks and addresses the challenges of providing reliability in automotive Ethernet in particular.......This paper provides an overview of in-vehicle communication networks and addresses the challenges of providing reliability in automotive Ethernet in particular....

  18. Flow whitelisting in SCADA networks

    DEFF Research Database (Denmark)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    and the Internet. This paper describes an approach for improving the security of SCADA networks using flow whitelisting. A flow whitelist describes legitimate traffic based on four properties of network packets: client address, server address, server-side port and transport protocol. The proposed approach...

  19. How Dynamic is the ISPs Address Space? Towards Internet-Wide DHCP Churn Estimation

    NARCIS (Netherlands)

    Moreira Moura, G.C.; Ganan, C.H.G.; Lone, Q.B.; Poursaied, P.; Asghari, H.; Van Eeten, M.J.G.

    2015-01-01

    IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of

  20. Address autoconfiguration in wireless ad hoc networks : Protocols and techniques

    NARCIS (Netherlands)

    Cempaka Wangi, N.I.; Prasad, R.V.; Jacobsson, M.; Niemegeers, I.

    2008-01-01

    With the advent of smaller devices having higher computational capacity and wireless communication capabilities, the world is becoming completely networked. Although, the mobile nature of these devices provides ubiquitous services, it also poses many challenges. In this article, we look in depth at

  1. Artificial Neural Networks for differential diagnosis of breast lesions in MR-Mammography: A systematic approach addressing the influence of network architecture on diagnostic performance using a large clinical database

    International Nuclear Information System (INIS)

    Dietzel, Matthias; Baltzer, Pascal A.T.; Dietzel, Andreas; Zoubi, Ramy; Gröschel, Tobias; Burmeister, Hartmut P.; Bogdan, Martin; Kaiser, Werner A.

    2012-01-01

    Rationale and objectives: Differential diagnosis of lesions in MR-Mammography (MRM) remains a complex task. The aim of this MRM study was to design and to test robustness of Artificial Neural Network architectures to predict malignancy using a large clinical database. Materials and methods: For this IRB-approved investigation standardized protocols and study design were applied (T1w-FLASH; 0.1 mmol/kgBW Gd-DTPA; T2w-TSE; histological verification after MRM). All lesions were evaluated by two experienced (>500 MRM) radiologists in consensus. In every lesion, 18 previously published descriptors were assessed and documented in the database. An Artificial Neural Network (ANN) was developed to process this database (The-MathWorks/Inc., feed-forward-architecture/resilient back-propagation-algorithm). All 18 descriptors were set as input variables, whereas histological results (malignant vs. benign) was defined as classification variable. Initially, the ANN was optimized in terms of “Training Epochs” (TE), “Hidden Layers” (HL), “Learning Rate” (LR) and “Neurons” (N). Robustness of the ANN was addressed by repeated evaluation cycles (n: 9) with receiver operating characteristics (ROC) analysis of the results applying 4-fold Cross Validation. The best network architecture was identified comparing the corresponding Area under the ROC curve (AUC). Results: Histopathology revealed 436 benign and 648 malignant lesions. Enhancing the level of complexity could not increase diagnostic accuracy of the network (P: n.s.). The optimized ANN architecture (TE: 20, HL: 1, N: 5, LR: 1.2) was accurate (mean-AUC 0.888; P: <0.001) and robust (CI: 0.885–0.892; range: 0.880–0.898). Conclusion: The optimized neural network showed robust performance and high diagnostic accuracy for prediction of malignancy on unknown data.

  2. Artificial Neural Networks for differential diagnosis of breast lesions in MR-Mammography: a systematic approach addressing the influence of network architecture on diagnostic performance using a large clinical database.

    Science.gov (United States)

    Dietzel, Matthias; Baltzer, Pascal A T; Dietzel, Andreas; Zoubi, Ramy; Gröschel, Tobias; Burmeister, Hartmut P; Bogdan, Martin; Kaiser, Werner A

    2012-07-01

    Differential diagnosis of lesions in MR-Mammography (MRM) remains a complex task. The aim of this MRM study was to design and to test robustness of Artificial Neural Network architectures to predict malignancy using a large clinical database. For this IRB-approved investigation standardized protocols and study design were applied (T1w-FLASH; 0.1 mmol/kgBW Gd-DTPA; T2w-TSE; histological verification after MRM). All lesions were evaluated by two experienced (>500 MRM) radiologists in consensus. In every lesion, 18 previously published descriptors were assessed and documented in the database. An Artificial Neural Network (ANN) was developed to process this database (The-MathWorks/Inc., feed-forward-architecture/resilient back-propagation-algorithm). All 18 descriptors were set as input variables, whereas histological results (malignant vs. benign) was defined as classification variable. Initially, the ANN was optimized in terms of "Training Epochs" (TE), "Hidden Layers" (HL), "Learning Rate" (LR) and "Neurons" (N). Robustness of the ANN was addressed by repeated evaluation cycles (n: 9) with receiver operating characteristics (ROC) analysis of the results applying 4-fold Cross Validation. The best network architecture was identified comparing the corresponding Area under the ROC curve (AUC). Histopathology revealed 436 benign and 648 malignant lesions. Enhancing the level of complexity could not increase diagnostic accuracy of the network (P: n.s.). The optimized ANN architecture (TE: 20, HL: 1, N: 5, LR: 1.2) was accurate (mean-AUC 0.888; P: <0.001) and robust (CI: 0.885-0.892; range: 0.880-0.898). The optimized neural network showed robust performance and high diagnostic accuracy for prediction of malignancy on unknown data. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  3. Inferring general relations between network characteristics from specific network ensembles.

    Science.gov (United States)

    Cardanobile, Stefano; Pernice, Volker; Deger, Moritz; Rotter, Stefan

    2012-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their ability to generate networks with large structural variability. In particular, we consider the statistical constraints which the respective construction scheme imposes on the generated networks. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This makes it possible to infer global features from local ones using regression models trained on networks with high generalization power. Our results confirm and extend previous findings regarding the synchronization properties of neural networks. Our method seems especially relevant for large networks, which are difficult to map completely, like the neural networks in the brain. The structure of such large networks cannot be fully sampled with the present technology. Our approach provides a method to estimate global properties of under-sampled networks in good approximation. Finally, we demonstrate on three different data sets (C. elegans neuronal network, R. prowazekii metabolic network, and a network of synonyms extracted from Roget's Thesaurus) that real-world networks have statistical relations compatible with those obtained using regression models.

  4. Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking

    Science.gov (United States)

    2016-11-01

    Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory...performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are...devices, and the ad-hoc nature of the network . Group Centric Networking (GCN) is a proposed networking protocol that addresses challenges specific to

  5. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  6. Innovation in Multiple Networks and Networks of Networks: The Case of the Fruit Sector in Emilia‐Romagna

    Directory of Open Access Journals (Sweden)

    Davide Viaggi

    2013-02-01

    Full Text Available In the paper we examine the issue of food systems in which farms participate in multiple networks that, for their part, tend also to be members of networks of networks. The issue is addressed through a descriptive analysis of the fruit sector in Emilia‐Romagna (Italy. The farms in the area tend to join a different network for each product/product type. Innovation networks are embedded in commercialization or input provider networks, but separate (parallel networks also exist, particularly for basic research activities. Networks of networks are largely a product of the cooperative system. The paper concludes by emphasising the need for further research in multiple networking strategies and the connection betweencommercialisation networks and innovation.

  7. S-curve networks and an approximate method for estimating degree distributions of complex networks

    OpenAIRE

    Guo, Jin-Li

    2010-01-01

    In the study of complex networks almost all theoretical models have the property of infinite growth, but the size of actual networks is finite. According to statistics from the China Internet IPv4 (Internet Protocol version 4) addresses, this paper proposes a forecasting model by using S curve (Logistic curve). The growing trend of IPv4 addresses in China is forecasted. There are some reference value for optimizing the distribution of IPv4 address resource and the development of IPv6. Based o...

  8. Public management and policy networks: foundations of a network approach to governance

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)

    2006-01-01

    markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy

  9. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  10. Semaphore network encryption report

    Science.gov (United States)

    Johnson, Karen L.

    1994-03-01

    This paper documents the results of a preliminary assessment performed on the commercial off-the-shelf (COTS) Semaphore Communications Corporation (SCC) Network Security System (NSS). The Semaphore NSS is a family of products designed to address important network security concerns, such as network source address authentication and data privacy. The assessment was performed in the INFOSEC Core Integration Laboratory, and its scope was product usability focusing on interoperability and system performance in an existing operational network. Included in this paper are preliminary findings. Fundamental features and functionality of the Semaphore NSS are identified, followed by details of the assessment, including test descriptions and results. A summary of test results and future plans are also included. These findings will be useful to those investigating the use of commercially available solutions to network authentication and data privacy.

  11. Exploiting Rating Abstention Intervals for Addressing Concept Drift in Social Network Recommender Systems

    Directory of Open Access Journals (Sweden)

    Dionisis Margaris

    2018-04-01

    Full Text Available One of the major problems that social networks face is the continuous production of successful, user-targeted information in the form of recommendations, which are produced exploiting technology from the field of recommender systems. Recommender systems are based on information about users’ past behavior to formulate recommendations about their future actions. However, as time goes by, social network users may change preferences and likings: they may like different types of clothes, listen to different singers or even different genres of music and so on. This phenomenon has been termed as concept drift. In this paper: (1 we establish that when a social network user abstains from rating submission for a long time, it is a strong indication that concept drift has occurred and (2 we present a technique that exploits the abstention interval concept, to drop from the database ratings that do not reflect the current social network user’s interests, thus improving prediction quality.

  12. Privacy Breach Analysis in Social Networks

    Science.gov (United States)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  13. Machine-to-Machine networks: integration of M2M networks into companies' administrative networks

    OpenAIRE

    Pointereau, Romain

    2013-01-01

    This analysis will address the technical, economic and regulatory aspects and will identify the position taken by the various market actors. Integration of M2M Networks into Companies' Administrative Networks. Integración de redes M2M en redes administrativas de las empresas. Integració de xarxes M2M en xarxes administratives de les empreses.

  14. Hardware-Efficient On-line Learning through Pipelined Truncated-Error Backpropagation in Binary-State Networks

    Directory of Open Access Journals (Sweden)

    Hesham Mostafa

    2017-09-01

    Full Text Available Artificial neural networks (ANNs trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks. Significant effort has been devoted to developing custom silicon devices to accelerate inference in ANNs. Accelerating the training phase, however, has attracted relatively little attention. In this paper, we describe a hardware-efficient on-line learning technique for feedforward multi-layer ANNs that is based on pipelined backpropagation. Learning is performed in parallel with inference in the forward pass, removing the need for an explicit backward pass and requiring no extra weight lookup. By using binary state variables in the feedforward network and ternary errors in truncated-error backpropagation, the need for any multiplications in the forward and backward passes is removed, and memory requirements for the pipelining are drastically reduced. Further reduction in addition operations owing to the sparsity in the forward neural and backpropagating error signal paths contributes to highly efficient hardware implementation. For proof-of-concept validation, we demonstrate on-line learning of MNIST handwritten digit classification on a Spartan 6 FPGA interfacing with an external 1Gb DDR2 DRAM, that shows small degradation in test error performance compared to an equivalently sized binary ANN trained off-line using standard back-propagation and exact errors. Our results highlight an attractive synergy between pipelined backpropagation and binary-state networks in substantially reducing computation and memory requirements, making pipelined on-line learning practical in deep networks.

  15. Hardware-Efficient On-line Learning through Pipelined Truncated-Error Backpropagation in Binary-State Networks.

    Science.gov (United States)

    Mostafa, Hesham; Pedroni, Bruno; Sheik, Sadique; Cauwenberghs, Gert

    2017-01-01

    Artificial neural networks (ANNs) trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks. Significant effort has been devoted to developing custom silicon devices to accelerate inference in ANNs. Accelerating the training phase, however, has attracted relatively little attention. In this paper, we describe a hardware-efficient on-line learning technique for feedforward multi-layer ANNs that is based on pipelined backpropagation. Learning is performed in parallel with inference in the forward pass, removing the need for an explicit backward pass and requiring no extra weight lookup. By using binary state variables in the feedforward network and ternary errors in truncated-error backpropagation, the need for any multiplications in the forward and backward passes is removed, and memory requirements for the pipelining are drastically reduced. Further reduction in addition operations owing to the sparsity in the forward neural and backpropagating error signal paths contributes to highly efficient hardware implementation. For proof-of-concept validation, we demonstrate on-line learning of MNIST handwritten digit classification on a Spartan 6 FPGA interfacing with an external 1Gb DDR2 DRAM, that shows small degradation in test error performance compared to an equivalently sized binary ANN trained off-line using standard back-propagation and exact errors. Our results highlight an attractive synergy between pipelined backpropagation and binary-state networks in substantially reducing computation and memory requirements, making pipelined on-line learning practical in deep networks.

  16. Creative Coercion in Post-Katrina New Orleans: a Neighborhood Strategy to Address Conflict in Networks

    Directory of Open Access Journals (Sweden)

    Stephen Danley

    2015-03-01

    Full Text Available The study of relationships within networks has traditionally focused on concepts such as cooperation, collaboration and other forms of partnership (Brown & Keast 2003. The assumption has been that actors in a network have shared vision and are working together. This study tests that idea by using mixed methods and ethnography to examine 15 neighborhood associations in post-Katrina New Orleans, and 71 of their relationships within policy networks. Contrary to our typical understanding of networks, neighborhood associations engage not just in partnership, but also in power struggles. When excluded from policy networks, neighborhood associations use creative coercion to ensure their voice is heard. Facing a power deficit, these associations look for informal levers to assert themselves into policy negotiation. The result is creative and coercive measures, such as co-opting elections, bribery, blackmail and what one neighborhood activist calls ‘guerrilla warfare.’ These conflicts force a reconsideration of networks. Networks are not solely homes of collaborative action; they are also the location of sharp power struggles over priorities.

  17. Game theory in communication networks cooperative resolution of interactive networking scenarios

    CERN Document Server

    Antoniou, Josephina

    2012-01-01

    A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game T

  18. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  19. S-curve networks and an approximate method for estimating degree distributions of complex networks

    Science.gov (United States)

    Guo, Jin-Li

    2010-12-01

    In the study of complex networks almost all theoretical models have the property of infinite growth, but the size of actual networks is finite. According to statistics from the China Internet IPv4 (Internet Protocol version 4) addresses, this paper proposes a forecasting model by using S curve (logistic curve). The growing trend of IPv4 addresses in China is forecasted. There are some reference values for optimizing the distribution of IPv4 address resource and the development of IPv6. Based on the laws of IPv4 growth, that is, the bulk growth and the finitely growing limit, it proposes a finite network model with a bulk growth. The model is said to be an S-curve network. Analysis demonstrates that the analytic method based on uniform distributions (i.e., Barabási-Albert method) is not suitable for the network. It develops an approximate method to predict the growth dynamics of the individual nodes, and uses this to calculate analytically the degree distribution and the scaling exponents. The analytical result agrees with the simulation well, obeying an approximately power-law form. This method can overcome a shortcoming of Barabási-Albert method commonly used in current network research.

  20. S-curve networks and an approximate method for estimating degree distributions of complex networks

    International Nuclear Information System (INIS)

    Guo Jin-Li

    2010-01-01

    In the study of complex networks almost all theoretical models have the property of infinite growth, but the size of actual networks is finite. According to statistics from the China Internet IPv4 (Internet Protocol version 4) addresses, this paper proposes a forecasting model by using S curve (logistic curve). The growing trend of IPv4 addresses in China is forecasted. There are some reference values for optimizing the distribution of IPv4 address resource and the development of IPv6. Based on the laws of IPv4 growth, that is, the bulk growth and the finitely growing limit, it proposes a finite network model with a bulk growth. The model is said to be an S-curve network. Analysis demonstrates that the analytic method based on uniform distributions (i.e., Barabási-Albert method) is not suitable for the network. It develops an approximate method to predict the growth dynamics of the individual nodes, and uses this to calculate analytically the degree distribution and the scaling exponents. The analytical result agrees with the simulation well, obeying an approximately power-law form. This method can overcome a shortcoming of Barabási-Albert method commonly used in current network research. (general)

  1. Dynamic defense and network randomization for computer systems

    Science.gov (United States)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.; Lee, Erik James; Martin, Mitchell Tyler

    2018-05-29

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissance stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.

  2. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  3. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  4. Recall Performance for Content-Addressable Memory Using Adiabatic Quantum Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Imam, Neena [ORNL; Humble, Travis S. [ORNL; McCaskey, Alex [ORNL; Schrock, Jonathan [ORNL; Hamilton, Kathleen E. [ORNL

    2017-09-01

    A content-addressable memory (CAM) stores key-value associations such that the key is recalled by providing its associated value. While CAM recall is traditionally performed using recurrent neural network models, we show how to solve this problem using adiabatic quantum optimization. Our approach maps the recurrent neural network to a commercially available quantum processing unit by taking advantage of the common underlying Ising spin model. We then assess the accuracy of the quantum processor to store key-value associations by quantifying recall performance against an ensemble of problem sets. We observe that different learning rules from the neural network community influence recall accuracy but performance appears to be limited by potential noise in the processor. The strong connection established between quantum processors and neural network problems supports the growing intersection of these two ideas.

  5. Efficient hash tables for network applications.

    Science.gov (United States)

    Zink, Thomas; Waldvogel, Marcel

    2015-01-01

    Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical.

  6. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  7. Advanced communication and network requirements in Europe

    DEFF Research Database (Denmark)

    Falch, Morten; Enemark, Rasmus

    The report address diffusion of new tele-application, focusing on potential use and potential tele-trafic genrated as a consequense. The applications investigated are: Teleworking, distance learning, research and university network, applications aimed at SMEs, health networks, a trans European pu...... public administation network, city information highway, road-trafic manegement, air traffic control and electronic quotation.......The report address diffusion of new tele-application, focusing on potential use and potential tele-trafic genrated as a consequense. The applications investigated are: Teleworking, distance learning, research and university network, applications aimed at SMEs, health networks, a trans European...

  8. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  9. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  10. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  11. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  12. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  13. Network survivability performance

    Science.gov (United States)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  14. Activities to Address Challenges in Digital Innovation

    OpenAIRE

    Lund , Jesper

    2014-01-01

    Part 3: Structures and Networks; International audience; Based on a literature review, this paper identifies four socio-technical challenges relating to innovation actor’s interactions in digital innovation. Furthermore, the paper explores how these challenges can be addressed. The challenges are investigated in a case study of digital innovation. The study is based on a two year long research and development project where an e-newspaper concept and a demonstrator based on e-paper technology ...

  15. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  16. Policy issues in interconnecting networks

    Science.gov (United States)

    Leiner, Barry M.

    1989-01-01

    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented.

  17. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  18. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  19. In-Network Adaptation of Video Streams Using Network Processors

    Directory of Open Access Journals (Sweden)

    Mohammad Shorfuzzaman

    2009-01-01

    problem can be addressed, near the network edge, by applying dynamic, in-network adaptation (e.g., transcoding of video streams to meet available connection bandwidth, machine characteristics, and client preferences. In this paper, we extrapolate from earlier work of Shorfuzzaman et al. 2006 in which we implemented and assessed an MPEG-1 transcoding system on the Intel IXP1200 network processor to consider the feasibility of in-network transcoding for other video formats and network processor architectures. The use of “on-the-fly” video adaptation near the edge of the network offers the promise of simpler support for a wide range of end devices with different display, and so forth, characteristics that can be used in different types of environments.

  20. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2012-01-01

    Production, innovation and service networks of companies all over the world become increasingly decentralised, specialised and interdependent. These three characteristics combined inevitably lead to the formation of complex configurations of resources, crossing both national and organisational...... borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gaps between these networks mean that coordinating them and managing their interfaces in a global operations context...... are becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about the development and organisation of these networks. The paper highlights the critical importance of engineering operations in this process. The propositions are developed...

  1. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2011-01-01

    is becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about how companies can organize these networks and coordinate between them effectively. The propositions are developed by employing the design science approach based on a literature......Production, innovation and service networks of companies all over the world become increasingly decentralized, specialized and interdependent. The three characteristics combined inevitably lead to the formation of complex configurations of assets and capabilities crossing both national...... and organisational borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that coordinating them and managing their interfaces in global operations context...

  2. Mobile data offloading addressing the service quality vs. resource utilisation dilemma

    OpenAIRE

    Whittier, Alicia; Kulkarni, Parag; Cao, Fengming; Armour, Simon

    2016-01-01

    Mobile operators are integrating WiFi into their cellular networks as a way to address the issue of mobile data deluge. Although prominently used for its high data rates and unlicensed frequency band of operation, WiFi's contention based medium access does not guarantee that a user's quality of service will necessarily be met, especially if mobile devices simply `offload' to WiFi in preference to cellular. A network selection algorithm offers a way to enhance user experience, by always select...

  3. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  4. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  5. Comparison of Landsat 8 OLI and Landsat 7 ETM+ for estimating grassland LAI using model inversion and spectral indices: case study of Mpumalanga, South Africa

    CSIR Research Space (South Africa)

    Masemola, Cecilia

    2016-06-01

    Full Text Available the radiative transfer model (RTM) and spectral indices approaches for estimating LAI on rangeland systems in South Africa. The RTM was inverted using artificial neural network (ANN) and lookup table (LUT) algorithms. The accuracy of the models was higher...

  6. A Cross Layer Solution to Address TCP Intra-flow Performance Degradation in Multihop Ad hoc Networks

    OpenAIRE

    Rakocevic, V.; Hamadani, E.

    2008-01-01

    Incorporating the concept of TCP end-to-end congestion control for wireless networks is one of the primary concerns in designing ad hoc networks since TCP was primarily designed and optimized based on the assumptions for wired networks. In this study, our interest lies on tackling the TCP instability and in particular intra-flow instability problem since due to the nature of applications in multihop ad hoc networks, connection instability or starvation even for a short period of time can have...

  7. Network bursts in cortical neuronal cultures: 'noise - versus pacemaker'- driven neural network simulations

    NARCIS (Netherlands)

    Gritsun, T.; Stegenga, J.; le Feber, Jakob; Rutten, Wim

    2009-01-01

    In this paper we address the issue of spontaneous bursting activity in cortical neuronal cultures and explain what might cause this collective behavior using computer simulations of two different neural network models. While the common approach to acivate a passive network is done by introducing

  8. Three-directional motion-compensation mask-based novel look-up table on graphics processing units for video-rate generation of digital holographic videos of three-dimensional scenes.

    Science.gov (United States)

    Kwon, Min-Woo; Kim, Seung-Cheol; Kim, Eun-Soo

    2016-01-20

    A three-directional motion-compensation mask-based novel look-up table method is proposed and implemented on graphics processing units (GPUs) for video-rate generation of digital holographic videos of three-dimensional (3D) scenes. Since the proposed method is designed to be well matched with the software and memory structures of GPUs, the number of compute-unified-device-architecture kernel function calls can be significantly reduced. This results in a great increase of the computational speed of the proposed method, allowing video-rate generation of the computer-generated hologram (CGH) patterns of 3D scenes. Experimental results reveal that the proposed method can generate 39.8 frames of Fresnel CGH patterns with 1920×1080 pixels per second for the test 3D video scenario with 12,088 object points on dual GPU boards of NVIDIA GTX TITANs, and they confirm the feasibility of the proposed method in the practical application fields of electroholographic 3D displays.

  9. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  10. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  11. Network topology mapper

    Science.gov (United States)

    Quist, Daniel A [Los Alamos, NM; Gavrilov, Eugene M [Los Alamos, NM; Fisk, Michael E [Jemez, NM

    2008-01-15

    A method enables the topology of an acyclic fully propagated network to be discovered. A list of switches that comprise the network is formed and the MAC address cache for each one of the switches is determined. For each pair of switches, from the MAC address caches the remaining switches that see the pair of switches are located. For each pair of switches the remaining switches are determined that see one of the pair of switches on a first port and the second one of the pair of switches on a second port. A list of insiders is formed for every pair of switches. It is determined whether the insider for each pair of switches is a graph edge and adjacent ones of the graph edges are determined. A symmetric adjacency matrix is formed from the graph edges to represent the topology of the data link network.

  12. The Standardization Method of Address Information for POIs from Internet Based on Positional Relation

    Directory of Open Access Journals (Sweden)

    WANG Yong

    2016-05-01

    Full Text Available As points of interest (POIon the internet, exists widely incomplete addresses and inconsistent literal expressions, a fast standardization processing method of network POIs address information based on spatial constraints was proposed. Based on the model of the extensible address expression, first of all, address information of POI was segmented and extracted. Address elements are updated by means of matching with the address tree layer by layer. Then, by defining four types of positional relations, corresponding set are selected from standard POI library as candidate for enrichment and amendment of non-standard address. At last, the fast standardized processing of POI address information was achieved with the help of backtracking address elements with minimum granularity. Experiments in this paper proved that the standardization processing of an address can be realized by means of this method with higher accuracy in order to build the address database.

  13. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  14. Can Health 2.0 Address Critical Healthcare Challenges? Insights from the Case of How Online Social Networks Can Assist in Combatting the Obesity Epidemic

    Directory of Open Access Journals (Sweden)

    Janine Hacker

    2017-03-01

    Full Text Available One of the serious concerns in healthcare in this 21st century is obesity. While the causes of obesity are multifaceted, social networks have been identified as one of the most important dimensions of people's social environment that may influence the adoption of many behaviours, including health-promoting behaviours. In this article, we examine the possibility of harnessing the appeal of online social networks to address the obesity epidemic currently plaguing society. Specifically, a design science research methodology is adopted to design, implement and test the Health 2.0 application called “Calorie Cruncher”. The application is designed specifically to explore the influence of online social networks on individual’s health-related behaviour. In this regard, pilot data collected based on qualitative interviews indicate that online social networks may influence health-related behaviours in several ways. Firstly, they can influence people’s norms and value system that have an impact on their health-related behaviours. Secondly, social control and pressure of social connections may also shape health-related behaviours, and operate implicitly when people make food selection decisions. Thirdly, social relationships may provide emotional support. Our study has implications for research and practice. From a theoretical perspective, the article inductively identifies three factors that influence specific types of health outcomes in the context of obesity. From a practical perspective, the study underscores the benefits of adopting a design science methodology to design and implement a technology solution for a healthcare issue as well as the key role for online social media to assist with health and wellness management and maintenance.

  15. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  16. Cluster emergence and network evolution A longitudinal analysis of the inventor network in Sophia-Antipolis

    OpenAIRE

    Anne L. J. ter Wal

    2008-01-01

    Abstract It is increasingly acknowledged that clusters do not necessarily exhibit networks of local collective learning. This paper addresses the question under which conditions this is the case. Through a longitudinal case study of the business park Sophia-Antipolis it investigates how networks of collective learning emerged throughout the growth of the cluster. Network reconstruction with patent data shows that an innovation network emerged only in Information Technology, in whic...

  17. GA(2)LEN (Global Allergy and Asthma European Network) addresses the allergy and asthma 'epidemic'

    NARCIS (Netherlands)

    Bousquet, J.; Burney, P. G.; Zuberbier, T.; Cauwenberge, P. V.; Akdis, C. A.; Bindslev-Jensen, C.; Bonini, S.; Fokkens, W. J.; Kauffmann, F.; Kowalski, M. L.; Lodrup-Carlsen, K.; Mullol, J.; Nizankowska-Mogilnicka, E.; Papadopoulos, N.; Toskala, E.; Wickman, M.; Anto, J.; Auvergne, N.; Bachert, C.; Bousquet, P. J.; Brunekreef, B.; Canonica, G. W.; Carlsen, K. H.; Gjomarkaj, M.; Haahtela, T.; Howarth, P.; Lenzen, G.; Lotvall, J.; Radon, K.; Ring, J.; Salapatas, M.; Schünemann, H. J.; Szczecklik, A.; Todo-Bom, A.; Valovirta, E.; von Mutius, E.; Zock, J. P.

    2009-01-01

    Allergic diseases represent a major health problem in Europe. They are increasing in prevalence, severity and costs. The Global Allergy and Asthma European Network (GA(2)LEN), a Sixth EU Framework Program for Research and Technological Development (FP6) Network of Excellence, was created in 2005 as

  18. Network survivability performance (computer diskette)

    Science.gov (United States)

    1993-11-01

    File characteristics: Data file; 1 file. Physical description: 1 computer diskette; 3 1/2 in.; high density; 2.0MB. System requirements: Mac; Word. This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunication networks to user expectations for network survivability.

  19. Mobile network architecture of the long-range WindScanner system

    OpenAIRE

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per; Jensen, Henrik M.

    2016-01-01

    In this report we have presented the network architecture of the long-range WindScanner system that allows utilization of mobile network connections without the use of static public IP addresses. The architecture mitigates the issues of additional fees and contractual obligations that are linked to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki...

  20. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  1. To address surface reaction network complexity using scaling relations machine learning and DFT calculations

    International Nuclear Information System (INIS)

    Ulissi, Zachary W.; Medford, Andrew J.; Bligaard, Thomas; Nørskov, Jens K.

    2017-01-01

    Surface reaction networks involving hydrocarbons exhibit enormous complexity with thousands of species and reactions for all but the very simplest of chemistries. We present a framework for optimization under uncertainty for heterogeneous catalysis reaction networks using surrogate models that are trained on the fly. The surrogate model is constructed by teaching a Gaussian process adsorption energies based on group additivity fingerprints, combined with transition-state scaling relations and a simple classifier for determining the rate-limiting step. The surrogate model is iteratively used to predict the most important reaction step to be calculated explicitly with computationally demanding electronic structure theory. Applying these methods to the reaction of syngas on rhodium(111), we identify the most likely reaction mechanism. Lastly, propagating uncertainty throughout this process yields the likelihood that the final mechanism is complete given measurements on only a subset of the entire network and uncertainty in the underlying density functional theory calculations.

  2. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  3. SU-E-T-275: Dose Verification in a Small Animal Image-Guided Radiation Therapy X-Ray Machine: A Dose Comparison between TG-61 Based Look-Up Table and MOSFET Method for Various Collimator Sizes.

    Science.gov (United States)

    Rodrigues, A; Nguyen, G; Li, Y; Roy Choudhury, K; Kirsch, D; Das, S; Yoshizumi, T

    2012-06-01

    To verify the accuracy of TG-61 based dosimetry with MOSFET technology using a tissue-equivalent mouse phantom. Accuracy of mouse dose between a TG-61 based look-up table was verified with MOSFET technology. The look-up table followed a TG-61 based commissioning and used a solid water block and radiochromic film. A tissue-equivalent mouse phantom (2 cm diameter, 8 cm length) was used for the MOSFET method. Detectors were placed in the phantom at the head and center of the body. MOSFETs were calibrated in air with an ion chamber and f-factor was applied to derive the dose to tissue. In CBCT mode, the phantom was positioned such that the system isocenter coincided with the center of the MOSFET with the active volume perpendicular to the beam. The absorbed dose was measured three times for seven different collimators, respectively. The exposure parameters were 225 kVp, 13 mA, and an exposure time of 20 s. For a 10 mm, 15 mm, and 20 mm circular collimator, the dose measured by the phantom was 4.3%, 2.7%, and 6% lower than TG-61 based measurements, respectively. For a 10 × 10 mm, 20 × 20 mm, and 40 × 40 mm collimator, the dose difference was 4.7%, 7.7%, and 2.9%, respectively. The MOSFET data was systematically lower than the commissioning data. The dose difference is due to the increased scatter radiation in the solid water block versus the dimension of the mouse phantom leading to an overestimation of the actual dose in the solid water block. The MOSFET method with the use of a tissue- equivalent mouse phantom provides less labor intensive geometry-specific dosimetry and accuracy with better dose tolerances of up to ± 2.7%. © 2012 American Association of Physicists in Medicine.

  4. Online Expansion Technology for Dynamic Topology Changing ZigBee Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Md. Emdadul Haque

    2014-03-01

    Full Text Available In ZigBee, the router capable devices have restriction to accept a number of devices as children devices. A router capable device can not allow any new device to join as a child device if it reaches to the maximum capacity of children or depth limit. According to ZigBee specification each device has a permanent 64-bit MAC address. If a device joins a ZigBee network, it receives a short 16-bit MAC address from the parent device. If a device can not join a network, it isolates from the network and becomes an orphan node even though address spaces are available in the network. The orphan problem becomes worse when the topology of the network changes dynamically. In this paper we propose an online expansion technology to connect the maximum number of devices specially for dynamic topology changing ZigBee wireless sensor networks. The proposed technology shares available address spaces of the router devices to reduce the number of orphan nodes in the network.

  5. Analyzing Evolving Social Network 2 (EVOLVE2)

    Science.gov (United States)

    2015-04-01

    WORK UNIT NUMBER N2 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) University of Southern California 3720 S. Flower Street, Third Floor Los...score, and resource allocation. Below the double line are link prediction heuristics introduced in this paper. name symbol definition common neighbors...LIST OF SYMBOLS , ABBREVIATIONS AND ACRONYMS A adjacency matrix of a network D diagonal out-degree matrix DW out-degree matrix of the reweighted network

  6. Computer network time synchronization the network time protocol on earth and in space

    CERN Document Server

    Mills, David L

    2010-01-01

    Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields-from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure of time dissemination, distrib

  7. Bayesian networks and food security - An introduction

    NARCIS (Netherlands)

    Stein, A.

    2004-01-01

    This paper gives an introduction to Bayesian networks. Networks are defined and put into a Bayesian context. Directed acyclical graphs play a crucial role here. Two simple examples from food security are addressed. Possible uses of Bayesian networks for implementation and further use in decision

  8. Counting addressing method: Command addressable element and extinguishing module

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2009-01-01

    Full Text Available The specific requirements that appear in addressable fire detection and alarm systems and the shortcomings of the existing addressing methods were discussed. A new method of addressing of detectors was proposed. The basic principles of addressing and responding of a called element are stated. Extinguishing module is specific subsystem in classic fire detection and alarm systems. Appearing of addressable fire detection and alarm systems didn't caused essential change in the concept of extinguishing module because of long calling period of such systems. Addressable fire security system based on counting addressing method reaches high calling rates and enables integrating of the extinguishing module in addressable system. Solutions for command addressable element and integrated extinguishing module are given in this paper. The counting addressing method was developed for specific requirements in fire detection and alarm systems, yet its speed and reliability justifies its use in the acquisition of data on slowly variable parameters under industrial conditions. .

  9. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  10. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  11. NKS - The Nordic region's cooperative network for addressing challenges in nuclear safety and emergency preparedness

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, K.G. [NKS/Technical University of Denmark (Denmark); Andgren, K. [NKS/Vattenfall R and D (Sweden); Leino, K. [NKS/Fortum Power and Heat Oy (Finland); Magnusson, S. [NKS/Icelandic Radiation Safety Authority (Iceland); Physant, F. [NKS/FRIT, Roskilde (Denmark)

    2014-07-01

    Based on the foundation of a common cultural and historical heritage and a long tradition of collaboration, NKS aims to facilitate a common Nordic view on nuclear and radiation safety. A common understanding of rules, practice and measures, and national differences in this context, is here an essential requirement. Problems can generally be tackled quicker, more efficiently, more consistently and at a lower cost through collaboration, bearing in mind that key competencies are not equally distributed in the different Nordic countries. For instance common Nordic challenges emerge in relation to nuclear installations, where nuclear power plants are in operation in Finland and Sweden, and research reactors have been operated in Denmark, Finland, Norway and Sweden. There is an obvious benefit in exchanging ideas and technologies in relation to plant operation, and since a number of reactors in different Nordic countries are under decommissioning, a collaborative benefit can also be realised in that context. Sweden also has a nuclear fuel production plant, and its collaboration with other Nordic nuclear installations can also be beneficial. Further, a number of large radiological installations are projected in Nordic areas (e.g., the MAX-LAB/MAX IV synchrotron radiation source and the European spallation source ESS), where Nordic organisations are collaborating in addressing, e.g., potential environmental implications. On the emergency preparedness side, the Fukushima accident in March 2011 was a reminder that large accidents at nuclear installations can lead to widespread radioactive contamination in the environment. In order to respond to nuclear or radiological emergencies, should they affect Nordic populations, it is necessary to maintain an operational emergency preparedness. By continuously improving detection, response and decision aiding tools while maintaining an informal collaborative network between relevant stakeholders in the Nordic countries (including

  12. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  13. A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Barbara Martini

    2016-06-01

    Full Text Available Emerging technologies such as Software-Defined Networks (SDN and Network Function Virtualization (NFV promise to address cost reduction and flexibility in network operation while enabling innovative network service delivery models. However, operational network service delivery solutions still need to be developed that actually exploit these technologies, especially at the multi-provider level. Indeed, the implementation of network functions as software running over a virtualized infrastructure and provisioned on a service basis let one envisage an ecosystem of network services that are dynamically and flexibly assembled by orchestrating Virtual Network Functions even across different provider domains, thereby coping with changeable user and service requirements and context conditions. In this paper we propose an approach that adopts Service-Oriented Architecture (SOA technology-agnostic architectural guidelines in the design of a solution for orchestrating and dynamically chaining Virtual Network Functions. We discuss how SOA, NFV, and SDN may complement each other in realizing dynamic network function chaining through service composition specification, service selection, service delivery, and placement tasks. Then, we describe the architecture of a SOA-inspired NFV orchestrator, which leverages SDN-based network control capabilities to address an effective delivery of elastic chains of Virtual Network Functions. Preliminary results of prototype implementation and testing activities are also presented. The benefits for Network Service Providers are also described that derive from the adaptive network service provisioning in a multi-provider environment through the orchestration of computing and networking services to provide end users with an enhanced service experience.

  14. I/O routing in a multidimensional torus network

    Science.gov (United States)

    Chen, Dong; Eisley, Noel A.; Heidelberger, Philip

    2018-04-24

    A method, system and computer program product are disclosed for routing data packet in a computing system comprising a multidimensional torus compute node network including a multitude of compute nodes, and an I/O node network including a plurality of I/O nodes. In one embodiment, the method comprises assigning to each of the data packets a destination address identifying one of the compute nodes; providing each of the data packets with a toio value; routing the data packets through the compute node network to the destination addresses of the data packets; and when each of the data packets reaches the destination address assigned to said each data packet, routing said each data packet to one of the I/O nodes if the toio value of said each data packet is a specified value. In one embodiment, each of the data packets is also provided with an ioreturn value used to route the data packets through the compute node network.

  15. Picture this: Managed change and resistance in business network settings

    DEFF Research Database (Denmark)

    Kragh, Hanne; Andersen, Poul Houman

    2009-01-01

    This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...

  16. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  17. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  18. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  19. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  20. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  1. Global Operations Networks in Motion

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Wæhrens, Brian Vejrum

    2009-01-01

    This paper addresses the phenomenon of global operations networks and how they change over time. The paper is based on the cases of three Danish companies and their global operations networks. It finds a number of common patterns highlighting some organisational effects and managerial challenges...... the companies face regarding rapid changes in their networks configurations and capabilities. The paper details the variables determining these changes and suggests how the on-going interplay between the focal organisation, its network partners, and their various contextual conditions can be approached....

  2. Network management, status and directions

    International Nuclear Information System (INIS)

    Cottrell, R.L.A.; Streater, T.C.

    1992-09-01

    It has been said that the ''network is the system''. This implies providing levels of service, reliability, predictability and availability that are commensurate with or better than those that individual computers provide today. To provide this requires integrated network management for interconnected networks of heterogeneous devices covering both the local campus and across the world and spanning many administrative domains. This talk will review the status of existing tools to address management for networks. It draws on experience from both within and outside the HEP community

  3. Networking activities in technology-based entrepreneurial teams

    DEFF Research Database (Denmark)

    Neergaard, Helle

    2005-01-01

    Based on social network theoy, this article investigates the distribution of networking roles and responsibilities in entrepreneurial founding teams. Its focus is on the team as a collection of individuals, thus allowing the research to address differences in networking patterns. It identifies six...... central networking activities and shows that not all founding team members are equally active 'networkers'. The analyses show that team members prioritize different networking activities and that one member in particular has extensive networking activities whereas other memebrs of the team are more...

  4. Querying Large Biological Network Datasets

    Science.gov (United States)

    Gulsoy, Gunhan

    2013-01-01

    New experimental methods has resulted in increasing amount of genetic interaction data to be generated every day. Biological networks are used to store genetic interaction data gathered. Increasing amount of data available requires fast large scale analysis methods. Therefore, we address the problem of querying large biological network datasets.…

  5. Static and mobile networks design for atmospheric accidental releases monitoring

    International Nuclear Information System (INIS)

    Abida, R.

    2010-01-01

    The global context of my PhD thesis work is the optimization of air pollution monitoring networks, but more specifically it concerns the monitoring of accidental releases of radionuclides in air. The optimization problem of air quality measuring networks has been addresses in the literature. However, it has not been addresses in the context of surveillance of accidental atmospheric releases. The first part of my thesis addresses the optimization of a permanent network of monitoring of radioactive aerosols in the air, covering France. The second part concerns the problem of targeting of observations in case of an accidental release of radionuclides from a nuclear plant. (author)

  6. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  7. On the Relevance of Using Bayesian Belief Networks in Wireless Sensor Networks Situation Recognition

    Directory of Open Access Journals (Sweden)

    Marco Zennaro

    2010-12-01

    Full Text Available Achieving situation recognition in ubiquitous sensor networks (USNs is an important issue that has been poorly addressed by both the research and practitioner communities. This paper describes some steps taken to address this issue by effecting USN middleware intelligence using an emerging situation awareness (ESA technology. We propose a situation recognition framework where temporal probabilistic reasoning is used to derive and emerge situation awareness in ubiquitous sensor networks. Using data collected from an outdoor environment monitoring in the city of Cape Town, we illustrate the use of the ESA technology in terms of sensor system operating conditions and environmental situation recognition.

  8. Address-event-based platform for bioinspired spiking systems

    Science.gov (United States)

    Jiménez-Fernández, A.; Luján, C. D.; Linares-Barranco, A.; Gómez-Rodríguez, F.; Rivas, M.; Jiménez, G.; Civit, A.

    2007-05-01

    Address Event Representation (AER) is an emergent neuromorphic interchip communication protocol that allows a real-time virtual massive connectivity between huge number neurons, located on different chips. By exploiting high speed digital communication circuits (with nano-seconds timings), synaptic neural connections can be time multiplexed, while neural activity signals (with mili-seconds timings) are sampled at low frequencies. Also, neurons generate "events" according to their activity levels. More active neurons generate more events per unit time, and access the interchip communication channel more frequently, while neurons with low activity consume less communication bandwidth. When building multi-chip muti-layered AER systems, it is absolutely necessary to have a computer interface that allows (a) reading AER interchip traffic into the computer and visualizing it on the screen, and (b) converting conventional frame-based video stream in the computer into AER and injecting it at some point of the AER structure. This is necessary for test and debugging of complex AER systems. In the other hand, the use of a commercial personal computer implies to depend on software tools and operating systems that can make the system slower and un-robust. This paper addresses the problem of communicating several AER based chips to compose a powerful processing system. The problem was discussed in the Neuromorphic Engineering Workshop of 2006. The platform is based basically on an embedded computer, a powerful FPGA and serial links, to make the system faster and be stand alone (independent from a PC). A new platform is presented that allow to connect up to eight AER based chips to a Spartan 3 4000 FPGA. The FPGA is responsible of the network communication based in Address-Event and, at the same time, to map and transform the address space of the traffic to implement a pre-processing. A MMU microprocessor (Intel XScale 400MHz Gumstix Connex computer) is also connected to the FPGA

  9. ALI (Autonomous Lunar Investigator): Revolutionary Approach to Exploring the Moon with Addressable Reconfigurable Technology

    Science.gov (United States)

    Clark, P. E.; Curtis, S. A.; Rilee, M. L.; Floyd, S. R.

    2005-01-01

    Addressable Reconfigurable Technology (ART) based structures: Mission Concepts based on Addressable Reconfigurable Technology (ART), originally studied for future ANTS (Autonomous Nanotechnology Swarm) Space Architectures, are now being developed as rovers for nearer term use in lunar and planetary surface exploration. The architecture is based on the reconfigurable tetrahedron as a building block. Tetrahedra are combined to form space-filling networks, shaped for the required function. Basic structural components are highly modular, addressable arrays of robust nodes (tetrahedral apices) from which highly reconfigurable struts (tetrahedral edges), acting as supports or tethers, are efficiently reversibly deployed/stowed, transforming and reshaping the structures as required.

  10. Evolutionary dynamics of complex communications networks

    CERN Document Server

    Karyotis, Vasileios; Papavassiliou, Symeon

    2013-01-01

    Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology-closing the network design loop in an evolutionary fashion similar to

  11. Building Automation Networks for Smart Grids

    Directory of Open Access Journals (Sweden)

    Peizhong Yi

    2011-01-01

    Full Text Available Smart grid, as an intelligent power generation, distribution, and control system, needs various communication systems to meet its requirements. The ability to communicate seamlessly across multiple networks and domains is an open issue which is yet to be adequately addressed in smart grid architectures. In this paper, we present a framework for end-to-end interoperability in home and building area networks within smart grids. 6LoWPAN and the compact application protocol are utilized to facilitate the use of IPv6 and Zigbee application profiles such as Zigbee smart energy for network and application layer interoperability, respectively. A differential service medium access control scheme enables end-to-end connectivity between 802.15.4 and IP networks while providing quality of service guarantees for Zigbee traffic over Wi-Fi. We also address several issues including interference mitigation, load scheduling, and security and propose solutions to them.

  12. Achieving Network Level Privacy in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2010-02-01

    Full Text Available Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power, sensor networks (e.g., mobility and topology and QoS issues (e.g., packet reach-ability and timeliness. In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  13. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  14. Value-Creating Networks: Organizational Issues and Challenges

    Science.gov (United States)

    Allee, Verna

    2009-01-01

    Purpose: The purpose of this paper is to provide examples of evaluating value-creating networks and to address the organizational issues and challenges of a network orientation. Design/methodology/approach: Value network analysis was first developed in 1993 and was adapted in 1997 for intangible asset management. It has been applied from shopfloor…

  15. A scalable addressing method when using IMS as a service bus infrastructure

    NARCIS (Netherlands)

    Stokking, H.M.; Hartog, F.T.H. den; Walraven, F.A.

    2009-01-01

    The dynamic provisioning of SIP addresses is a challenge when many devices and services are dynamically attached to an IMS network. Manual provisioning is too labor intensive for a telecommunications operator, and it is difficult to do it in a way that allows those devices and services access to all

  16. Neural networks in economic modelling : An empirical study

    NARCIS (Netherlands)

    Verkooijen, W.J.H.

    1996-01-01

    This dissertation addresses the statistical aspects of neural networks and their usability for solving problems in economics and finance. Neural networks are discussed in a framework of modelling which is generally accepted in econometrics. Within this framework a neural network is regarded as a

  17. Network migration for printers

    CERN Multimedia

    2016-01-01

    Further to the recent General Purpose (office) Network reorganisation (as announced in the Bulletin - see here), please note that the majority of print devices will be automatically migrated to the new network IP address range on Tuesday 27 September.   This change should be transparent for these devices and therefore end-users, provided you have installed the printers from the Print Service website. A small number of devices will require manual intervention from the Printer Support team in order to migrate correctly. These devices will not change their IP address until the manual intervention, which will be carried out before Monday 3rd October. However, if you have mistakenly connected directly to the printer’s IP address, then your printing will be affected – please uninstall the printer (for help, see: KB3785), and re-install it from the Print Service website (or follow instructions for visitor machines). Please do this as soon as possible in order to avoid printing issues, t...

  18. NOSArmor: Building a Secure Network Operating System

    Directory of Open Access Journals (Sweden)

    Hyeonseong Jo

    2018-01-01

    Full Text Available Software-Defined Networking (SDN, controlling underlying network devices (i.e., data plane in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS, also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB, into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight with secureness of network assets.

  19. Application of network methods for understanding evolutionary dynamics in discrete habitats.

    Science.gov (United States)

    Greenbaum, Gili; Fefferman, Nina H

    2017-06-01

    In populations occupying discrete habitat patches, gene flow between habitat patches may form an intricate population structure. In such structures, the evolutionary dynamics resulting from interaction of gene-flow patterns with other evolutionary forces may be exceedingly complex. Several models describing gene flow between discrete habitat patches have been presented in the population-genetics literature; however, these models have usually addressed relatively simple settings of habitable patches and have stopped short of providing general methodologies for addressing nontrivial gene-flow patterns. In the last decades, network theory - a branch of discrete mathematics concerned with complex interactions between discrete elements - has been applied to address several problems in population genetics by modelling gene flow between habitat patches using networks. Here, we present the idea and concepts of modelling complex gene flows in discrete habitats using networks. Our goal is to raise awareness to existing network theory applications in molecular ecology studies, as well as to outline the current and potential contribution of network methods to the understanding of evolutionary dynamics in discrete habitats. We review the main branches of network theory that have been, or that we believe potentially could be, applied to population genetics and molecular ecology research. We address applications to theoretical modelling and to empirical population-genetic studies, and we highlight future directions for extending the integration of network science with molecular ecology. © 2017 John Wiley & Sons Ltd.

  20. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  1. Networking activism: implications for Greece

    Directory of Open Access Journals (Sweden)

    Pantelis Vatikiotis

    2011-12-01

    Full Text Available The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-global interplay in protest culture along new mediating practices (beyond the creation of transnational publics, that of the implications of transnational networking for local social activism and identification, addressing relevant questions in the Greek context.

  2. Strategies for optical transport network recovery under epidemic network failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova; Kosteas, Vasileios

    2015-01-01

    The current trend in deploying automatic control plane solutions for increased flexibility in the optical transport layer leads to numerous advantages for both the operators and the customers, but also pose challenges related to the stability of the network and its ability to operate in a robust...... manner under different failure scenarios. This work evaluates two rerouting strategies and proposes four policies for failure handling in a connection-oriented optical transport network, under generalized multiprotocol label switching control plane. The performance of the strategies and the policies......, and that there exist a clear trade-off between policy performance and network resource consumption, which must be addressed by network operators for improved robustness of their transport infrastructures. Applying proactive methods for avoiding areas where epidemic failures spread results in 50% less connections...

  3. Geographically Locating an Internet Node Using Network Latency Measurement

    National Research Council Canada - National Science Library

    Turnbaugh, Eugene

    2004-01-01

    .... The difficulties include accurate latency measure, network address translation (NAT) masking, service blocking, disparate physical configuration, dissimilar network hardware, and inaccurate and limited measuring tools...

  4. Technological Developments in Networking, Education and Automation

    CERN Document Server

    Elleithy, Khaled; Iskander, Magued; Kapila, Vikram; Karim, Mohammad A; Mahmood, Ausif

    2010-01-01

    "Technological Developments in Networking, Education and Automation" includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent

  5. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  6. Incorporating network effects in a competitive electricity industry. An Australian perspective

    International Nuclear Information System (INIS)

    Outhred, H.; Kaye, J.

    1996-01-01

    The role of an electricity network in a competitive electricity industry is reviewed, the nation's experience with transmission pricing is discussed, and a 'Nodal Auction Model' for incorporating network effects in a competitive electricity industry is proposed. The model uses a computer-based auction procedure to address both the spatial issues associated with an electricity network and the temporal issues associated with operation scheduling. The objective is to provide a market framework that addresses both network effects and operation scheduling in a coordinated implementation of spot pricing theory. 12 refs

  7. The Effectiveness of Transgovernmental Networks

    DEFF Research Database (Denmark)

    Martinsen, Dorte Sindbjerg; Hobolth, Mogens

    2016-01-01

    participating in Solvit, an internal market problem-solving network, this paper investigates the role of transgovernmental networks in enforcing and managing the daily application of EU legislation by national authorities. We show that informal conflict resolution has become an important and effective tool...... for addressing misapplication of EU law. Anchored in national public administrations yet working under the ‘shadow of hierarchy’ (namely the Commission) transgovermental networks are in fact able to improve the compliance of domestic authorities....

  8. Social entrepreneurship and social networks

    OpenAIRE

    Dufays, Frédéric

    2013-01-01

    In this presentation, we argue that the sociology of social networks may provide interesting insights with regard to the emergence of social entrepreneurship both at micro and macro levels. There have already been several calls for research on social networks in the context of social entrepreneurship (Certo & Miller 2008; Gedajlovic, et al. 2013; Haugh 2007; Mair & Marti 2006; Short, et al. 2009). These calls often address the differences in structure and effects of social networks in a socia...

  9. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  10. Introducing Synchronisation in Deterministic Network Models

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Jessen, Jan Jakob; Nielsen, Jens Frederik D.

    2006-01-01

    The paper addresses performance analysis for distributed real time systems through deterministic network modelling. Its main contribution is the introduction and analysis of models for synchronisation between tasks and/or network elements. Typical patterns of synchronisation are presented leading...... to the suggestion of suitable network models. An existing model for flow control is presented and an inherent weakness is revealed and remedied. Examples are given and numerically analysed through deterministic network modelling. Results are presented to highlight the properties of the suggested models...

  11. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  12. Contract network in a balkanized grid

    International Nuclear Information System (INIS)

    Parkinson, T.W.

    1992-01-01

    Competition in electricity generation depends critically on access to transmission service at nondiscriminatory prices. Current access and pricing policies in the U.S. do not offer prospective private generators any guarantee of such access. Most proposals for reform, while improvements over current policies, attempt to provide for open access without addressing the underlying problems associated with loop flow and constraints in transmission networks. This paper identifies key design objectives for transmission access and pricing policies and cites critical weakness in one example reform proposal. As alternative proposal, based on contract networks, does address the underlying pricing problems. This paper shows that policies based on contract networks would meet the required objectives and could be feasibly implemented even in the Balkanized grid of U.S. investor-owned utilities. 10 refs

  13. What Would Peggy Do? 14th Annual Peggy Glanville-Hicks Address 2012

    Science.gov (United States)

    Harvey, Michael Kieran

    2012-01-01

    The New Music Network established the Peggy Glanville-Hicks Address in 1999 in honour of one of Australia's great international composers. It is an annual forum for ideas relating to the creation and performance of Australian music. In the spirit of the great Australian composer Peggy Glanville-Hicks, an outstanding advocate of Australian music…

  14. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  15. Global Optimization for Transport Network Expansion and Signal Setting

    OpenAIRE

    Liu, Haoxiang; Wang, David Z. W.; Yue, Hao

    2015-01-01

    This paper proposes a model to address an urban transport planning problem involving combined network design and signal setting in a saturated network. Conventional transport planning models usually deal with the network design problem and signal setting problem separately. However, the fact that network capacity design and capacity allocation determined by network signal setting combine to govern the transport network performance requires the optimal transport planning to consider the two pr...

  16. Towards green high capacity optical networks

    Science.gov (United States)

    Glesk, I.; Mohd Warip, M. N.; Idris, S. K.; Osadola, T. B.; Andonovic, I.

    2011-09-01

    The demand for fast, secure, energy efficient high capacity networks is growing. It is fuelled by transmission bandwidth needs which will support among other things the rapid penetration of multimedia applications empowering smart consumer electronics and E-businesses. All the above trigger unparallel needs for networking solutions which must offer not only high-speed low-cost "on demand" mobile connectivity but should be ecologically friendly and have low carbon footprint. The first answer to address the bandwidth needs was deployment of fibre optic technologies into transport networks. After this it became quickly obvious that the inferior electronic bandwidth (if compared to optical fiber) will further keep its upper hand on maximum implementable serial data rates. A new solution was found by introducing parallelism into data transport in the form of Wavelength Division Multiplexing (WDM) which has helped dramatically to improve aggregate throughput of optical networks. However with these advancements a new bottleneck has emerged at fibre endpoints where data routers must process the incoming and outgoing traffic. Here, even with the massive and power hungry electronic parallelism routers today (still relying upon bandwidth limiting electronics) do not offer needed processing speeds networks demands. In this paper we will discuss some novel unconventional approaches to address network scalability leading to energy savings via advance optical signal processing. We will also investigate energy savings based on advanced network management through nodes hibernation proposed for Optical IP networks. The hibernation reduces the network overall power consumption by forming virtual network reconfigurations through selective nodes groupings and by links segmentations and partitionings.

  17. Interactive Network Exploration with Orange

    Directory of Open Access Journals (Sweden)

    Miha Štajdohar

    2013-04-01

    Full Text Available Network analysis is one of the most widely used techniques in many areas of modern science. Most existing tools for that purpose are limited to drawing networks and computing their basic general characteristics. The user is not able to interactively and graphically manipulate the networks, select and explore subgraphs using other statistical and data mining techniques, add and plot various other data within the graph, and so on. In this paper we present a tool that addresses these challenges, an add-on for exploration of networks within the general component-based environment Orange.

  18. Distinct enlargement of network size or measurement speed for serial FBG sensor networks utilizing SIK-DS-CDMA

    Energy Technology Data Exchange (ETDEWEB)

    Abbenseth, S; Lochmann, S I [Hochschule Wismar, Univ. of Technology, Business and Design, Dept. of Electrical Engineering and Informatics, Philipp-Mueller-Strasse, 23952, Wismar (Germany)

    2005-01-01

    Using the spectral selectivity and adjustable reflectivity FBGs are predestined for serial networking. Presently the addressing is realised by time division multiplex (TDM) or wavelength division multiplex (WDM). But these technologies have big disadvantages regarding the effective use of the prevailing resources time and wavelength, respectively. In this paper a new scheme capable of addressing a large number of FBGs in a single serial network is proposed and compared to TDM and WDM. Using all optical sequence inversion keyed (SIK) direct sequence (DS) code division multiplex (CDM) it overcomes the restrictions handling the resources time and wavelength without losing accuracy.

  19. Distinct enlargement of network size or measurement speed for serial FBG sensor networks utilizing SIK-DS-CDMA

    International Nuclear Information System (INIS)

    Abbenseth, S; Lochmann, S I

    2005-01-01

    Using the spectral selectivity and adjustable reflectivity FBGs are predestined for serial networking. Presently the addressing is realised by time division multiplex (TDM) or wavelength division multiplex (WDM). But these technologies have big disadvantages regarding the effective use of the prevailing resources time and wavelength, respectively. In this paper a new scheme capable of addressing a large number of FBGs in a single serial network is proposed and compared to TDM and WDM. Using all optical sequence inversion keyed (SIK) direct sequence (DS) code division multiplex (CDM) it overcomes the restrictions handling the resources time and wavelength without losing accuracy

  20. An integrated approach to addressing addiction and depression in college students.

    Science.gov (United States)

    Eisen, Arri; Kushner, Howard; McLeod, Mark; Queen, Edward; Gordon, Jonathan; Ford, John L

    2009-01-01

    The authors present an integrated, interdisciplinary approach to address the problem of increasing student mental health issues on college campuses. The model uses addiction and depression as lenses into the problem and links residence life and academic and community internship experiences. The project has a positive impact on student attitudes and actions and strengthens and broadens the campus network required to ensure optimal student mental health.

  1. Cross-layer design in optical networks

    CERN Document Server

    Brandt-Pearce, Maïté; Demeester, Piet; Saradhi, Chava

    2013-01-01

    Optical networks have become an integral part of the communications infrastructure needed to support society’s demand for high-speed connectivity.  Cross-Layer Design in Optical Networks addresses topics in optical network design and analysis with a focus on physical-layer impairment awareness and network layer service requirements, essential for the implementation and management of robust scalable networks.  The cross-layer treatment includes bottom-up impacts of the physical and lambda layers, such as dispersion, noise, nonlinearity, crosstalk, dense wavelength packing, and wavelength line rates, as well as top-down approaches to handle physical-layer impairments and service requirements.

  2. A Hierarchical Dispatch Structure for Distribution Network Pricing

    OpenAIRE

    Yuan, Zhao; Hesamzadeh, Mohammad Reza

    2015-01-01

    This paper presents a hierarchical dispatch structure for efficient distribution network pricing. The dispatch coordination problem in the context of hierarchical network operators are addressed. We formulate decentralized generation dispatch into a bilevel optimization problem in which main network operator and the connected distribution network operator optimize their costs in two levels. By using Karush-Kuhn-Tucker conditions and Fortuny-Amat McCarl linearization, the bilevel optimization ...

  3. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    . Antennas are an integral part of wireless networks. A selected antenna type affects performance, network availability and safety of wireless networks. Finding default values CommView for WiFi is a tool for monitoring data flow (sniffer especially written for wireless networks. Cain & Abel is a universal tool for the detection of all types of passwords. If a wireless network uses a protective mechanism of MAC address filtering, then the attacker must collect the IP addresses. To connect to a wireless access point, it is necessary to know its SSID. Contrary to what some people think, SSID is not a password. Wardriving Driving a car with a portable computer aimed at the detection of wireless computer networks, onto which connection is later possible, is called wardriving. For wardriving, it is necessary to have an appropriate software tool and a wireless network card or an adapter, on which an external antenna can be added to increase signal strength. It is also possible to use a global positioning device (GPS to determine the coordinates of the detected wireless access points on a map. The most widely used software tools for wardriving are Network Stumbler, Kismet and MiniStumbler. Network attacks Hackers’ most usual attack to circumvent the basic access control in wireless networks is masking their own MAC address with an MAC address of a legitimate client on the network (MAC address spoofing. Man-in-the-Middle attack inserts the attacker’s system in the middle between wireless clients and the wireless access point. Legitimate wireless users will be fooled when they try to connect, by being associated to the attacker's system instead of the legitimate wireless access point. The ARP table poisoning attack inserts the attacker's system in the middle of communication between legitimate clients and the wireless access point. Attackers could use the address resolution protocol if it is running on the network. The aim of this attack is to introduce an attacker as a legitimate

  4. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  5. Extending the Domain Name System (DNS) to Provide Geographical Addressing Towards Vehicular Ad-Hoc Networks (VANETs)

    NARCIS (Netherlands)

    Fioreze, Tiago; Heijenk, Geert

    2011-01-01

    Geographical addressing is a key communication paradigm in emerging Intelligent Transportation Systems (ITS). In this paper, we address the issue of how to direct messages to roadside units (RSUs) in order to have them forwarded by the RSUs to the on-board units (OBUs) of vehicles in a certain

  6. Cooperative Cloudlet for Pervasive Networks

    Directory of Open Access Journals (Sweden)

    Tauseef Jamal

    2017-05-01

    Full Text Available The notion of cooperation in wireless communication has got significant attention from both academia and industrial persons towards to address the performance drawbacks of wireless sensor network due to reason of user’s high mobility and lack of resources of network. The future wireless systems should be highly heterogeneous and interconnected because motivating cooperative relaying has to apply on the future mobile network for efficient results and future demand. As currently the mobile computing is facing latency and battery drainage issues which need to address and solve hence in this work we are proposed mobile - centric and opportunistic communication architecture. In this work mobile devices which are in the range of Wi - Fi of each other can create cluste r with each other and can create an ad - hoc cooperative cloud using Relay Spot[1 - 4]. The Collaboration between these devices can enable them to resourcefully use the augmentation without any infrastructure.

  7. Towards Optimal Buffer Size in Wi-Fi Networks

    KAUST Repository

    Showail, Ahmad

    2016-01-01

    extensively for wired networks. However, there is little work addressing the unique challenges of wireless environment. In this dissertation, we discuss buffer sizing challenges in wireless networks, classify the state-of-the-art solutions, and propose two

  8. Human tracking over camera networks: a review

    Science.gov (United States)

    Hou, Li; Wan, Wanggen; Hwang, Jenq-Neng; Muhammad, Rizwan; Yang, Mingyang; Han, Kang

    2017-12-01

    In recent years, automated human tracking over camera networks is getting essential for video surveillance. The tasks of tracking human over camera networks are not only inherently challenging due to changing human appearance, but also have enormous potentials for a wide range of practical applications, ranging from security surveillance to retail and health care. This review paper surveys the most widely used techniques and recent advances for human tracking over camera networks. Two important functional modules for the human tracking over camera networks are addressed, including human tracking within a camera and human tracking across non-overlapping cameras. The core techniques of human tracking within a camera are discussed based on two aspects, i.e., generative trackers and discriminative trackers. The core techniques of human tracking across non-overlapping cameras are then discussed based on the aspects of human re-identification, camera-link model-based tracking and graph model-based tracking. Our survey aims to address existing problems, challenges, and future research directions based on the analyses of the current progress made toward human tracking techniques over camera networks.

  9. Principles of network and system administration

    CERN Document Server

    Burgess, Mark

    2002-01-01

    A practical guide for meeting the challenges of planning and designing a networkNetwork design has to be logical and efficient, decisions have to be made about what services are needed, and security concerns must be addressed. Focusing on general principles, this book will help make the process of setting up, configuring, and maintaining a network much easier. It outlines proven procedures for working in a global community of networked machines, and provides practical illustrations of technical specifics. Readers will also find broad coverage of Linux and other Unix versions, Windows(r), Macs,

  10. Four Challenges That Global Health Networks Face

    Directory of Open Access Journals (Sweden)

    Jeremy Shiffman

    2017-04-01

    Full Text Available Global health networks, webs of individuals and organizations with a shared concern for a particular condition, have proliferated over the past quarter century. They differ in their effectiveness, a factor that may help explain why resource allocations vary across health conditions and do not correspond closely with disease burden. Drawing on findings from recently concluded studies of eight global health networks—addressing alcohol harm, early childhood development (ECD, maternal mortality, neonatal mortality, pneumonia, surgically-treatable conditions, tobacco use, and tuberculosis—I identify four challenges that networks face in generating attention and resources for the conditions that concern them. The first is problem definition: generating consensus on what the problem is and how it should be addressed. The second is positioning: portraying the issue in ways that inspire external audiences to act. The third is coalition-building: forging alliances with these external actors, particularly ones outside the health sector. The fourth is governance: establishing institutions to facilitate collective action. Research indicates that global health networks that effectively tackle these challenges are more likely to garner support to address the conditions that concern them. In addition to the effectiveness of networks, I also consider their legitimacy, identifying reasons both to affirm and to question their right to exert power.

  11. Adverse Outcome Pathway Networks II: Network Analytics.

    Science.gov (United States)

    Villeneuve, Daniel L; Angrish, Michelle M; Fortin, Marie C; Katsiadaki, Ioanna; Leonard, Marc; Margiotta-Casaluci, Luigi; Munn, Sharon; O'Brien, Jason M; Pollesch, Nathan L; Smith, L Cody; Zhang, Xiaowei; Knapen, Dries

    2018-02-28

    Toxicological responses to stressors are more complex than the simple one biological perturbation to one adverse outcome model portrayed by individual adverse outcome pathways (AOPs). Consequently, the AOP framework was designed to facilitate de facto development of AOP networks that can aid understanding and prediction of pleiotropic and interactive effects more common to environmentally realistic, complex exposure scenarios. The present paper introduces nascent concepts related to the qualitative analysis of AOP networks. First, graph theory-based approaches for identifying important topological features are illustrated using two example AOP networks derived from existing AOP descriptions. Second, considerations for identifying the most significant path(s) through an AOP network from either a biological or risk assessment perspective are described. Finally, approaches for identifying interactions among AOPs that may result in additive, synergistic, or antagonistic responses, or previously undefined emergent patterns of response, are introduced. Along with a companion article (Knapen et al. part I), these concepts set the stage for development of tools and case studies that will facilitate more rigorous analysis of AOP networks, and the utility of AOP network-based predictions, for use in research and regulatory decision-making. Collectively, this work addresses one of the major themes identified through a SETAC Horizon Scanning effort focused on advancing the AOP framework. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  12. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  13. Interdisciplinary and physics challenges of network theory

    Science.gov (United States)

    Bianconi, Ginestra

    2015-09-01

    Network theory has unveiled the underlying structure of complex systems such as the Internet or the biological networks in the cell. It has identified universal properties of complex networks, and the interplay between their structure and dynamics. After almost twenty years of the field, new challenges lie ahead. These challenges concern the multilayer structure of most of the networks, the formulation of a network geometry and topology, and the development of a quantum theory of networks. Making progress on these aspects of network theory can open new venues to address interdisciplinary and physics challenges including progress on brain dynamics, new insights into quantum technologies, and quantum gravity.

  14. When Is Network Lasso Accurate?

    Directory of Open Access Journals (Sweden)

    Alexander Jung

    2018-01-01

    Full Text Available The “least absolute shrinkage and selection operator” (Lasso method has been adapted recently for network-structured datasets. In particular, this network Lasso method allows to learn graph signals from a small number of noisy signal samples by using the total variation of a graph signal for regularization. While efficient and scalable implementations of the network Lasso are available, only little is known about the conditions on the underlying network structure which ensure network Lasso to be accurate. By leveraging concepts of compressed sensing, we address this gap and derive precise conditions on the underlying network topology and sampling set which guarantee the network Lasso for a particular loss function to deliver an accurate estimate of the entire underlying graph signal. We also quantify the error incurred by network Lasso in terms of two constants which reflect the connectivity of the sampled nodes.

  15. Competitive Liner Shipping Network Design

    DEFF Research Database (Denmark)

    Karsten, Christian Vad

    .The contributions of this thesis cover modeling, methodology, and applications.The developed methods address operational (cargo routing), tactical (speed optimization and service selection), and strategic (network design) planning problems faced by liner shipping companies. Ultimately, the proposed methods help...... take the container transportation times that can be realized in the network nor the number of transshipments into consideration. This is mainly because the optimization problem is based on other transportation networks where these constraints are not decisive to the quality of the network. Furthermore......, the problem in itself is challenging to optimize due to its size and complexity. However, the field has seen crucial progress and is mature to include handling of competitiveness in the actual design of the network.As a liner shipping network is an organic entity, which is constantly changed to reflect...

  16. Brocade: Optimal flow placement in SDN networks

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Today' network poses several challanges to network providers. These challanges fall in to a variety of areas ranging from determining efficient utilization of network bandwidth to finding out which user applications consume majority of network resources. Also, how to protect a given network from volumetric and botnet attacks. Optimal placement of flows deal with identifying network issues and addressing them in a real-time. The overall solution helps in building new services where a network is more secure and more efficient. Benefits derived as a result are increased network efficiency due to better capacity and resource planning, better security with real-time threat mitigation, and improved user experience as a result of increased service velocity.

  17. Network inference via adaptive optimal design

    Directory of Open Access Journals (Sweden)

    Stigter Johannes D

    2012-09-01

    Full Text Available Abstract Background Current research in network reverse engineering for genetic or metabolic networks very often does not include a proper experimental and/or input design. In this paper we address this issue in more detail and suggest a method that includes an iterative design of experiments based, on the most recent data that become available. The presented approach allows a reliable reconstruction of the network and addresses an important issue, i.e., the analysis and the propagation of uncertainties as they exist in both the data and in our own knowledge. These two types of uncertainties have their immediate ramifications for the uncertainties in the parameter estimates and, hence, are taken into account from the very beginning of our experimental design. Findings The method is demonstrated for two small networks that include a genetic network for mRNA synthesis and degradation and an oscillatory network describing a molecular network underlying adenosine 3’-5’ cyclic monophosphate (cAMP as observed in populations of Dyctyostelium cells. In both cases a substantial reduction in parameter uncertainty was observed. Extension to larger scale networks is possible but needs a more rigorous parameter estimation algorithm that includes sparsity as a constraint in the optimization procedure. Conclusion We conclude that a careful experiment design very often (but not always pays off in terms of reliability in the inferred network topology. For large scale networks a better parameter estimation algorithm is required that includes sparsity as an additional constraint. These algorithms are available in the literature and can also be used in an adaptive optimal design setting as demonstrated in this paper.

  18. MPE inference in conditional linear gaussian networks

    DEFF Research Database (Denmark)

    Salmerón, Antonio; Rumí, Rafael; Langseth, Helge

    2015-01-01

    Given evidence on a set of variables in a Bayesian network, the most probable explanation (MPE) is the problem of finding a configuration of the remaining variables with maximum posterior probability. This problem has previously been addressed for discrete Bayesian networks and can be solved using...

  19. Coordinated Platoon Routing in a Metropolitan Network

    Energy Technology Data Exchange (ETDEWEB)

    Larson, Jeffrey; Munson, Todd; Sokolov, Vadim

    2016-10-10

    Platooning vehicles—connected and automated vehicles traveling with small intervehicle distances—use less fuel because of reduced aerodynamic drag. Given a network de- fined by vertex and edge sets and a set of vehicles with origin/destination nodes/times, we model and solve the combinatorial optimization problem of coordinated routing of vehicles in a manner that routes them to their destination on time while using the least amount of fuel. Common approaches decompose the platoon coordination and vehicle routing into separate problems. Our model addresses both problems simultaneously to obtain the best solution. We use modern modeling techniques and constraints implied from analyzing the platoon routing problem to address larger numbers of vehicles and larger networks than previously considered. While the numerical method used is unable to certify optimality for candidate solutions to all networks and parameters considered, we obtain excellent solutions in approximately one minute for much larger networks and vehicle sets than previously considered in the literature.

  20. VSAT communications networks - An overview

    Science.gov (United States)

    Chakraborty, D.

    1988-05-01

    The very-small-aperture-terminal (VSAT) fixed satellite communication network is a star network in which many dispersed micro terminals attempt to send data in a packet form through a random access/time-division multiple-access (RA/TDMA) satellite channel with transmission delay. The basic concept of the VSAT and its service potential are discussed. Two classes of traffic are addressed, namely, business-oriented low-rate-data traffic and bulk data traffic of corporate networks. Satellite access, throughput, and delay are considered. The size of the network population that can be served in an RA/TDMA environment is calculated. User protocols are examined. A typical VSAT business scenario is described.

  1. A machine-checked proof of correctness of Pastry

    OpenAIRE

    Azmy, Noran

    2016-01-01

    A distributed hash table (DHT) is a peer-to-peer network that offers the function of a classic hash table, but where different key-value pairs are stored at different nodes on the network. Like a classic hash table, the main function provided by a DHT is key lookup, which retrieves the value stored at a given key. Examples of DHT protocols include Chord, Pastry, Kademlia and Tapestry. Such DHT protocols certain correctness and performance guarantees, but formal verification typically ...

  2. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  3. An integrated control for overvoltage mitigation in the distribution network

    NARCIS (Netherlands)

    Viyathukattuva Mohamed Ali, M.M.; Nguyen, P.H.; Kling, W.L.

    2014-01-01

    Increasing share of distributed renewable energy sources (DRES) in the distribution network raises new operational and power quality challenges like overvoltage in the network feeders. Such power quality challenge limits the penetration of DRES in the distribution network. This paper addresses a

  4. Path integration of head direction: updating a packet of neural activity at the correct speed using axonal conduction delays.

    Science.gov (United States)

    Walters, Daniel; Stringer, Simon; Rolls, Edmund

    2013-01-01

    The head direction cell system is capable of accurately updating its current representation of head direction in the absence of visual input. This is known as the path integration of head direction. An important question is how the head direction cell system learns to perform accurate path integration of head direction. In this paper we propose a model of velocity path integration of head direction in which the natural time delay of axonal transmission between a linked continuous attractor network and competitive network acts as a timing mechanism to facilitate the correct speed of path integration. The model effectively learns a "look-up" table for the correct speed of path integration. In simulation, we show that the model is able to successfully learn two different speeds of path integration across two different axonal conduction delays, and without the need to alter any other model parameters. An implication of this model is that, by learning look-up tables for each speed of path integration, the model should exhibit a degree of robustness to damage. In simulations, we show that the speed of path integration is not significantly affected by degrading the network through removing a proportion of the cells that signal rotational velocity.

  5. Aspects of family caregiving as addressed in planned discussions between nurses, patients with chronic diseases and family caregivers: a qualitative content analysis.

    Science.gov (United States)

    Hagedoorn, E I; Paans, W; Jaarsma, T; Keers, J C; van der Schans, C; Luttik, M Louise

    2017-01-01

    Caregiving by family members of elderly with chronic conditions is currently intensifying in the context of an aging population and health care reform in the Netherlands. It is essential that nurses have attention for supporting roles of family caregivers of older patients and address family caregiving aspects on behalf of the continuity of care. This study aims to explore what aspects of family caregiving were addressed during planned discussions between nurses, patients and family caregivers in the hospital. Qualitative descriptive research was conducted using non-participant observation and audio-recordings of planned discussions between nurses, older patients and their family caregivers as they took place in the hospital. Through purposive sampling eligible patients (≥ 65 years) with one or more chronic conditions were included. These patients were admitted to the hospital for diagnostics or due to consequences of their chronic illness. Retrospective chart review was done to obtain patient characteristics. Data were collected in November/December 2013 and April/May 2014 in four hospitals. Qualitative content analysis was performed using the inductive approach in order to gain insight into addressed aspects of family caregiving. A total of 62 patients (mean age (SD) 76 years (7.2), 52% male) were included in the study, resulting in 146 planned discussions (62 admission and discharge discussions and 22 family meetings). Three themes were identified regarding addressed aspects of family caregiving. Two themes referred to aspects addressing the patients' social network, and included 'social network structure' and 'social network support'. One theme referred to aspects addressing coordination of care issues involving family caregiving, referred to as 'coordination of care'. During discussions nurses mostly addressed practical information on the patients' social network structure. When specific family caregiving support was addressed, information was limited and

  6. Evaluating Community Partnerships Addressing Community Resilience in Los Angeles, California

    Directory of Open Access Journals (Sweden)

    Malcolm V. Williams

    2018-03-01

    Full Text Available Community resilience has grown in importance in national disaster response and recovery efforts. However, measurement of community resilience, particularly the content and quality of relationships aimed at improving resilience, is lacking. To address this gap, we used a social network survey to measure the number, type, and quality of relationships among organizations participating in 16 coalitions brought together to address community resilience in the Los Angeles Community Disaster Resilience project. These coalitions were randomized to one of two approaches (community resilience or preparedness. Resilience coalitions received training and support to develop these partnerships and implement new activities. Both coalition types received expert facilitation by a public health nurse or community educator. We also measured the activities each coalition engaged in and the extent to which partners participated in these activities at two time points. We found that the community resilience coalitions were initially larger and had lower trust among members than the preparedness communities. Over time, these trust differences dissipated. While both coalitions grew, the resilience community coalitions maintained their size difference throughout the project. We also found differences in the types of activities implemented by the resilience communities; these differences were directly related to the trainings provided. This information is useful to organizations seeking guidance on expanding the network of community-based organizations that participate in community resilience activities.

  7. General Purpose (office) Network reorganisation

    CERN Multimedia

    IT Department

    2016-01-01

    On Saturday 27 August, the IT Department’s Communication Systems group will perform a major reorganisation of CERN’s General Purpose Network.   This reorganisation will cause network interruptions on Saturday 27 August (and possibly Sunday 28 August) and will be followed by a change to the IP addresses of connected systems that will come into effect on Monday 3 October. For further details and information about the actions you may need to take, please see: https://information-technology.web.cern.ch/news/general-purpose-office-network-reorganisation.

  8. Networks and learning: communities, practices and the metaphor of networks–a commentary

    Directory of Open Access Journals (Sweden)

    Bruce Ingraham

    2004-12-01

    Full Text Available In issue 12(1, Jones (2004 in his article ‘Networks and learning: communities, practices and the metaphor of networks' sets out to address three inter-related sets of issues: … firstly that learning technology needs to take account of the wider debate about networks and secondly that research in this field needs to address the theoretical and practical issues raised by advances in the field of networks. A third point is that the idea of the network acts as a powerful metaphor even if we are able to discount any particular theory generated in its support. The network metaphor can act as a unifying concept allowing us to bring together apparently disparate elements of the field.

  9. SIMS: addressing the problem of heterogeneity in databases

    Science.gov (United States)

    Arens, Yigal

    1997-02-01

    The heterogeneity of remotely accessible databases -- with respect to contents, query language, semantics, organization, etc. -- presents serious obstacles to convenient querying. The SIMS (single interface to multiple sources) system addresses this global integration problem. It does so by defining a single language for describing the domain about which information is stored in the databases and using this language as the query language. Each database to which SIMS is to provide access is modeled using this language. The model describes a database's contents, organization, and other relevant features. SIMS uses these models, together with a planning system drawing on techniques from artificial intelligence, to decompose a given user's high-level query into a series of queries against the databases and other data manipulation steps. The retrieval plan is constructed so as to minimize data movement over the network and maximize parallelism to increase execution speed. SIMS can recover from network failures during plan execution by obtaining data from alternate sources, when possible. SIMS has been demonstrated in the domains of medical informatics and logistics, using real databases.

  10. Ranking paths in stochastic time-dependent networks

    DEFF Research Database (Denmark)

    Nielsen, Lars Relund; Andersen, Kim Allan; Pretolani, Daniele D.

    2014-01-01

    In this paper we address optimal routing problems in networks where travel times are both stochastic and time-dependent. In these networks, the best route choice is not necessarily a path, but rather a time-adaptive strategy that assigns successors to nodes as a function of time. Nevertheless, in...

  11. A robust and accurate numerical method for transcritical turbulent flows at supercritical pressure with an arbitrary equation of state

    International Nuclear Information System (INIS)

    Kawai, Soshi; Terashima, Hiroshi; Negishi, Hideyo

    2015-01-01

    This paper addresses issues in high-fidelity numerical simulations of transcritical turbulent flows at supercritical pressure. The proposed strategy builds on a tabulated look-up table method based on REFPROP database for an accurate estimation of non-linear behaviors of thermodynamic and fluid transport properties at the transcritical conditions. Based on the look-up table method we propose a numerical method that satisfies high-order spatial accuracy, spurious-oscillation-free property, and capability of capturing the abrupt variation in thermodynamic properties across the transcritical contact surface. The method introduces artificial mass diffusivity to the continuity and momentum equations in a physically-consistent manner in order to capture the steep transcritical thermodynamic variations robustly while maintaining spurious-oscillation-free property in the velocity field. The pressure evolution equation is derived from the full compressible Navier–Stokes equations and solved instead of solving the total energy equation to achieve the spurious pressure oscillation free property with an arbitrary equation of state including the present look-up table method. Flow problems with and without physical diffusion are employed for the numerical tests to validate the robustness, accuracy, and consistency of the proposed approach.

  12. Large developing receptive fields using a distributed and locally reprogrammable address-event receiver.

    Science.gov (United States)

    Bamford, Simeon A; Murray, Alan F; Willshaw, David J

    2010-02-01

    A distributed and locally reprogrammable address-event receiver has been designed, in which incoming address-events are monitored simultaneously by all synapses, allowing for arbitrarily large axonal fan-out without reducing channel capacity. Synapses can change the address of their presynaptic neuron, allowing the distributed implementation of a biologically realistic learning rule, with both synapse formation and elimination (synaptic rewiring). Probabilistic synapse formation leads to topographic map development, made possible by a cross-chip current-mode calculation of Euclidean distance. As well as synaptic plasticity in rewiring, synapses change weights using a competitive Hebbian learning rule (spike-timing-dependent plasticity). The weight plasticity allows receptive fields to be modified based on spatio-temporal correlations in the inputs, and the rewiring plasticity allows these modifications to become embedded in the network topology.

  13. Current distribution in conducting nanowire networks

    Science.gov (United States)

    Kumar, Ankush; Vidhyadhiraja, N. S.; Kulkarni, Giridhar U.

    2017-07-01

    Conducting nanowire networks find diverse applications in solar cells, touch-screens, transparent heaters, sensors, and various related transparent conducting electrode (TCE) devices. The performances of these devices depend on effective resistance, transmittance, and local current distribution in these networks. Although, there have been rigorous studies addressing resistance and transmittance in TCE, not much attention is paid on studying the distribution of current. Present work addresses this compelling issue of understanding current distribution in TCE networks using analytical as well as Monte-Carlo approaches. We quantified the current carrying backbone region against isolated and dangling regions as a function of wire density (ranging from percolation threshold to many multiples of threshold) and compared the wired connectivity with those obtained from template-based methods. Further, the current distribution in the obtained backbone is studied using Kirchhoff's law, which reveals that a significant fraction of the backbone (which is believed to be an active current component) may not be active for end-to-end current transport due to the formation of intervening circular loops. The study shows that conducting wire based networks possess hot spots (extremely high current carrying regions) which can be potential sources of failure. The fraction of these hot spots is found to decrease with increase in wire density, while they are completely absent in template based networks. Thus, the present work discusses unexplored issues related to current distribution in conducting networks, which are necessary to choose the optimum network for best TCE applications.

  14. Social-ecology networks : building connections for sustainable landscapes

    OpenAIRE

    Opdam, P.F.M.

    2014-01-01

    Humans adapt their landscapes, their living environment. Sustainable use of the various landscape benefits requires that land owners and users collaborate in managing ecological networks. Because the government is stepping back as the organizer of coordinated landscape adaptation, we need new landscape planning approaches that enhance collaboration by building social networks and link them to ecological networks. In this farewell address I will explain why the social-ecological network is a p...

  15. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks

    OpenAIRE

    Raya, Maxim; Papadimitratos, Panagiotis; Aad, Imad; Jungels, Daniel; Hubaux, Jean-Pierre

    2007-01-01

    Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an ...

  16. A joint classification method to integrate scientific and social networks

    NARCIS (Netherlands)

    Neshati, Mahmood; Asgari, Ehsaneddin; Hiemstra, Djoerd; Beigy, Hamid

    In this paper, we address the problem of scientific-social network integration to find a matching relationship between members of these networks. Utilizing several name similarity patterns and contextual properties of these networks, we design a focused crawler to find high probable matching pairs,

  17. Prediction of littoral drift with artificial neural networks

    Digital Repository Service at National Institute of Oceanography (India)

    Singh, A.K.; Deo, M.C.; SanilKumar, V.

    of the rate of sand drift has still remained as a problem. The current study addresses this issue through the use of artificial neural networks (ANN). Feed forward networks were developed to predict the sand drift from a variety of causative variables...

  18. Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach

    NARCIS (Netherlands)

    Le, Anhtuan; Chen, Yue; Chai, Kok Keong; Vasenev, Alexandr; Montoya, L.

    Assessing loss event frequencies (LEF) of smart grid cyber threats is essential for planning cost-effective countermeasures. Factor Analysis of Information Risk (FAIR) is a well-known framework that can be applied to consider threats in a structured manner by using look-up tables related to a

  19. Named data networking-based smart home

    OpenAIRE

    Syed Hassan Ahmed; Dongkyun Kim

    2016-01-01

    Named data networking (NDN) treats content/data as a “first class citizen” of the network by giving it a “name”. This content “name” is used to retrieve any information, unlike in device-centric networks (i.e., the current Internet), which depend on physical IP addresses. Meanwhile, the smart home concept has been gaining attention in academia and industries; various low-cost embedded devices are considered that can sense, process, store, and communicate data autonomously. In this paper, we s...

  20. Advanced mobility handover for mobile IPv6 based wireless networks.

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.

  1. Advanced Mobility Handover for Mobile IPv6 Based Wireless Networks

    Science.gov (United States)

    Safa Sadiq, Ali; Fisal, Norsheila Binti; Ghafoor, Kayhan Zrar; Lloret, Jaime

    2014-01-01

    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches. PMID:25614890

  2. MAGGnet: An international network to foster mitigation of agricultural greenhouse gases

    DEFF Research Database (Denmark)

    Liebig, M.A.; Franzluebbers, A.J.; Alvarez, C.

    2016-01-01

    Research networks provide a framework for review, synthesis and systematic testing of theories by multiple scientists across international borders critical for addressing global-scale issues. In 2012, a GHG research network referred to as MAGGnet (Managing Agricultural Greenhouse Gases Network...

  3. 7th Workshop on Complex Networks

    CERN Document Server

    Gonçalves, Bruno; Menezes, Ronaldo; Sinatra, Roberta

    2016-01-01

    The last decades have seen the emergence of Complex Networks as the language with which a wide range of complex phenomena in fields as diverse as Physics, Computer Science, and Medicine (to name just a few) can be properly described and understood. This book provides a view of the state of the art in this dynamic field and covers topics ranging from network controllability, social structure, online behavior, recommendation systems, and network structure. This book includes the peer-reviewed list of works presented at the 7th Workshop on Complex Networks CompleNet 2016 which was hosted by the Université de Bourgogne, France, from March 23-25, 2016. The 28 carefully reviewed and selected contributions in this book address many topics related to complex networks and have been organized in seven major groups: (1) Theory of Complex Networks, (2) Multilayer networks, (3) Controllability of networks, (4) Algorithms for networks, (5) Community detection, (6) Dynamics and spreading phenomena on networks, (7) Applicat...

  4. Social Networking Sites: A premise on enhancement

    OpenAIRE

    MANINDERPAL SINGH SAINI; GYEWON MOON

    2013-01-01

    This article address five constructs that are paramount toward continued evolution of social networking sites (SNS`s) they include, - stabilisation, visual, language, security and flexibility. These constructs add to our proposed framework. Firmly grounded research on social networking sites and literature, we propose that user feedback, is the critical component that stimulates the development and growth of social networking sites online. We offer a framework that can aid new and current soc...

  5. NETWORK UNIVERSITIES: INTERNATIONAL EXPERIENCE AND TRENDS

    Directory of Open Access Journals (Sweden)

    Г А Краснова

    2016-12-01

    Full Text Available The article is devoted to networking foreign universities, in particular, it considers the experience of cooperation of Vietnamese and Chinese universities with the leading universities of the world and the implementation of joint educational projects. The article deals with the basic characteristics of university networks that emerged in the last decade in developing countries. The authors analyzed the model, sources of financing, the organization of educational process, teaching of languages and the number of students in the university network, as well as the main mechanisms that allow open network structure of education in different countries of the world. The authors also address the main reasons for encouraging networking of foreign universities.

  6. Network Support for Group Coordination

    Science.gov (United States)

    2000-01-01

    telecommuting and ubiquitous computing [40], the advent of networked multimedia, and less expensive technology have shifted telecollaboration into...of Computer Engineering,Santa Cruz,CA,95064 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/ MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10...participants A and B, the payoff structure for choosing two actions i and j is P = Aij + Bij . If P = 0, then the interaction is called a zero -sum game, and

  7. Social Networking and Academic Performance: A Review

    Science.gov (United States)

    Doleck, Tenzin; Lajoie, Susanne

    2018-01-01

    The ubiquitous use of social networking sites by students and the potential impacts of such use on academic performance are of both theoretical and practical importance. Hence, this paper addresses the question: how does the use of social networking sites influence academic performance? The present review synthesizes the empirical findings of the…

  8. Risk-based flood-planning strategy for Vermont's roadway network.

    Science.gov (United States)

    2015-06-01

    In this project, the authors extend the use of a previously established measure of link-specific criticality, the Network Robustness Index (NRI), to address disruptions in Vermonts federal-aid road network caused by summertime flooding. The goal o...

  9. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    For many globally dispersed organisations, the home base (HB) is a historic locus of integrative and coordinating efforts that safeguard overall performance. However, the dynamism of global operations networks is increasingly pulling the centre of gravity away from the HB and dispersing it across...... the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  10. Robust classification using mixtures of dependency networks

    DEFF Research Database (Denmark)

    Gámez, José A.; Mateo, Juan L.; Nielsen, Thomas Dyhre

    2008-01-01

    Dependency networks have previously been proposed as alternatives to e.g. Bayesian networks by supporting fast algorithms for automatic learning. Recently dependency networks have also been proposed as classification models, but as with e.g. general probabilistic inference, the reported speed......-ups are often obtained at the expense of accuracy. In this paper we try to address this issue through the use of mixtures of dependency networks. To reduce learning time and improve robustness when dealing with data sparse classes, we outline methods for reusing calculations across mixture components. Finally...

  11. Nonlinear threshold Boolean automata networks and phase transitions

    OpenAIRE

    Demongeot, Jacques; Sené, Sylvain

    2010-01-01

    In this report, we present a formal approach that addresses the problem of emergence of phase transitions in stochastic and attractive nonlinear threshold Boolean automata networks. Nonlinear networks considered are informally defined on the basis of classical stochastic threshold Boolean automata networks in which specific interaction potentials of neighbourhood coalition are taken into account. More precisely, specific nonlinear terms compose local transition functions that define locally t...

  12. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  13. Plant Evolution: A Manufacturing Network Perspective

    DEFF Research Database (Denmark)

    Yang, Cheng; Johansen, John; Boer, Harry

    2009-01-01

    Viewing them as portfolios of products and processes, we aim to address how plants evolve in the context of a manufacturing network and how the evolution of one plant impacts other plants in the same manufacturing network. Based on discussions of ten plants from three Danish companies, we identify...... two different trajectories. Together, these trajectories determine the evolution of a manufacturing network. Factors appearing to affect the two trajectories include competencies built up, transferred or acquired locally, market potential, performance considerations, local, situational factors...

  14. Bose-Einstein Condensation in Complex Networks

    International Nuclear Information System (INIS)

    Bianconi, Ginestra; Barabasi, Albert-Laszlo

    2001-01-01

    The evolution of many complex systems, including the World Wide Web, business, and citation networks, is encoded in the dynamic web describing the interactions between the system's constituents. Despite their irreversible and nonequilibrium nature these networks follow Bose statistics and can undergo Bose-Einstein condensation. Addressing the dynamical properties of these nonequilibrium systems within the framework of equilibrium quantum gases predicts that the 'first-mover-advantage,' 'fit-get-rich,' and 'winner-takes-all' phenomena observed in competitive systems are thermodynamically distinct phases of the underlying evolving networks

  15. Synthesis of a parallel data stream processor from data flow process networks

    NARCIS (Netherlands)

    Zissulescu-Ianculescu, Claudiu

    2008-01-01

    In this talk, we address the problem of synthesizing Process Network specifications to FPGA execution platforms. The process networks we consider are special cases of Kahn Process Networks. We call them COMPAAN Data Flow Process Networks (CDFPN) because they are provided by a translator called the

  16. The Role of Functional Interdependencies in Global Operations Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum

    2011-01-01

    The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that managing their interfaces in global operations context is becoming strategically...

  17. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  18. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  19. Functional Module Analysis for Gene Coexpression Networks with Network Integration.

    Science.gov (United States)

    Zhang, Shuqin; Zhao, Hongyu; Ng, Michael K

    2015-01-01

    Network has been a general tool for studying the complex interactions between different genes, proteins, and other small molecules. Module as a fundamental property of many biological networks has been widely studied and many computational methods have been proposed to identify the modules in an individual network. However, in many cases, a single network is insufficient for module analysis due to the noise in the data or the tuning of parameters when building the biological network. The availability of a large amount of biological networks makes network integration study possible. By integrating such networks, more informative modules for some specific disease can be derived from the networks constructed from different tissues, and consistent factors for different diseases can be inferred. In this paper, we have developed an effective method for module identification from multiple networks under different conditions. The problem is formulated as an optimization model, which combines the module identification in each individual network and alignment of the modules from different networks together. An approximation algorithm based on eigenvector computation is proposed. Our method outperforms the existing methods, especially when the underlying modules in multiple networks are different in simulation studies. We also applied our method to two groups of gene coexpression networks for humans, which include one for three different cancers, and one for three tissues from the morbidly obese patients. We identified 13 modules with three complete subgraphs, and 11 modules with two complete subgraphs, respectively. The modules were validated through Gene Ontology enrichment and KEGG pathway enrichment analysis. We also showed that the main functions of most modules for the corresponding disease have been addressed by other researchers, which may provide the theoretical basis for further studying the modules experimentally.

  20. Geography Lookup 2017

    Data.gov (United States)

    Federal Communications Commission — Summary data of fixed broadband coverage by geographic area. License and Attribution: Broadband data from FCC Form 477, and data from the U.S. Census Bureau that are...

  1. Optical storage networking

    Science.gov (United States)

    Mohr, Ulrich

    2001-11-01

    For efficient business continuance and backup of mission- critical data an inter-site storage network is required. Where traditional telecommunications costs are prohibitive for all but the largest organizations, there is an opportunity for regional carries to deliver an innovative storage service. This session reveals how a combination of optical networking and protocol-aware SAN gateways can provide an extended storage networking platform with the lowest cost of ownership and the highest possible degree of reliability, security and availability. Companies of every size, with mainframe and open-systems environments, can afford to use this integrated service. Three mayor applications are explained; channel extension, Network Attached Storage (NAS), Storage Area Networks (SAN) and how optical networks address the specific requirements. One advantage of DWDM is the ability for protocols such as ESCON, Fibre Channel, ATM and Gigabit Ethernet, to be transported natively and simultaneously across a single fiber pair, and the ability to multiplex many individual fiber pairs over a single pair, thereby reducing fiber cost and recovering fiber pairs already in use. An optical storage network enables a new class of service providers, Storage Service Providers (SSP) aiming to deliver value to the enterprise by managing storage, backup, replication and restoration as an outsourced service.

  2. Privacy-preserving Network Functionality Outsourcing

    OpenAIRE

    Shi, Junjie; Zhang, Yuan; Zhong, Sheng

    2015-01-01

    Since the advent of software defined networks ({SDN}), there have been many attempts to outsource the complex and costly local network functionality, i.e. the middlebox, to the cloud in the same way as outsourcing computation and storage. The privacy issues, however, may thwart the enterprises' willingness to adopt this innovation since the underlying configurations of these middleboxes may leak crucial and confidential information which can be utilized by attackers. To address this new probl...

  3. Structural integration and performance of inter-sectoral public health-related policy networks: An analysis across policy phases.

    Science.gov (United States)

    Peters, D T J M; Raab, J; Grêaux, K M; Stronks, K; Harting, J

    2017-12-01

    Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structural network characteristics (i.e., composition and integration) and network performance, such as addressing environmental determinants of health. This study examines these relations in different phases of the policy process. A multiple-case study was performed on four public health-related policy networks. Using a snowball method among network actors, overall and sub-networks per policy phase were identified and the policy sector of each actor was assigned. To operationalise the outcome variable, interventions were classified by the proportion of environmental determinants they addressed. In the overall networks, no relation was found between structural network characteristics and network performance. In most effective cases, the policy development sub-networks were characterised by integration with less interrelations between actors (low cohesion), more equally distributed distances between the actors (low closeness centralisation), and horizontal integration in inter-sectoral cliques. The most effective case had non-public health central actors with less connections in all sub-networks. The results suggest that, to address environmental determinants of health, sub-networks should be inter-sectorally composed in the policy development rather than in the intervention development and implementation phases, and that policy development actors should have the opportunity to connect with other actors, without strong direction from a central actor. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. A New Method of Chinese Address Extraction Based on Address Tree Model

    Directory of Open Access Journals (Sweden)

    KANG Mengjun

    2015-01-01

    Full Text Available Address is a spatial location encoding method of individual geographical area. In China, address planning is relatively backward due to the rapid development of the city, resulting in the presence of large number of non-standard address. The space constrain relationship of standard address model is analyzed in this paper and a new method of standard address extraction based on the tree model is proposed, which regards topological relationship as consistent criteria of space constraints. With this method, standard address can be extracted and errors can be excluded from non-standard address. Results indicate that higher math rate can be obtained with this method.

  5. MIMO Communication for Cellular Networks

    CERN Document Server

    Huang, Howard; Venkatesan, Sivarama

    2012-01-01

    As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, MIMO Communication for Cellular Networks presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks. In contrast to works that focus on the theoretical performance of abstract MIMO channels, MIMO Communication for Cellular Networks emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions. MIMO Communication for Cellular Networks describes single-user,...

  6. Vocal Imitation in Parrots Allows Addressing of Specific Individuals in a Dynamic Communication Network

    DEFF Research Database (Denmark)

    Balsby, T.J.S.; Momberg, J.V.; Dabelsteen, T.

    2012-01-01

    €“fronted conures live in fission-fusion flocks where they encounter many different individuals every day, and it is possible that their vocal imitation ability is a flexible means to address a specific individual within a flock. We tested this via playback to short-term captive wild conures. Test birds were placed...... together in pairs in outdoor aviaries to form simple flocks. To simulate imitation of a specific individual these pairs received playback of contact calls that primarily imitate one of the two birds. Overall, individuals that received simulated vocal imitations of its calls responded more frequently...... and faster than the other individual. This suggests that orange-fronted conures can use imitations of contact calls to address specific individuals of a flock. In the discussion we argue that the fission-fusion flock dynamics of many parrot species has been an important factor in evolving conures´ and other...

  7. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  8. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  9. Computer Networks and Globalization

    Directory of Open Access Journals (Sweden)

    J. Magliaro

    2007-07-01

    Full Text Available Communication and information computer networks connect the world in ways that make globalization more natural and inequity more subtle. As educators, we look at these phenomena holistically analyzing them from the realist’s view, thus exploring tensions, (in equity and (injustice, and from the idealist’s view, thus embracing connectivity, convergence and development of a collective consciousness. In an increasingly market- driven world we find examples of openness and human generosity that are based on networks, specifically the Internet. After addressing open movements in publishing, software industry and education, we describe the possibility of a dialectic equilibrium between globalization and indigenousness in view of ecologically designed future smart networks

  10. Electricity networks: how 'natural' is the monopoly?

    International Nuclear Information System (INIS)

    Kuenneke, Rolf W.

    1999-01-01

    This article deals with the changing economic characteristics of the electricity network. Traditionally, electricity networks are considered natural monopolies for various kinds of market failures coincide in this essential part of the electricity infrastructure. Technological induced complementarities between nodes and links are causing network externalities, economies of scale, a high degree of mono-functionality, collective good characteristics and an inherent tendency towards concentrated market structures. It is argued that recent technological trends imply a dramatic change of the network economics, leading to possibilities of inter- and intra-network competition, as well as inter fuel competition. The possible implications for the regulatory framework of this sector are addressed. (Author)

  11. Multilevel method for modeling large-scale networks.

    Energy Technology Data Exchange (ETDEWEB)

    Safro, I. M. (Mathematics and Computer Science)

    2012-02-24

    Understanding the behavior of real complex networks is of great theoretical and practical significance. It includes developing accurate artificial models whose topological properties are similar to the real networks, generating the artificial networks at different scales under special conditions, investigating a network dynamics, reconstructing missing data, predicting network response, detecting anomalies and other tasks. Network generation, reconstruction, and prediction of its future topology are central issues of this field. In this project, we address the questions related to the understanding of the network modeling, investigating its structure and properties, and generating artificial networks. Most of the modern network generation methods are based either on various random graph models (reinforced by a set of properties such as power law distribution of node degrees, graph diameter, and number of triangles) or on the principle of replicating an existing model with elements of randomization such as R-MAT generator and Kronecker product modeling. Hierarchical models operate at different levels of network hierarchy but with the same finest elements of the network. However, in many cases the methods that include randomization and replication elements on the finest relationships between network nodes and modeling that addresses the problem of preserving a set of simplified properties do not fit accurately enough the real networks. Among the unsatisfactory features are numerically inadequate results, non-stability of algorithms on real (artificial) data, that have been tested on artificial (real) data, and incorrect behavior at different scales. One reason is that randomization and replication of existing structures can create conflicts between fine and coarse scales of the real network geometry. Moreover, the randomization and satisfying of some attribute at the same time can abolish those topological attributes that have been undefined or hidden from

  12. Identification and management of distributed data NGN, content-centric networks and the web

    CERN Document Server

    Bartolomeo, Giovanni

    2013-01-01

    Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management. With a focus on the primary problems in identifying, addressing, and

  13. Security for the Mythical Air-Dropped Sensor Network

    NARCIS (Netherlands)

    Gamage, C.D.; Bicakci, K.; Crispo, B.; Tanenbaum, A.S.

    2006-01-01

    The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The security aspects of such networks are addressed as well, and in particular many security papers investigating the security

  14. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  15. Mobile network architecture of the long-range WindScanner system

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Lea, Guillaume; Hansen, Per

    to the acquisition of the mobile network connections with static public IP addresses. The architecture consists of a hardware VPN solution based on the network appliances Z1 and MX60 from Cisco Meraki with additional 3G or 4G dongles. With the presented network architecture and appropriate configuration, we fulfill...

  16. Semantic Technologies for User-Centric Home Network Management

    OpenAIRE

    Ibrahim Rana, Annie

    2015-01-01

    Home area network (HAN) management is problematic for ordinary home users. Lack of user expertise, potential complexity of administration tasks, extreme diversity of network devices, price pressures producing devices with minimal feature sets, and highly dynamic requirements of user applications are some of the main challenges in HANs. As networking becomes enabled in many more HAN devices, these problems are set to increase. A viable solution to address these challenges lie...

  17. Group Coordination Support in Networked Multimedia Systems

    National Research Council Canada - National Science Library

    Dommel, Hans-Peter

    1999-01-01

    .... In this dissertation, we address network control and coordination functions to orchestrate synchronous multimedia groupwork, establishing a sharing discipline on multimedia resources and guaranteeing...

  18. Application and Implementation of Network Coding for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk

    2012-01-01

    the initial development of systems and protocols and show that the potential is there. However, I also find that network coding needs to be implemented with care and protocols have to be designed with consideration to make use of this novel technique. 2) The final aspect of this PhD investigates different...... ways that cooperative models may be implemented to cover a wide range of applications. This addresses the development of user cooperative protocols and how we in Device To Device (D2D) communication may reward users that contribute more to the network than they gain. In this area I suggest the use...

  19. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  20. Cloud RAN for Mobile Networks - a Technology Overview

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU...

  1. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit

  2. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  3. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  4. Networked Memory Project: A Policy Thought Experiment for the Archiving of Social Networks by the Library of Congress of the United States

    Directory of Open Access Journals (Sweden)

    Chloé S. Georas

    2014-07-01

    Full Text Available This article explores the challenges posed by an archival interest in the broad palimpsest of daily life left on social networks that are controlled by private corporations. It addresses whether social networks should be archived for the benefit of future generations and proposes a policy thought experiment to help grapple with these questions, namely, the proposal for the formation of the public interest-oriented Networked Memory Project by the Library of Congress for the archiving of social networks. My discussion of the challenges posed by this thought experiment will focus on the U.S. legal framework within which the Library of Congress operates and take Facebook. To the extent that social networks have user-generated contents that range from the highly “private” to “public” as opposed to other networked platforms that contain materials that are considered “public”, the bar for the historical archival of social networks is much higher. Almost every archival effort must contend with the legal hurdle of copyright, but the archiving of social networks must also address how to handle the potentially sensitive nature of materials that are considered “private” from the perspective of the social and legal constructions of privacy. My theoretical exercise of proposing the formation of the Networked Memory Project by the Library of Congress responds to the need to consider the benefits of a public interest-oriented archive of social networks that can counter the drawbacks of the incidental corporate archiving taking place on social networks.

  5. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  6. Resilience against Misbehaving Nodes in Asynchronous Networks

    OpenAIRE

    Senejohnny, D.; Sundaram, S.; De Persis, C.; Tesi, P.

    2018-01-01

    Network systems are one of the most active research areas in the engineering community as they feature a paradigm shift from centralized to distributed control and computation. When dealing with network systems, a fundamental challenge is to ensure their functioning even when some of the network nodes do not operate as intended due to faults or attacks. The objective of this paper is to address the problem of resilient consensus in a context where the nodes have their own clocks, possibly ope...

  7. Training trajectories by continuous recurrent multilayer networks.

    Science.gov (United States)

    Leistritz, L; Galicki, M; Witte, H; Kochs, E

    2002-01-01

    This paper addresses the problem of training trajectories by means of continuous recurrent neural networks whose feedforward parts are multilayer perceptrons. Such networks can approximate a general nonlinear dynamic system with arbitrary accuracy. The learning process is transformed into an optimal control framework where the weights are the controls to be determined. A training algorithm based upon a variational formulation of Pontryagin's maximum principle is proposed for such networks. Computer examples demonstrating the efficiency of the given approach are also presented.

  8. Relationships, networks and innovation - squaring the circle?

    DEFF Research Database (Denmark)

    Goduscheit, René Chester

    2009-01-01

    energy sector, two specific aspects are addressed: 1) the trade-off between explorative innovation and network efficiency, and 2) the effect of innovating in a network, in which the organisations have established relationships. The case study illustrates that a network based on existing relationships......The virtue of interorganisational networks as the locus of innovation is widely acknowledged. However, it is often neglected that interorganisational collaboration does not automatically lead to idea generation and the exploration of new possibilities. On the basis of a case study from the Danish...... was working efficiently but was lacking the ability to explore new possibilities. On the other hand, a comprehensive network consisting of ‘new' partners did not succeed in getting an outcome from the network....

  9. Seeded Bayesian Networks: Constructing genetic networks from microarray data

    Directory of Open Access Journals (Sweden)

    Quackenbush John

    2008-07-01

    Full Text Available Abstract Background DNA microarrays and other genomics-inspired technologies provide large datasets that often include hidden patterns of correlation between genes reflecting the complex processes that underlie cellular metabolism and physiology. The challenge in analyzing large-scale expression data has been to extract biologically meaningful inferences regarding these processes – often represented as networks – in an environment where the datasets are often imperfect and biological noise can obscure the actual signal. Although many techniques have been developed in an attempt to address these issues, to date their ability to extract meaningful and predictive network relationships has been limited. Here we describe a method that draws on prior information about gene-gene interactions to infer biologically relevant pathways from microarray data. Our approach consists of using preliminary networks derived from the literature and/or protein-protein interaction data as seeds for a Bayesian network analysis of microarray results. Results Through a bootstrap analysis of gene expression data derived from a number of leukemia studies, we demonstrate that seeded Bayesian Networks have the ability to identify high-confidence gene-gene interactions which can then be validated by comparison to other sources of pathway data. Conclusion The use of network seeds greatly improves the ability of Bayesian Network analysis to learn gene interaction networks from gene expression data. We demonstrate that the use of seeds derived from the biomedical literature or high-throughput protein-protein interaction data, or the combination, provides improvement over a standard Bayesian Network analysis, allowing networks involving dynamic processes to be deduced from the static snapshots of biological systems that represent the most common source of microarray data. Software implementing these methods has been included in the widely used TM4 microarray analysis package.

  10. Multicast traffic grooming in flexible optical WDM networks

    Science.gov (United States)

    Patel, Ankitkumar N.; Ji, Philip N.; Jue, Jason P.; Wang, Ting

    2012-12-01

    In Metropolitan Area Networks (MANs), point-to-multipoint applications, such as IPTV, video-on-demand, distance learning, and content distribution, can be efficiently supported through light-tree-based multicastcommunications instead of lightpath-based unicast-communications. The application of multicasting for such traffic is justified by its inherent benefits of reduced control and management overhead and elimination of redundant resource provisioning. Supporting such multicast traffic in Flexible optical WDM (FWDM) networks that can provision light-trees using optimum amount of spectrum within flexible channel spacing leads to higher wavelength and spectral efficiencies compared to the conventional ITU-T fixed grid networks. However, in spite of such flexibility, the residual channel capacity of stranded channels may not be utilized if the network does not offer channels with arbitrary line rates. Additionally, the spectrum allocated to guard bands used to isolate finer granularity channels remains unutilized. These limitations can be addressed by using traffic grooming in which low-rate multicast connections are aggregated and switched over high capacity light-trees. In this paper, we address the multicast traffic grooming problem in FWDM networks, and propose a novel auxiliary graph-based algorithm for the first time. The performance of multicast traffic grooming is evaluated in terms of spectral, cost, and energy efficiencies compared to lightpath-based transparent FWDM networks, lightpathbased traffic grooming-capable FWDM networks, multicast-enabled transparent FWDM networks, and multicast traffic grooming-capable fixed grid networks. Simulation results demonstrate that multicast traffic grooming in FWDM networks not only improves spectral efficiency, but also cost, and energy efficiencies compared to other multicast traffic provisioning approaches of FWDM and fixed grid networks.

  11. Mitigating the controller performance bottlenecks in Software Defined Networks

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius; Soler, José

    2016-01-01

    The centralization of the control plane decision logic in Software Defined Networking (SDN) has raised concerns regarding the performance of the SDN Controller (SDNC) when the network scales up. A number of solutions have been proposed in the literature to address these concerns. This paper...

  12. Liner shipping hub network design in a competitive environment

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan; Pisinger, David

    2010-01-01

    A mixed integer programming formulation is proposed for hub-and-spoke network design in a competitive environment. It addresses the competition between a newcomer liner service provider and an existing dominating operator, both operating on hub-and-spoke networks. The newcomer company maximizes i...

  13. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  14. Routing architecture and security for airborne networks

    Science.gov (United States)

    Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato

    2009-05-01

    Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.

  15. Jana: Confidential Communications on Social Networks

    Science.gov (United States)

    2017-08-09

    consuming phone resources and privacy leakage ?” We address this challenge via an extensive user study. Next, we ask “How can we detect background apps...not support secret group communications. Furthermore, access to such social networks via mobile platforms raises a series of concerns like leakage of...not support secret group communications. Furthermore, access to such social networks via mobile platforms raises a series of concerns like leakage of

  16. Improving ecosystem service frameworks to address wicked problems

    Directory of Open Access Journals (Sweden)

    Kathryn K. Davies

    2015-06-01

    Full Text Available Complex problems often result from the multiple interactions between human activities and ecosystems. The interconnected nature of ecological and social systems should be considered if these "wicked problems" are to be addressed. Ecosystem service approaches provide an opportunity to link ecosystem function with social values, but in practice the essential role that social dynamics play in the delivery of outcomes remains largely unexplored. Social factors such as management regimes, power relationships, skills, and values, can dramatically affect the definition and delivery of ecosystem services. Input from a diverse group of stakeholders improves the capacity of ecosystem service approaches to address wicked problems by acknowledging diverse sets of values and accounting for conflicting world views. Participatory modeling can incorporate both social and ecological dynamics into decision making that involves stakeholders, but is itself a complex social undertaking that may not yield precise or predictable outcomes. We explore the efficacy of different types of participatory modeling in relation to the integration of social values into ecosystem services frameworks and the generation of four important elements of social capital needed to address wicked problems: enhancing social learning and capacity building; increasing transparency; mediating power; and building trust. Our findings indicate that mediated modeling, group mapping, and mental/conceptual modeling are likely to generate elements of social capital that can improve ecosystem service frameworks. Participatory simulation, system dynamic modeling, and Bayesian belief networks, if utilized in isolation, were found to have a low likelihood of generating the social capital needed to improve ecosystem services frameworks. Scenario planning, companion modeling, group model building, and participatory mapping all generate a moderate to high level of social capital elements that improve the

  17. Observability of Automata Networks: Fixed and Switching Cases.

    Science.gov (United States)

    Li, Rui; Hong, Yiguang; Wang, Xingyuan

    2018-04-01

    Automata networks are a class of fully discrete dynamical systems, which have received considerable interest in various different areas. This brief addresses the observability of automata networks and switched automata networks in a unified framework, and proposes simple necessary and sufficient conditions for observability. The results are achieved by employing methods from symbolic computation, and are suited for implementation using computer algebra systems. Several examples are presented to demonstrate the application of the results.

  18. Centrality Robustness and Link Prediction in Complex Social Networks

    DEFF Research Database (Denmark)

    Davidsen, Søren Atmakuri; Ortiz-Arroyo, Daniel

    2012-01-01

    . Secondly, we present a method to predict edges in dynamic social networks. Our experimental results indicate that the robustness of the centrality measures applied to more realistic social networks follows a predictable pattern and that the use of temporal statistics could improve the accuracy achieved......This chapter addresses two important issues in social network analysis that involve uncertainty. Firstly, we present am analysis on the robustness of centrality measures that extend the work presented in Borgati et al. using three types of complex network structures and one real social network...

  19. Using social media for asynchronous collaboration within collaborative networks

    NARCIS (Netherlands)

    Sturkenboom, N.; Baha, S.E.; Lu, Y.; Tempesta, G.; Melkas, H.; Buur, J.

    2013-01-01

    Societal challenges of today (e.g. aging) are complex and often require systemic solutions to be addressed. To address these challenges, various expertise and knowledge are required; in this sense, collaborative network projects have a lot of potential in offering a systemic solution. Design

  20. Fluid Analysis of Network Content Dissemination and Cloud Systems

    Science.gov (United States)

    2017-03-06

    TASK NUMBER 5f.  WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) UNIVERSIDAD ORT URUGUAY CUAREIM 1451 MONTEVIDEO, 11100 UY 8...Paganini Universidad ORT, Cuareim 1451, Montevideo, Uruguay Abstract The project was concerned with optimizing performance in complex network content

  1. Evaluation of constrained mobility for programmability in network management

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.

    2000-01-01

    In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While

  2. Bridging the disconnect: how network creation facilitates female Bangladeshi entrepreneurship.

    NARCIS (Netherlands)

    Maas, J.; Seferiadis, A.A.; Bunders-Aelen, J.G.F.; Zweekhorst, M.B.M.

    2014-01-01

    Networking has been suggested as a tool to address the challenges of social entrepreneurs in severely resource constrained environments. Especially in countries where women do not usually take part in economic activities, like in Bangladesh, stimulating networking and entrepreneurship among women

  3. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    , such as limited wireless bandwidth operation, routing, scheduling, network control, etc. Currently Bluetooth specification particularly does not describe in details about how to implement Quality of Service and Resource Management in Bluetooth protocol stacks. These issues become significant, when the number...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... capacity allocation, network traffic control, inter-piconet scheduling, and buffer management. First, after a short presentation about Bluetooth technology, and QoS issues, queueing models and a simulation-based buffer management have been constructed. Then by using analysis and simulation, it shows some...

  4. Entropy Based Analysis of DNS Query Traffic in the Campus Network

    Directory of Open Access Journals (Sweden)

    Dennis Arturo Ludeña Romaña

    2008-10-01

    Full Text Available We carried out the entropy based study on the DNS query traffic from the campus network in a university through January 1st, 2006 to March 31st, 2007. The results are summarized, as follows: (1 The source IP addresses- and query keyword-based entropies change symmetrically in the DNS query traffic from the outside of the campus network when detecting the spam bot activity on the campus network. On the other hand (2, the source IP addresses- and query keywordbased entropies change similarly each other when detecting big DNS query traffic caused by prescanning or distributed denial of service (DDoS attack from the campus network. Therefore, we can detect the spam bot and/or DDoS attack bot by only watching DNS query access traffic.

  5. Future High Capacity Backbone Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan

    are proposed. The work focuses on energy efficient routing algorithms in a dynamic optical core network environment, with Generalized MultiProtocol Label Switching (GMPLS) as the control plane. Energy ef- ficient routing algorithms for energy savings and CO2 savings are proposed, and their performance...... aiming for reducing the dynamic part of the energy consumption of the network may increase the fixed part of the energy consumption meanwhile. In the second half of the thesis, the conflict between energy efficiency and Quality of Service (QoS) is addressed by introducing a novel software defined......This thesis - Future High Capacity Backbone Networks - deals with the energy efficiency problems associated with the development of future optical networks. In the first half of the thesis, novel approaches for using multiple/single alternative energy sources for improving energy efficiency...

  6. The Network Analysis of Urban Streets: A Dual Approach

    OpenAIRE

    Porta, Sergio; Crucitti, Paolo; Latora, Vito

    2004-01-01

    The application of the network approach to the urban case poses several questions in terms of how to deal with metric distances, what kind of graph representation to use, what kind of measures to investigate, how to deepen the correlation between measures of the structure of the network and measures of the dynamics on the network, what are the possible contributions from the GIS community. In this paper, the authors addresses a study of six cases of urban street networks characterised by diff...

  7. Evaluation of Secure 802.1X Port-Based Network Access Authentication Over 802.11 Wireless Local Area Networks

    National Research Council Canada - National Science Library

    Ozturk, Huseyin

    2003-01-01

    ... addressed. Failing to examine the security risks of WLAN technology and to take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks...

  8. A Temporal-Causal Modelling Approach to Integrated Contagion and Network Change in Social Networks

    NARCIS (Netherlands)

    Blankendaal, Romy; Parinussa, Sarah; Treur, Jan

    2016-01-01

    This paper introduces an integrated temporal-causal model for dynamics in social networks addressing the contagion principle by which states are affected mutually, and both the homophily principle and the more-becomes-more principle by which connections are adapted over time. The integrated model

  9. Performance verification of network function virtualization in software defined optical transport networks

    Science.gov (United States)

    Zhao, Yongli; Hu, Liyazhou; Wang, Wei; Li, Yajie; Zhang, Jie

    2017-01-01

    With the continuous opening of resource acquisition and application, there are a large variety of network hardware appliances deployed as the communication infrastructure. To lunch a new network application always implies to replace the obsolete devices and needs the related space and power to accommodate it, which will increase the energy and capital investment. Network function virtualization1 (NFV) aims to address these problems by consolidating many network equipment onto industry standard elements such as servers, switches and storage. Many types of IT resources have been deployed to run Virtual Network Functions (vNFs), such as virtual switches and routers. Then how to deploy NFV in optical transport networks is a of great importance problem. This paper focuses on this problem, and gives an implementation architecture of NFV-enabled optical transport networks based on Software Defined Optical Networking (SDON) with the procedure of vNFs call and return. Especially, an implementation solution of NFV-enabled optical transport node is designed, and a parallel processing method for NFV-enabled OTN nodes is proposed. To verify the performance of NFV-enabled SDON, the protocol interaction procedures of control function virtualization and node function virtualization are demonstrated on SDON testbed. Finally, the benefits and challenges of the parallel processing method for NFV-enabled OTN nodes are simulated and analyzed.

  10. Integrated control platform for converged optical and wireless networks

    DEFF Research Database (Denmark)

    Yan, Ying

    The next generation of broadband access networks is expected to be heterogeneous. Multiple wired and wireless systems can be integrated, in order to simultaneously provide seamless access with an appropriate Quality of Service (QoS). Wireless networks support ubiquitous connectivity yet low data...... rates, whereas optical networks can offer much higher data rates but only provide fixed connection structures. Their complementary characteristics make the integration of the two networks a promising trend for next generation networks. With combined strengths, the converged network will provide both...... the complementary characteristics of the optical networks and the wireless networks, addresses motivations for their interworking, discusses the current progress in hybrid network architectures as well as the functionalities of a control system, and identifies the achieved research contributions in the integrated...

  11. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  12. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  13. Social Networking Tools and Teacher Education Learning Communities: A Case Study

    Science.gov (United States)

    Poulin, Michael T.

    2014-01-01

    Social networking tools have become an integral part of a pre-service teacher's educational experience. As a result, the educational value of social networking tools in teacher preparation programs must be examined. The specific problem addressed in this study is that the role of social networking tools in teacher education learning communities…

  14. EYES -- Energy Efficient Sensor Networks

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Etalle, Sandro; Karl, Holger; Petrioli, Chiara; Zorzi, Michele; Kip, Harry; Lentsch, Thomas; Conti, M.; Giordano, S.; Gregori, E.; Olariu, S.

    The EYES project (IST-2001-34734) is a three years European research project on self-organizing and collaborative energy-efficient sensor networks. It will address the convergence of distributed information processing, wireless communications, and mobile computing. The goal of the project is to

  15. Optical slotted circuit switched network: a bandwidth efficient alternative to wavelength-routed network

    Science.gov (United States)

    Li, Yan; Collier, Martin

    2007-11-01

    Wavelength-routed networks have received enormous attention due to the fact that they are relatively simple to implement and implicitly offer Quality of Service (QoS) guarantees. However, they suffer from a bandwidth inefficiency problem and require complex Routing and Wavelength Assignment (RWA). Most attempts to address the above issues exploit the joint use of WDM and TDM technologies. The resultant TDM-based wavelength-routed networks partition the wavelength bandwidth into fixed-length time slots organized as a fixed-length frame. Multiple connections can thus time-share a wavelength and the grooming of their traffic leads to better bandwidth utilization. The capability of switching in both wavelength and time domains in such networks also mitigates the RWA problem. However, TMD-based wavelength-routed networks work in synchronous mode and strict synchronization among all network nodes is required. Global synchronization for all-optical networks which operate at extremely high speed is technically challenging, and deploying an optical synchronizer for each wavelength involves considerable cost. An Optical Slotted Circuit Switching (OSCS) architecture is proposed in this paper. In an OSCS network, slotted circuits are created to better utilize the wavelength bandwidth than in classic wavelength-routed networks. The operation of the protocol is such as to avoid the need for global synchronization required by TDM-based wavelength-routed networks.

  16. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    required by the next generation transport network to provide Quality-of-Service (QoS) guaranteed video services. Augmenting network capacity and upgrading network nodes indicate long deployment period, replacement of equipment and thus significant cost to the network service providers. This challenge may...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  17. The Deep Structure of Organizational Online Networking

    DEFF Research Database (Denmark)

    Trier, Matthias; Richter, Alexander

    2015-01-01

    While research on organizational online networking recently increased significantly, most studies adopt quantitative research designs with a focus on the consequences of social network configurations. Very limited attention is paid to comprehensive theoretical conceptions of the complex phenomenon...... of organizational online networking. We address this gap by adopting a theoretical framework of the deep structure of organizational online networking with a focus on their emerging meaning for the employees. We apply and assess the framework in a qualitative case study of a large-scale implementation...... of a corporate social network site (SNS) in a global organization. We reveal organizational online networking as a multi-dimensional phenomenon with multiplex relationships that are unbalanced, primarily consist of weak ties and are subject to temporal change. Further, we identify discourse drivers...

  18. Time-Varying, Multi-Scale Adaptive System Reliability Analysis of Lifeline Infrastructure Networks

    Energy Technology Data Exchange (ETDEWEB)

    Gearhart, Jared Lee [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kurtz, Nolan Scot [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    The majority of current societal and economic needs world-wide are met by the existing networked, civil infrastructure. Because the cost of managing such infrastructure is high and increases with time, risk-informed decision making is essential for those with management responsibilities for these systems. To address such concerns, a methodology that accounts for new information, deterioration, component models, component importance, group importance, network reliability, hierarchical structure organization, and efficiency concerns has been developed. This methodology analyzes the use of new information through the lens of adaptive Importance Sampling for structural reliability problems. Deterioration, multi-scale bridge models, and time-variant component importance are investigated for a specific network. Furthermore, both bridge and pipeline networks are studied for group and component importance, as well as for hierarchical structures in the context of specific networks. Efficiency is the primary driver throughout this study. With this risk-informed approach, those responsible for management can address deteriorating infrastructure networks in an organized manner.

  19. Focus on the emerging new fields of network physiology and network medicine

    Science.gov (United States)

    Ivanov, Plamen Ch; Liu, Kang K. L.; Bartsch, Ronny P.

    2016-10-01

    Despite the vast progress and achievements in systems biology and integrative physiology in the last decades, there is still a significant gap in understanding the mechanisms through which (i) genomic, proteomic and metabolic factors and signaling pathways impact vertical processes across cells, tissues and organs leading to the expression of different disease phenotypes and influence the functional and clinical associations between diseases, and (ii) how diverse physiological systems and organs coordinate their functions over a broad range of space and time scales and horizontally integrate to generate distinct physiologic states at the organism level. Two emerging fields, network medicine and network physiology, aim to address these fundamental questions. Novel concepts and approaches derived from recent advances in network theory, coupled dynamical systems, statistical and computational physics show promise to provide new insights into the complexity of physiological structure and function in health and disease, bridging the genetic and sub-cellular level with inter-cellular interactions and communications among integrated organ systems and sub-systems. These advances form first building blocks in the methodological formalism and theoretical framework necessary to address fundamental problems and challenges in physiology and medicine. This ‘focus on’ issue contains 26 articles representing state-of-the-art contributions covering diverse systems from the sub-cellular to the organism level where physicists have key role in laying the foundations of these new fields.

  20. Leveraging the NPS Femto Satellite for Alternative Satellite Communication Networks

    Science.gov (United States)

    2017-09-01

    programmed for eventual integration with the Iridium Network , which is then tested. C. THESIS ORGANIZATION The thesis addresses these questions...NPS FEMTO SATELLITE FOR ALTERNATIVE SATELLITE COMMUNICATION NETWORKS by Faisal S. Alshaya September 2017 Co-Advisors: Steven J. Iatrou...TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE LEVERAGING THE NPS FEMTO SATELLITE FOR ALTERNATIVE SATELLITE COMMUNICATION NETWORKS 5

  1. Inference on network statistics by restricting to the network space: applications to sexual history data.

    Science.gov (United States)

    Goyal, Ravi; De Gruttola, Victor

    2018-01-30

    Analysis of sexual history data intended to describe sexual networks presents many challenges arising from the fact that most surveys collect information on only a very small fraction of the population of interest. In addition, partners are rarely identified and responses are subject to reporting biases. Typically, each network statistic of interest, such as mean number of sexual partners for men or women, is estimated independently of other network statistics. There is, however, a complex relationship among networks statistics; and knowledge of these relationships can aid in addressing concerns mentioned earlier. We develop a novel method that constrains a posterior predictive distribution of a collection of network statistics in order to leverage the relationships among network statistics in making inference about network properties of interest. The method ensures that inference on network properties is compatible with an actual network. Through extensive simulation studies, we also demonstrate that use of this method can improve estimates in settings where there is uncertainty that arises both from sampling and from systematic reporting bias compared with currently available approaches to estimation. To illustrate the method, we apply it to estimate network statistics using data from the Chicago Health and Social Life Survey. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  2. Microsensing networks for sustainable cities

    CERN Document Server

    Lambrechts, Johannes

    2016-01-01

    This book explores the microsensing technologies and systems now available to monitor the quality of air and water within the urban environment and examines their role in the creation of sustainable cities against the background of the challenges posed by rapid urbanization. The opening section addresses the theoretical and conceptual background of microsensing networks. The coverage includes detailed description of microsensors, supported by design-specific equations, and clear explanation of the ways in which devices that harvest energy from ambient sources can detect and quantify pollution. The practical application of such systems in addressing environmental impacts within cities and in sustainable urban planning is then discussed with the aid of case studies in developing countries. The book will be of interest to all who wish to understand the benefits of microsensing networks in promoting sustainable cities through better delivery of information on health hazards and improved provision of data to envir...

  3. Impact of PON deployment on metro networks

    Science.gov (United States)

    Poirrier, Julien; Herviou, Fabrice; Barboule, Hélène; Moignard, Maryse

    2009-01-01

    FTTH or FTTC, depending on countries and areas, will be the key technology for operators to differentiate themselves from competitors and win market share. Such a disruptive evolution of the access network should be supported by a significant re-design of the higher network layers. In the present paper, the required features of these new WDM networks are presented. Capacity and cost are the two obvious drivers. But versatility will be crucial to cope with an uncertain context (tedious prediction of traffic, regulation and services) and with very diverse population densities. Finally we also address how PON could benefit from mature WDM technologies to ease the global network design.

  4. Convocation address.

    Science.gov (United States)

    Swaminathan, M S

    1998-07-01

    This address delivered to the 40th convocation of the International Institute for Population Sciences in India in 1998 opens by noting that a shortage of jobs for youth is India's most urgent problem but that the problems that attend the increasing numbers of elderly also require serious attention. The address then notes that the Earth's population is growing at an unsustainable rate while economic inequities among countries are increasing, so that, while intellectual property is becoming the most important asset in developed countries, nutritional anemia among pregnant women causes their offspring to be unable to achieve their full intellectual potential from birth. Next, the address uses a discussion of the 18th-century work on population of the Marquis de Condorcet and of Thomas Malthus to lead into a consideration of estimated increased needs of countries like India and China to import food grains in the near future. Next, the progress of demographic transition in Indian states is covered and applied to Mahbub ul Haq's measure of human deprivation developed for and applied to the region of the South Asian Association for Regional Cooperation (India, Pakistan, Bangladesh, Nepal, Sri Lanka, Bhutan, and the Maldives). The address continues by reiterating some of the major recommendations forwarded by a government of India committee charged in 1995 with drafting a national population policy. Finally, the address suggests specific actions that could be important components of the Hunger-Free India Programme and concludes that all success rests on the successful implementation of appropriate population policies.

  5. Optical Network Testbeds Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Joe Mambretti

    2007-06-01

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking

  6. Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites

    OpenAIRE

    Leenes , Ronald ,

    2011-01-01

    Part 3: Part IV: Keynotes; International audience; SNSs pose a plethora of privacy issues that are reasonably well known and understood. Many issues boil down to the same problem: information makes it to the wrong audience. This problem is inherent to the design and business model of the current social network sites. How to cope with this? Two approaches seem obvious: address user behaviour and/or address the architecture of social network sites. In this presentation I will argue that the opt...

  7. Evaluating the Impact of Communication Network Performance on Supervisory Supermarket Control

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Minko, Tomasz; Madsen, Tatiana Kozlova

    2017-01-01

    This paper addresses the evaluation of the impact of non-ideal communication networks on system performance of hierarchical control systems. It develops a stepwise evaluation approach that is applied to the example scenario of a supervisory controller for supermarket temperature control, addressing...... of communication network performance on the supermarket refrigeration control and resulting energy costs using simulation models. The results show that the controller is resilient to downstream information delays, however upstream delays or up- and downstream information loss can cause significant performance...

  8. Comparison of crisp and fuzzy character networks in handwritten word recognition

    Science.gov (United States)

    Gader, Paul; Mohamed, Magdi; Chiang, Jung-Hsien

    1992-01-01

    Experiments involving handwritten word recognition on words taken from images of handwritten address blocks from the United States Postal Service mailstream are described. The word recognition algorithm relies on the use of neural networks at the character level. The neural networks are trained using crisp and fuzzy desired outputs. The fuzzy outputs were defined using a fuzzy k-nearest neighbor algorithm. The crisp networks slightly outperformed the fuzzy networks at the character level but the fuzzy networks outperformed the crisp networks at the word level.

  9. Gap filling strategies for long term energy flux data sets

    DEFF Research Database (Denmark)

    Falge, E.; Baldocchi, D.; Olson, R.

    2001-01-01

    At present a network of over 100 field sites are measuring carbon dioxide, water vapor and sensible heat fluxes between the biosphere and atmosphere, on a nearly continuous basis. Gaps in the long term measurements of evaporation and sensible heat flux must be filled before these data can be used...... for hydrological and meteorological applications. We adapted methods of gap filling for NEE (net ecosystem exchange of carbon) to energy fluxes and applied them to data sets available from the EUROFLUX and AmeriFlux eddy covariance databases. The average data coverage for the sites selected was 69% and 75......% for latent heat (lambdaE) and sensible heat (H). The methods were based on mean diurnal variations (half-hourly binned means of fluxes based on previous and subsequent days, MDV) and look-up tables for fluxes during assorted meteorological conditions (LookUp), and the impact of different gap filling methods...

  10. Reducing traffic in DHT-based discovery protocols for dynamic resources

    Science.gov (United States)

    Carlini, Emanuele; Coppola, Massimo; Laforenza, Domenico; Ricci, Laura

    Existing peer-to-peer approaches for resource location based on distributed hash tables focus mainly on optimizing lookup query resolution. The underlying assumption is that the arrival ratio of lookup queries is higher than the ratio of resource publication operations. We propose a set of optimization strategies to reduce the network traffic generated by the data publication and update process when resources have dynamic-valued attributes. We aim at reducing the publication overhead of supporting multi-attribute range queries. We develop a model predicting the bandwidth reduction, and we assign proper values to the model variables on the basis of real data measurements. We further validate these results by a set of simulations. Our experiments are designed to reproduce the typical behaviour of the resulting scheme within large distributed resource location system, like the resource location service of the XtreemOS Grid-enabled Operating System.

  11. Beyond dark and bright: towards a more holistic understanding of inter-group networks.

    Science.gov (United States)

    Hejnova, Petra

    2010-01-01

    Networks are becoming a popular organizational form for structuring human activities. To date, scholars have addressed networks in a variety of fields, including sociology, economics, public administration, criminology, political science, and international security. However, little has been done so far to systematically examine the similarities, differences, and connections between network forms of organization across different academic disciplines. This has important implications for both theory and practice. The lack of attention paid to organizational similarities and differences prevents the exchange of knowledge developed across fields. In turn, policy-makers cannot take full advantage of existing research, and may miss opportunities to improve the work of some networks and combat that of others. To address this gap in the literature, this paper uses the combination of organizational environments and organizational goals to develop a new typology of inter-group networks, and thus improve our understanding of how human behaviour is coordinated through networks.

  12. Networked Community Change: Understanding Community Systems Change through the Lens of Social Network Analysis.

    Science.gov (United States)

    Lawlor, Jennifer A; Neal, Zachary P

    2016-06-01

    Addressing complex problems in communities has become a key area of focus in recent years (Kania & Kramer, 2013, Stanford Social Innovation Review). Building on existing approaches to understanding and addressing problems, such as action research, several new approaches have emerged that shift the way communities solve problems (e.g., Burns, 2007, Systemic Action Research; Foth, 2006, Action Research, 4, 205; Kania & Kramer, 2011, Stanford Social Innovation Review, 1, 36). Seeking to bring clarity to the emerging literature on community change strategies, this article identifies the common features of the most widespread community change strategies and explores the conditions under which such strategies have the potential to be effective. We identify and describe five common features among the approaches to change. Then, using an agent-based model, we simulate network-building behavior among stakeholders participating in community change efforts using these approaches. We find that the emergent stakeholder networks are efficient when the processes are implemented under ideal conditions. © Society for Community Research and Action 2016.

  13. Overview of an address and purpose of the workshop [ISO Workshop on address standards: Considering the issues related to an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-05-01

    Full Text Available ) (ISO 19112) Precision Redirectable Standards Postal address Street delivery address Y N N Y N Y Fine Y UPU S42 PO Box or Private Bag Y N N Y Fine to Coarse Y UPU S42 Post Restante Y N N Y N Y Coarse Y UPU S42 Delivery address... (for goods, etc) Street address Y N N Y N Y Fine N Intersection address Y N N Y N Y Fine N Landmark address Y N N Y N Y Fine to Moderate N Building address Y N N Y N Y Fine N Site address Y N N Y N Y Fine to Coarse N Farm...

  14. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  15. License Address List

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Address list generated from National Saltwater Angler Registry. Used in conjunction with an address-based sample as per survey design.

  16. Global dissipativity of continuous-time recurrent neural networks with time delay

    International Nuclear Information System (INIS)

    Liao Xiaoxin; Wang Jun

    2003-01-01

    This paper addresses the global dissipativity of a general class of continuous-time recurrent neural networks. First, the concepts of global dissipation and global exponential dissipation are defined and elaborated. Next, the sets of global dissipativity and global exponentially dissipativity are characterized using the parameters of recurrent neural network models. In particular, it is shown that the Hopfield network and cellular neural networks with or without time delays are dissipative systems

  17. Urban networks of tomorrow

    International Nuclear Information System (INIS)

    Bothe, D; Kaufmann, T.

    2016-01-01

    The requirements for urban utility grids are subject to a considerable change. The diversification of the energy supply and the changing feed-in structure (central -> decentral) also influence the operation of the existing networks considerably. Therefore, the focus of future studies will be on the flexibility of energy supply and the energy-carrier-wide network analysis or planning. These aspects are addressed, among other things, within the URBEM project, with a focus on a holistic, interdisciplinary approach. On the basis of separately performed thermal and electrical network calculations an optimization task is defined (for example, minimization of operating resources, minimization of CO2 emissions) and solved under technical conditions. The scenarios for the period 2030 and 2050 developed in the URBEM project serve as the basis for the optimization. The results of the calculations show current utilization or bottlenecks in the supply networks as well as optimum future supply structures for development areas in urban areas. (rössner) [de

  18. Sparsity in Model Gene Regulatory Networks

    International Nuclear Information System (INIS)

    Zagorski, M.

    2011-01-01

    We propose a gene regulatory network model which incorporates the microscopic interactions between genes and transcription factors. In particular the gene's expression level is determined by deterministic synchronous dynamics with contribution from excitatory interactions. We study the structure of networks that have a particular '' function '' and are subject to the natural selection pressure. The question of network robustness against point mutations is addressed, and we conclude that only a small part of connections defined as '' essential '' for cell's existence is fragile. Additionally, the obtained networks are sparse with narrow in-degree and broad out-degree, properties well known from experimental study of biological regulatory networks. Furthermore, during sampling procedure we observe that significantly different genotypes can emerge under mutation-selection balance. All the preceding features hold for the model parameters which lay in the experimentally relevant range. (author)

  19. Moving from theory to practice: A participatory social network mapping approach to address unmet need for family planning in Benin.

    Science.gov (United States)

    Igras, Susan; Diakité, Mariam; Lundgren, Rebecka

    2017-07-01

    In West Africa, social factors influence whether couples with unmet need for family planning act on birth-spacing desires. Tékponon Jikuagou is testing a social network-based intervention to reduce social barriers by diffusing new ideas. Individuals and groups judged socially influential by their communities provide entrée to networks. A participatory social network mapping methodology was designed to identify these diffusion actors. Analysis of monitoring data, in-depth interviews, and evaluation reports assessed the methodology's acceptability to communities and staff and whether it produced valid, reliable data to identify influential individuals and groups who diffuse new ideas through their networks. Results indicated the methodology's acceptability. Communities were actively and equitably engaged. Staff appreciated its ability to yield timely, actionable information. The mapping methodology also provided valid and reliable information by enabling communities to identify highly connected and influential network actors. Consistent with social network theory, this methodology resulted in the selection of informal groups and individuals in both informal and formal positions. In-depth interview data suggest these actors were diffusing new ideas, further confirming their influence/connectivity. The participatory methodology generated insider knowledge of who has social influence, challenging commonly held assumptions. Collecting and displaying information fostered staff and community learning, laying groundwork for social change.

  20. Cloud RAN for Mobile Networks - a Technology Overview

    OpenAIRE

    Checko, Aleksandra; Christiansen, Henrik Lehrmann; Yan, Ying; Scolari, Lara; Kardaras, Georgios; Berger, Michael Stübert; Dittmann, Lars

    2014-01-01

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges the operators face while trying to support growing end-user’s needs. The main idea behind C-RAN is to pool the Baseband Units (BBUs) from multiple base stations into centralized BBU Pool for statistical multiplexing gain, while shifting the burden to the high-speed wireline transmission of In-phase and Quadrature (IQ) data. C-RAN enables energy efficient network operation and pos...

  1. Properties of healthcare teaming networks as a function of network construction algorithms.

    Directory of Open Access Journals (Sweden)

    Martin S Zand

    Full Text Available Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year, making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast

  2. On Determining if Tree-based Networks Contain Fixed Trees.

    Science.gov (United States)

    Anaya, Maria; Anipchenko-Ulaj, Olga; Ashfaq, Aisha; Chiu, Joyce; Kaiser, Mahedi; Ohsawa, Max Shoji; Owen, Megan; Pavlechko, Ella; St John, Katherine; Suleria, Shivam; Thompson, Keith; Yap, Corrine

    2016-05-01

    We address an open question of Francis and Steel about phylogenetic networks and trees. They give a polynomial time algorithm to decide if a phylogenetic network, N, is tree-based and pose the problem: given a fixed tree T and network N, is N based on T? We show that it is [Formula: see text]-hard to decide, by reduction from 3-Dimensional Matching (3DM) and further that the problem is fixed-parameter tractable.

  3. Developing security tools of WSN and WBAN networks applications

    CERN Document Server

    A M El-Bendary, Mohsen

    2015-01-01

    This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

  4. Addresses

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — Point features representing locations of all street addresses in Orange County, NC including Chapel Hill, NC. Data maintained by Orange County, the Town of Chapel...

  5. Using Social Network Analysis to Assess Mentorship and Collaboration in a Public Health Network.

    Science.gov (United States)

    Petrescu-Prahova, Miruna; Belza, Basia; Leith, Katherine; Allen, Peg; Coe, Norma B; Anderson, Lynda A

    2015-08-20

    Addressing chronic disease burden requires the creation of collaborative networks to promote systemic changes and engage stakeholders. Although many such networks exist, they are rarely assessed with tools that account for their complexity. This study examined the structure of mentorship and collaboration relationships among members of the Healthy Aging Research Network (HAN) using social network analysis (SNA). We invited 97 HAN members and partners to complete an online social network survey that included closed-ended questions about HAN-specific mentorship and collaboration during the previous 12 months. Collaboration was measured by examining the activity of the network on 6 types of products: published articles, in-progress manuscripts, grant applications, tools, research projects, and presentations. We computed network-level measures such as density, number of components, and centralization to assess the cohesiveness of the network. Sixty-three respondents completed the survey (response rate, 65%). Responses, which included information about collaboration with nonrespondents, suggested that 74% of HAN members were connected through mentorship ties and that all 97 members were connected through at least one form of collaboration. Mentorship and collaboration ties were present both within and across boundaries of HAN member organizations. SNA of public health collaborative networks provides understanding about the structure of relationships that are formed as a result of participation in network activities. This approach may offer members and funders a way to assess the impact of such networks that goes beyond simply measuring products and participation at the individual level.

  6. Clustering predicts memory performance in networks of spiking and non-spiking neurons

    Directory of Open Access Journals (Sweden)

    Weiliang eChen

    2011-03-01

    Full Text Available The problem we address in this paper is that of finding effective and parsimonious patterns of connectivity in sparse associative memories. This problem must be addressed in real neuronal systems, so that results in artificial systems could throw light on real systems. We show that there are efficient patterns of connectivity and that these patterns are effective in models with either spiking or non-spiking neurons. This suggests that there may be some underlying general principles governing good connectivity in such networks. We also show that the clustering of the network, measured by Clustering Coefficient, has a strong linear correlation to the performance of associative memory. This result is important since a purely static measure of network connectivity appears to determine an important dynamic property of the network.

  7. 8th Conference on Complex Networks

    CERN Document Server

    Menezes, Ronaldo; Sinatra, Roberta; Zlatic, Vinko

    2017-01-01

    This book collects the works presented at the 8th International Conference on Complex Networks (CompleNet) 2017 in Dubrovnik, Croatia, on March 21-24, 2017. CompleNet aims at bringing together researchers and practitioners working in areas related to complex networks. The past two decades has witnessed an exponential increase in the number of publications within this field. From biological systems to computer science, from economic to social systems, complex networks are becoming pervasive in many fields of science. It is this interdisciplinary nature of complex networks that CompleNet aims at addressing. The last decades have seen the emergence of complex networks as the language with which a wide range of complex phenomena in fields as diverse as physics, computer science, and medicine (to name a few) can be properly described and understood. This book provides a view of the state-of-the-art in this dynamic field and covers topics such as network controllability, social structure, online behavior, recommend...

  8. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  9. Neighborhood and Network Disadvantage among Urban Renters

    Directory of Open Access Journals (Sweden)

    Matthew Desmond

    2015-06-01

    Full Text Available Drawing on novel survey data, this study maps the distribution of neighborhood and network disadvantage in a population of Milwaukee renters and evaluates the relationship between each disadvantage and multiple social and health outcomes. We find that many families live in neighborhoods with above average disadvantage but are embedded in networks with below average disadvantage, and vice versa. Neighborhood (but not network disadvantage is associated with lower levels of neighborly trust but also with higher levels of community support (e.g., providing neighbors with food. Network (but not neighborhood disadvantage is associated with lower levels of civic engagement. Asthma and diabetes are associated exclusively with neighborhood disadvantage, but depression is associated exclusively with network disadvantage. These findings imply that some social problems may be better addressed by neighborhood interventions and others by network interventions.

  10. Analysis of Traffic Engineering capabilities for SDN-based Data Center Networks

    DEFF Research Database (Denmark)

    Pilimon, Artur; Kentis, Angelos Mimidis; Ruepp, Sarah Renée

    2018-01-01

    In the recent years more and more existing services have moved from local execution environments into the cloud. In addition, new cloud-based services are emerging, which are characterized by very stringent delay requirements. This trend puts a stress in the existing monolithic architecture of Data...... techniques focusing on their limitations. Then, it highlights the benefits of incorporating the Software Defined Networking (SDN) paradigm to address these limitations. Furthermore, it illustrates two methodologies and addresses the scalability aspect of DCN-oriented TE, network and service testing...

  11. Probabilistic Bandwidth Assignment in Wireless Sensor Networks

    OpenAIRE

    Khan , Dawood; Nefzi , Bilel; Santinelli , Luca; Song , Ye-Qiong

    2012-01-01

    International audience; With this paper we offer an insight in designing and analyzing wireless sensor networks in a versatile manner. Our framework applies probabilistic and component-based design principles for the wireless sensor network modeling and consequently analysis; while maintaining flexibility and accuracy. In particular, we address the problem of allocating and reconfiguring the available bandwidth. The framework has been successfully implemented in IEEE 802.15.4 using an Admissi...

  12. Allegheny County Addressing Landmarks

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  13. Allegheny County Address Points

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  14. Adaptive nonlinear control using input normalized neural networks

    International Nuclear Information System (INIS)

    Leeghim, Henzeh; Seo, In Ho; Bang, Hyo Choong

    2008-01-01

    An adaptive feedback linearization technique combined with the neural network is addressed to control uncertain nonlinear systems. The neural network-based adaptive control theory has been widely studied. However, the stability analysis of the closed-loop system with the neural network is rather complicated and difficult to understand, and sometimes unnecessary assumptions are involved. As a result, unnecessary assumptions for stability analysis are avoided by using the neural network with input normalization technique. The ultimate boundedness of the tracking error is simply proved by the Lyapunov stability theory. A new simple update law as an adaptive nonlinear control is derived by the simplification of the input normalized neural network assuming the variation of the uncertain term is sufficiently small

  15. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  16. Named data networking-based smart home

    Directory of Open Access Journals (Sweden)

    Syed Hassan Ahmed

    2016-09-01

    Full Text Available Named data networking (NDN treats content/data as a “first class citizen” of the network by giving it a “name”. This content “name” is used to retrieve any information, unlike in device-centric networks (i.e., the current Internet, which depend on physical IP addresses. Meanwhile, the smart home concept has been gaining attention in academia and industries; various low-cost embedded devices are considered that can sense, process, store, and communicate data autonomously. In this paper, we study NDN in the context of smart-home communications, discuss the preliminary evaluations, and describe the future challenges of applying NDN in smart-home applications.

  17. Social networks, time homeless, and social support: A study of men on Skid Row.

    Science.gov (United States)

    Green, Harold D; Tucker, Joan S; Golinelli, Daniela; Wenzel, Suzanne L

    2013-12-18

    Homeless men are frequently unsheltered and isolated, disconnected from supportive organizations and individuals. However, little research has investigated these men's social networks. We investigate the structure and composition of homeless men's social networks, vis-a-vis short- and long-term homelessness with a sample of men drawn randomly from meal lines on Skid Row in Los Angeles. Men continuously homeless for the past six months display networks composed of riskier members when compared to men intermittently homeless during that time. Men who report chronic, long-term homelessness display greater social network fragmentation when compared to non-chronically homeless men. While intermittent homelessness affects network composition in ways that may be addressable with existing interventions, chronic homelessness fragments networks, which may be more difficult to address with those interventions. These findings have implications for access to social support from network members which, in turn, impacts the resources homeless men require from other sources such as the government or NGOs.

  18. Autonomous Congestion Control in Delay-Tolerant Networks

    Science.gov (United States)

    Burleigh, Scott; Jennings, Esther; Schoolcraft, Joshua

    2006-01-01

    This presentation highlights communication congestion control in delay-tolerant networks (DTNs). Large-scale future space exploration will offer complex communication challenges that may be best addressed by establishing a network infrastructure. However, current internet techniques for congestion control are not well suited for operation of a network over interplanetary distances. An alternative, delay-tolerant technique for congestion control in a delay-tolerant network is presented. A simple DTN was constructed and an experimental congestion control mechanism was applied. The mechanism appeared to be effective and each router was able to make its bundle acceptance decisions autonomously. Future research will examine more complex topologies and alternative bundle acceptance rules that might enhance performance.

  19. Hybrid Evolutionary Metaheuristics for Concurrent Multi-Objective Design of Urban Road and Public Transit Networks

    NARCIS (Netherlands)

    Miandoabchi, Elnaz; Farahani, Reza Zanjirani; Dullaert, Wout; Szeto, W. Y.

    This paper addresses a bi-modal multi-objective discrete urban road network design problem with automobile and bus flow interaction. The problem considers the concurrent urban road and bus network design in which the authorities play a major role in designing bus network topology. The road network

  20. South African address standard and initiatives towards an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-10-01

    Full Text Available ; visiting friends; and providing a reference context for presenting other information. The benefits of an international address standards include: enabling address interoperability across boundaries; reducing service delivery costs; enabling development...

  1. Management of information supporting Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  2. Packet Classification by Multilevel Cutting of the Classification Space: An Algorithmic-Architectural Solution for IP Packet Classification in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Motasem Aldiab

    2008-01-01

    Full Text Available Traditionally, the Internet provides only a “best-effort” service, treating all packets going to the same destination equally. However, providing differentiated services for different users based on their quality requirements is increasingly becoming a demanding issue. For this, routers need to have the capability to distinguish and isolate traffic belonging to different flows. This ability to determine the flow each packet belongs to is called packet classification. Technology vendors are reluctant to support algorithmic solutions for classification due to their nondeterministic performance. Although content addressable memories (CAMs are favoured by technology vendors due to their deterministic high-lookup rates, they suffer from the problems of high-power consumption and high-silicon cost. This paper provides a new algorithmic-architectural solution for packet classification that mixes CAMs with algorithms based on multilevel cutting of the classification space into smaller spaces. The provided solution utilizes the geometrical distribution of rules in the classification space. It provides the deterministic performance of CAMs, support for dynamic updates, and added flexibility for system designers.

  3. The impact of gender, social capital and networks on business ownership

    DEFF Research Database (Denmark)

    Neergaard, Helle; Shaw, Eleanor; Carter, Sara

    2005-01-01

    The article develops a conceptual model of business owner networking and argues that whilst network theory can provide an understanding of the impact which social capital has on the entrepreneurial process, a concentration on quantiatiave metodologies has restricted fully understanding this....... Further, to address the gender bias in small firm network research the paper integrates social support theory into the conceptual model....

  4. Clustering algorithm in initialization of multi-hop wireless sensor networks

    NARCIS (Netherlands)

    Guo, Peng; Tao, Jiang; Zhang, Kui; Chen, Hsiao-Hwa

    2009-01-01

    In most application scenarios of wireless sensor networks (WSN), sensor nodes are usually deployed randomly and do not have any knowledge about the network environment or even their ID's at the initial stage of their operations. In this paper, we address the clustering problems with a newly deployed

  5. On design and evaluation of tapped-delay neural network architectures

    DEFF Research Database (Denmark)

    Svarer, Claus; Hansen, Lars Kai; Larsen, Jan

    1993-01-01

    Pruning and evaluation of tapped-delay neural networks for the sunspot benchmark series are addressed. It is shown that the generalization ability of the networks can be improved by pruning using the optimal brain damage method of Le Cun, Denker and Solla. A stop criterion for the pruning algorithm...

  6. Nourishing networks: A social-ecological analysis of a network intervention for improving household nutrition in Western Kenya.

    Science.gov (United States)

    DeLorme, Autumn L; Gavenus, Erika R; Salmen, Charles R; Benard, Gor Ouma; Mattah, Brian; Bukusi, Elizabeth; Fiorella, Kathryn J

    2018-01-01

    A growing body of research emphasizes the need to engage social networks in maternal and child nutrition interventions. However, an understanding of how interventions functionally engage not only mothers but fathers, grandparents, friends, and other social network members remains limited. This study uses an adaptation of a social-ecological model to analyze the multiple levels at which the Kanyakla Nutrition Program operates to change behavior. This study analyzes focus group data (four groups; n = 35, 7 men and 28 women) following the implementation of the Kanyakla Nutrition Program, a novel nutrition intervention engaging social networks to increase nutrition knowledge, shift perceptions, and promote positive practices for infant and young child feeding and community nutrition in general. Participant perspectives indicate that the Kanyakla Nutrition Program contributed to nutrition knowledge and confidence, changed perceptions, and supported infant and child feeding practices at the individual, interpersonal, and institutional levels. However, many respondents report challenges in transcending barriers at the broader community and systems levels of influence, where environmental and economic constraints continue to affect food access. Analysis of the Kanyakla Nutrition Program suggests that for interventions addressing household level determinants of nutrition, simultaneously engaging the household's network of interpersonal and community relationships can play a role in building momentum and consensus to address persistent structural barriers to improved nutrition. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. A cyberciege traffic analysis extension for teaching network security

    OpenAIRE

    Chang, Xuquan Stanley.; Chua, Kim Yong.

    2011-01-01

    CyberCIEGE is an interactive game simulating realistic scenarios that teaches the players Information Assurance (IA) concepts. The existing game scenarios only provide a high-level abstraction of the networked environment, e.g., nodes do not have Internet protocol (IP) addresses or belong to proper subnets, and there is no packet-level network simulation. This research explored endowing the game with network level traffic analysis, and implementing a game scenario to take advantage of this ne...

  8. Linking Environmental Orientation to Start-ups’ Networking Activities

    DEFF Research Database (Denmark)

    Dickel, Petra; Ritter, Thomas

    Besides for-profit start-ups, an increasing number of firms start their existence with the purpose to “do good” for society – mirrored in an increasing academic discussion of sustainable firms. Yet, there is little research on the networking activities of start-ups that do not have profit...... generation as their primary focus. Addressing this research gap, we develop hypotheses on the different networking activities of environmentally oriented start-ups arguing that their societal focus has a positive impact on the frequency of their networking and the size of their network. For empirically...... investigating such networking differences, we use data from 179 technology-based start-ups and show that start-ups with a strong external environmental orientation have significantly higher networking frequency and build larger networks. On the contrary, strong internal environmental orientation is linked...

  9. The Role of Environmental Orientation in Business Networks

    DEFF Research Database (Denmark)

    Ritter, Thomas; Dickel, Petra

    Besides for-profit start-ups, an increasing number of firms start their existence with the purpose to “do good” for society – mirrored in an increasing academic discussion of sustainable firms. Yet, there is little research on the networking activities of start-ups that do not have profit...... generation as their primary focus. Addressing this research gap, we develop hypotheses on the different networking activities of environmentally oriented start-ups arguing that their societal focus has a positive impact on the frequency of their networking and the size of their network. For empirically...... investigating such networking differences, we use data from 179 technology-based start-ups and show that start-ups with a strong external environmental orientation have significantly higher networking frequency and build larger networks. On the contrary, strong internal environmental orientation is linked...

  10. Autonomic Wireless Sensor Networks: A Systematic Literature Review

    Directory of Open Access Journals (Sweden)

    Jesús M. T. Portocarrero

    2014-01-01

    Full Text Available Autonomic computing (AC is a promising approach to meet basic requirements in the design of wireless sensor networks (WSNs, and its principles can be applied to efficiently manage nodes operation and optimize network resources. Middleware for WSNs supports the implementation and basic operation of such networks. In this systematic literature review (SLR we aim to provide an overview of existing WSN middleware systems that address autonomic properties. The main goal is to identify which development approaches of AC are used for designing WSN middleware system, which allow the self-management of WSN. Another goal is finding out which interactions and behavior can be automated in WSN components. We drew the following main conclusions from the SLR results: (i the selected studies address WSN concerns according to the self-* properties of AC, namely, self-configuration, self-healing, self-optimization, and self-protection; (ii the selected studies use different approaches for managing the dynamic behavior of middleware systems for WSN, such as policy-based reasoning, context-based reasoning, feedback control loops, mobile agents, model transformations, and code generation. Finally, we identified a lack of comprehensive system architecture designs that support the autonomy of sensor networking.

  11. Actor-network Theory and cartography of controversies in Information Science

    OpenAIRE

    LOURENÇO, Ramon Fernandes; TOMAÉL, Maria Inês

    2018-01-01

    Abstract The present study aims to discuss the interactions between the Actor-network Theory and the Cartography of Controversies method in Information Science research. A literature review was conducted on books, scholarly articles, and any other sources addressing the Theory-Actor Network and Cartography of Controversies. The understanding of the theoretical assumptions that guide the Network-Actor Theory allows examining important aspects to Information Science research, seeking to identif...

  12. A Network SIG is born, DECUS (Switzerland) Newsletter, May 1990

    CERN Document Server

    Heagerty, Denise

    1990-01-01

    This article announces the formation of a Swiss DECUS (DEC Users Group) Network SIG in May 1990. The goal of this SIG is to help Swiss DECnet managers to plan transition from their proprietary DECnet Phase IV networks (e.g. the HEP/SPAN DECnet) to open networks based on DECnet Phase V/OSI. The SIG also proposes to address integration with UNIX based workstations using the Internet's TCP/IP protocols.

  13. An Improved Tarpit for Network Deception

    Science.gov (United States)

    2016-03-25

    pollute network measurement studies, as well as note the negative impact that even small blocks of tarpit address spaces have on automated scanners...to ping Greasy and LaBrea hosts: a Mac OS X Version 10.10.5 machine on a home residential net- work in California, the CentOS Linux release 7.2.1511...attack analysis and democracy,” 2010. [18] C. Ruvalcaba, “ Smart IDS – Hybrid LaBrea Tarpit,” SANS Institute, Report, 2009. [19] V. Oppleman, “Network

  14. Immunization of Epidemics in Multiplex Networks

    Science.gov (United States)

    Zhao, Dawei; Wang, Lianhai; Li, Shudong; Wang, Zhen; Wang, Lin; Gao, Bo

    2014-01-01

    Up to now, immunization of disease propagation has attracted great attention in both theoretical and experimental researches. However, vast majority of existing achievements are limited to the simple assumption of single layer networked population, which seems obviously inconsistent with recent development of complex network theory: each node could possess multiple roles in different topology connections. Inspired by this fact, we here propose the immunization strategies on multiplex networks, including multiplex node-based random (targeted) immunization and layer node-based random (targeted) immunization. With the theory of generating function, theoretical analysis is developed to calculate the immunization threshold, which is regarded as the most critical index for the effectiveness of addressed immunization strategies. Interestingly, both types of random immunization strategies show more efficiency in controlling disease spreading on multiplex Erdös-Rényi (ER) random networks; while targeted immunization strategies provide better protection on multiplex scale-free (SF) networks. PMID:25401755

  15. Immunization of epidemics in multiplex networks.

    Science.gov (United States)

    Zhao, Dawei; Wang, Lianhai; Li, Shudong; Wang, Zhen; Wang, Lin; Gao, Bo

    2014-01-01

    Up to now, immunization of disease propagation has attracted great attention in both theoretical and experimental researches. However, vast majority of existing achievements are limited to the simple assumption of single layer networked population, which seems obviously inconsistent with recent development of complex network theory: each node could possess multiple roles in different topology connections. Inspired by this fact, we here propose the immunization strategies on multiplex networks, including multiplex node-based random (targeted) immunization and layer node-based random (targeted) immunization. With the theory of generating function, theoretical analysis is developed to calculate the immunization threshold, which is regarded as the most critical index for the effectiveness of addressed immunization strategies. Interestingly, both types of random immunization strategies show more efficiency in controlling disease spreading on multiplex Erdös-Rényi (ER) random networks; while targeted immunization strategies provide better protection on multiplex scale-free (SF) networks.

  16. Network brokers in the periphery

    DEFF Research Database (Denmark)

    Leick, Birgit; Gretzinger, Susanne; Ingstrup, Mads Bruun

    in a way that both enterprise development and regional competitiveness in rural-peripheral regions are supported. Based on a case study of four network brokers from peripheral regions in Germany, we shed light on the activities of brokers with regard to networking among local businesses and the effects...... on knowledge sharing. The paper will also critically discuss governance implications of network brokers in the periphery, which are associated with the (lack of) integration of such actors with established local and regional governance infrastructures.......Research on rural-peripheral regions stresses that such environments face multiple challenges in a globalised world, which, from a policy perspective, should be addressed to enhance regional competitiveness. These challenges are typically associated with a prevalence of small and medium...

  17. Artificial neural networks a practical course

    CERN Document Server

    da Silva, Ivan Nunes; Andrade Flauzino, Rogerio; Liboni, Luisa Helena Bartocci; dos Reis Alves, Silas Franco

    2017-01-01

    This book provides comprehensive coverage of neural networks, their evolution, their structure, the problems they can solve, and their applications. The first half of the book looks at theoretical investigations on artificial neural networks and addresses the key architectures that are capable of implementation in various application scenarios. The second half is designed specifically for the production of solutions using artificial neural networks to solve practical problems arising from different areas of knowledge. It also describes the various implementation details that were taken into account to achieve the reported results. These aspects contribute to the maturation and improvement of experimental techniques to specify the neural network architecture that is most appropriate for a particular application scope. The book is appropriate for students in graduate and upper undergraduate courses in addition to researchers and professionals.

  18. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  19. Maintaining relationships is critical in network's success.

    Science.gov (United States)

    Huerta, Timothy

    2006-01-01

    As the authors of the lead paper recognize, networks have become an increasingly popular form of organizing, both in the delivery of public services and within political arenas. A network is an arrangement of individuals and/or organizations that are linked through connections that range from informal relationships to formally agreed protocols. Networks have proved useful in addressing complex and intractable problems that require a holistic approach to identifying and implementing long-term solutions. They succeed in situations where hierarchies and "silo-based" systems have failed, and are particularly valuable in facilitating the transfer of resources and knowledge across sectoral and organizational boundaries.

  20. A review of critical heat flux prediction technique and its application in CANDU reactor

    International Nuclear Information System (INIS)

    Park, Jee Won; Roh, Gyu Hong

    1997-09-01

    The CHF prediction method being used for CANDU reactor have been critically reviewed. The AECL's CHF prediction totally depends on the look-up table which has been developed from many CHF databank. These databanks include not only the water-cooled bundle-CHF data but also the freon-cooled bundle-CHF data. The CHF look-up tables have been developed by smoothing and interpolating (with some extrapolations) the experimental data to construct a practically useful CHF table. Therefore, the table look-up method has advantages of accuracy, consistency in a wide range of thermal-hydraulic parameters. It seems, however, that since the existing look-up table is constructed by many steps of modification of the original experimental data (e.g., the look-up table is constructed not only using the horizontal flow data but also the vertical flow data), one should be very careful when one try to generate a look-up table for other fuel geometries. In other words, a reliable look-up table can be constructed by performing experiments for new fuel geometry. Finally, it should be noted that the modifications to the original experimental data has simple form with many modification parameters for taking into account of different geometrical effects. This report presents the backbone and the validity of AECL CHF look-up table. (author). 22 refs., 2 tabs., 2 figs

  1. Scaling properties in time-varying networks with memory

    Science.gov (United States)

    Kim, Hyewon; Ha, Meesoon; Jeong, Hawoong

    2015-12-01

    The formation of network structure is mainly influenced by an individual node's activity and its memory, where activity can usually be interpreted as the individual inherent property and memory can be represented by the interaction strength between nodes. In our study, we define the activity through the appearance pattern in the time-aggregated network representation, and quantify the memory through the contact pattern of empirical temporal networks. To address the role of activity and memory in epidemics on time-varying networks, we propose temporal-pattern coarsening of activity-driven growing networks with memory. In particular, we focus on the relation between time-scale coarsening and spreading dynamics in the context of dynamic scaling and finite-size scaling. Finally, we discuss the universality issue of spreading dynamics on time-varying networks for various memory-causality tests.

  2. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  3. Networking of small cities to gain sustainability

    OpenAIRE

    Mingaleva , Zhanna; Sheresheva , Marina; Oborin , Matvey; Gvarliani , Tatyana

    2017-01-01

    International audience; The paper addresses networking as a basis for cooperation of small cities leading to more sustainable regional development at the city, regional, and federal level. It is shown that networking of cities can contribute to increasing sustainability in many ways. Still, additional research is needed to adjust best management practices discussed in the relevant academic literature to the peculiarities of transition economies. The objective of the research presented in the ...

  4. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  5. A Mixed Transmission Strategy to Achieve Energy Balancing in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Liu, Tong; Gu, Tao; Jin, Ning

    2017-01-01

    In this paper, we investigate the problem of energy balanced data collection in wireless sensor networks, aiming to balance energy consumption among all sensor nodes during the data propagation process. Energy balanced data collection can potentially save energy consumption and prolong network...... lifetime, and hence, it has many practical implications for sensor network design and deployment. The traditional hop-by-hop transmission model allows a sensor node to propagate its packets in a hop-by-hop manner toward the sink, resulting in poor energy balancing for the entire network. To address...... the problem, we apply a slice-based energy model, and divide the problem into inter-slice and intra-slice energy balancing problems. We then propose a probability-based strategy named inter-slice mixed transmission protocol and an intra-slice forwarding technique to address each of the problems. We propose...

  6. Technical Meeting on Establishing Networks for Countries Introducing Nuclear Power. Presentations

    International Nuclear Information System (INIS)

    2013-01-01

    The objectives of the meeting were to: • Learn about existing networking opportunities that may be of interest for embarking countries; • Discuss common challenges among Member States that could be addressed through better networking opportunities; • Determine appropriate sub-networks, such as future owner/operator organizations, heads of nuclear energy programme implementing organizations (NEPIOs), embarking countries and countries with current civil nuclear programmes; and • Discuss effective strategies for creating networks using existing social media platforms

  7. Passivity analysis of memristor-based impulsive inertial neural networks with time-varying delays.

    Science.gov (United States)

    Wan, Peng; Jian, Jigui

    2018-03-01

    This paper focuses on delay-dependent passivity analysis for a class of memristive impulsive inertial neural networks with time-varying delays. By choosing proper variable transformation, the memristive inertial neural networks can be rewritten as first-order differential equations. The memristive model presented here is regarded as a switching system rather than employing the theory of differential inclusion and set-value map. Based on matrix inequality and Lyapunov-Krasovskii functional method, several delay-dependent passivity conditions are obtained to ascertain the passivity of the addressed networks. In addition, the results obtained here contain those on the passivity for the addressed networks without impulse effects as special cases and can also be generalized to other neural networks with more complex pulse interference. Finally, one numerical example is presented to show the validity of the obtained results. Copyright © 2018 ISA. Published by Elsevier Ltd. All rights reserved.

  8. A Simplified Network Model for Travel Time Reliability Analysis in a Road Network

    Directory of Open Access Journals (Sweden)

    Kenetsu Uchida

    2017-01-01

    Full Text Available This paper proposes a simplified network model which analyzes travel time reliability in a road network. A risk-averse driver is assumed in the simplified model. The risk-averse driver chooses a path by taking into account both a path travel time variance and a mean path travel time. The uncertainty addressed in this model is that of traffic flows (i.e., stochastic demand flows. In the simplified network model, the path travel time variance is not calculated by considering all travel time covariance between two links in the network. The path travel time variance is calculated by considering all travel time covariance between two adjacent links in the network. Numerical experiments are carried out to illustrate the applicability and validity of the proposed model. The experiments introduce the path choice behavior of a risk-neutral driver and several types of risk-averse drivers. It is shown that the mean link flows calculated by introducing the risk-neutral driver differ as a whole from those calculated by introducing several types of risk-averse drivers. It is also shown that the mean link flows calculated by the simplified network model are almost the same as the flows calculated by using the exact path travel time variance.

  9. Neural networks for perception human and machine perception

    CERN Document Server

    Wechsler, Harry

    1991-01-01

    Neural Networks for Perception, Volume 1: Human and Machine Perception focuses on models for understanding human perception in terms of distributed computation and examples of PDP models for machine perception. This book addresses both theoretical and practical issues related to the feasibility of both explaining human perception and implementing machine perception in terms of neural network models. The book is organized into two parts. The first part focuses on human perception. Topics on network model ofobject recognition in human vision, the self-organization of functional architecture in t

  10. On the Complexity of Reconstructing Chemical Reaction Networks

    DEFF Research Database (Denmark)

    Fagerberg, Rolf; Flamm, Christoph; Merkle, Daniel

    2013-01-01

    The analysis of the structure of chemical reaction networks is crucial for a better understanding of chemical processes. Such networks are well described as hypergraphs. However, due to the available methods, analyses regarding network properties are typically made on standard graphs derived from...... the full hypergraph description, e.g. on the so-called species and reaction graphs. However, a reconstruction of the underlying hypergraph from these graphs is not necessarily unique. In this paper, we address the problem of reconstructing a hypergraph from its species and reaction graph and show NP...

  11. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  12. Effects of budget constraints on conservation network design for biodiversity and ecosystem services

    NARCIS (Netherlands)

    Remme, Roy P.; Schröter, Matthias

    2016-01-01

    Limited budgets and budget cuts hamper the development of effective biodiversity conservation networks. Optimizing the spatial configuration of conservation networks given such budget constraints remains challenging. Systematic conservation planning addresses this challenge. Systematic

  13. The effects of local street network characteristics on the positional accuracy of automated geocoding for geographic health studies

    Directory of Open Access Journals (Sweden)

    Zimmerman Dale L

    2010-02-01

    Full Text Available Abstract Background Automated geocoding of patient addresses for the purpose of conducting spatial epidemiologic studies results in positional errors. It is well documented that errors tend to be larger in rural areas than in cities, but possible effects of local characteristics of the street network, such as street intersection density and street length, on errors have not yet been documented. Our study quantifies effects of these local street network characteristics on the means and the entire probability distributions of positional errors, using regression methods and tolerance intervals/regions, for more than 6000 geocoded patient addresses from an Iowa county. Results Positional errors were determined for 6376 addresses in Carroll County, Iowa, as the vector difference between each 100%-matched automated geocode and its ground-truthed location. Mean positional error magnitude was inversely related to proximate street intersection density. This effect was statistically significant for both rural and municipal addresses, but more so for the former. Also, the effect of street segment length on geocoding accuracy was statistically significant for municipal, but not rural, addresses; for municipal addresses mean error magnitude increased with length. Conclusion Local street network characteristics may have statistically significant effects on geocoding accuracy in some places, but not others. Even in those locales where their effects are statistically significant, street network characteristics may explain a relatively small portion of the variability among geocoding errors. It appears that additional factors besides rurality and local street network characteristics affect accuracy in general.

  14. C2 Network Analysis: Insights into Coordination & Understanding

    National Research Council Canada - National Science Library

    Hansberger, Jeffrey T; Schreiber, Craig; Spain, Randall D

    2008-01-01

    ...) workload management. This paper will address recent efforts, tools, and approaches on measuring and analyzing two of these distributed cognitive attributes through network analysis, coordination across agents and mental models...

  15. Neuronal correlates of a virtual-reality-based passive sensory P300 network.

    Science.gov (United States)

    Chen, Chun-Chuan; Syue, Kai-Syun; Li, Kai-Chiun; Yeh, Shih-Ching

    2014-01-01

    P300, a positive event-related potential (ERP) evoked at around 300 ms after stimulus, can be elicited using an active or passive oddball paradigm. Active P300 requires a person's intentional response, whereas passive P300 does not require an intentional response. Passive P300 has been used in incommunicative patients for consciousness detection and brain computer interface. Active and passive P300 differ in amplitude, but not in latency or scalp distribution. However, no study has addressed the mechanism underlying the production of passive P300. In particular, it remains unclear whether the passive P300 shares an identical active P300 generating network architecture when no response is required. This study aims to explore the hierarchical network of passive sensory P300 production using dynamic causal modelling (DCM) for ERP and a novel virtual reality (VR)-based passive oddball paradigm. Moreover, we investigated the causal relationship of this passive P300 network and the changes in connection strength to address the possible functional roles. A classical ERP analysis was performed to verify that the proposed VR-based game can reliably elicit passive P300. The DCM results suggested that the passive and active P300 share the same parietal-frontal neural network for attentional control and, underlying the passive network, the feed-forward modulation is stronger than the feed-back one. The functional role of this forward modulation may indicate the delivery of sensory information, automatic detection of differences, and stimulus-driven attentional processes involved in performing this passive task. To our best knowledge, this is the first study to address the passive P300 network. The results of this study may provide a reference for future clinical studies on addressing the network alternations under pathological states of incommunicative patients. However, caution is required when comparing patients' analytic results with this study. For example, the task

  16. Neuronal correlates of a virtual-reality-based passive sensory P300 network.

    Directory of Open Access Journals (Sweden)

    Chun-Chuan Chen

    Full Text Available P300, a positive event-related potential (ERP evoked at around 300 ms after stimulus, can be elicited using an active or passive oddball paradigm. Active P300 requires a person's intentional response, whereas passive P300 does not require an intentional response. Passive P300 has been used in incommunicative patients for consciousness detection and brain computer interface. Active and passive P300 differ in amplitude, but not in latency or scalp distribution. However, no study has addressed the mechanism underlying the production of passive P300. In particular, it remains unclear whether the passive P300 shares an identical active P300 generating network architecture when no response is required. This study aims to explore the hierarchical network of passive sensory P300 production using dynamic causal modelling (DCM for ERP and a novel virtual reality (VR-based passive oddball paradigm. Moreover, we investigated the causal relationship of this passive P300 network and the changes in connection strength to address the possible functional roles. A classical ERP analysis was performed to verify that the proposed VR-based game can reliably elicit passive P300. The DCM results suggested that the passive and active P300 share the same parietal-frontal neural network for attentional control and, underlying the passive network, the feed-forward modulation is stronger than the feed-back one. The functional role of this forward modulation may indicate the delivery of sensory information, automatic detection of differences, and stimulus-driven attentional processes involved in performing this passive task. To our best knowledge, this is the first study to address the passive P300 network. The results of this study may provide a reference for future clinical studies on addressing the network alternations under pathological states of incommunicative patients. However, caution is required when comparing patients' analytic results with this study. For example

  17. Addressing uncertainty in atomistic machine learning

    DEFF Research Database (Denmark)

    Peterson, Andrew A.; Christensen, Rune; Khorshidi, Alireza

    2017-01-01

    Machine-learning regression has been demonstrated to precisely emulate the potential energy and forces that are output from more expensive electronic-structure calculations. However, to predict new regions of the potential energy surface, an assessment must be made of the credibility of the predi......Machine-learning regression has been demonstrated to precisely emulate the potential energy and forces that are output from more expensive electronic-structure calculations. However, to predict new regions of the potential energy surface, an assessment must be made of the credibility...... of the predictions. In this perspective, we address the types of errors that might arise in atomistic machine learning, the unique aspects of atomistic simulations that make machine-learning challenging, and highlight how uncertainty analysis can be used to assess the validity of machine-learning predictions. We...... suggest this will allow researchers to more fully use machine learning for the routine acceleration of large, high-accuracy, or extended-time simulations. In our demonstrations, we use a bootstrap ensemble of neural network-based calculators, and show that the width of the ensemble can provide an estimate...

  18. Application of the new IAPWS Guideline on the fast and accurate calculation of steam and water properties with the Spline-Based Table Look-Up Method (SBTL) in RELAP-7

    Energy Technology Data Exchange (ETDEWEB)

    Kunick, Matthias; Kretzschmar, Hans-Joachim [Zittau/Goerlitz Univ. of Applied Sciences, Zittau (Germany). Dept. of Technical Thermodynamics; Berry, Ray A.; Martineau, Richard C. [Idaho National Laboratory, Idaho Falls, ID (United States). Nuclear Science and Technology; Gampe, Uwe [Dresden Univ. of Technology (Germany). Chair of Thermal Power Machinery and Plants

    2017-07-15

    The numerical simulation of thermalhydraulic processes in nuclear power plants requires very accurate and extremely fast algorithms for calculating the thermophysical properties of water and steam. In order to provide such algorithms, the International Association for the Properties of Water and Steam (IAPWS) has adopted the new ''IAPWS Guideline on the Fast Calculation of Steam and Water Properties with the Spline-Based Table Look-Up Method (SBTL)''. In this article, the SBTL method is applied to property functions of specific volume and specific internal energy (v,e) based on the scientific formulation IAPWS-95 and the latest IAPWS formulations for transport properties. From the newly generated SBTL functions, thermodynamic and transport properties as well as their derivatives and inverse functions are calculable in the fluid range of state for pressures up to 100 MPa and for temperatures up to 1273 K, including the metastable liquid and the metastable vapor regions. The SBTL functions reproduce the underlying formulations with an accuracy of 10-100 ppm and significantly reduced computing times. The SBTL method has been implemented into the nuclear reactor system safety analysis code RELAP-7 [2] to consider the real fluid behavior of water and steam in a novel 7-equation two-phase flow model.

  19. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  20. Addressing climate and energy misconceptions - teaching tools offered by the Climate Literacy and Energy Awareness Network (CLEAN)

    Science.gov (United States)

    Gold, A. U.; Ledley, T. S.; Kirk, K. B.; Grogan, M.; McCaffrey, M. S.; Buhr, S. M.; Manduca, C. A.; Fox, S.; Niepold, F.; Howell, C.; Lynds, S. E.

    2011-12-01

    Despite a prevalence of peer-reviewed scientific research and high-level reports by intergovernmental agencies (e.g., IPCC) that document changes in our climate and consequences for human societies, the public discourse regards these topics as controversial and sensitive. The chasm between scientific-based understanding of climate systems and public understanding can most easily be addressed via high quality, science-based education on these topics. Well-trained and confident educators are required to provide this education. However, climate science and energy awareness are complex topics that are rapidly evolving and have a great potential for controversy. Furthermore, the interdisciplinary nature of climate science further increases the difficulty for teachers to stay abreast of the science and the policy. Research has shown that students and educators alike hold misconceptions about the climate system in general and the causes and effects of climate change in particular. The NSF-funded CLEAN Pathway (http://cleanet.org) as part of the National Science Digital Library (http://www.nsdl.org) strives to address these needs and help educators address misconceptions by providing high quality learning resources and professional development opportunities to support educators of grade levels 6 through 16. The materials focus on teaching climate science and energy use. The scope and framework of the CLEAN Pathway is defined by the Essential Principles of Climate Science (CCSP, 2009) and the Energy Literacy Principles recently developed by the Department of Energy. Following this literacy-based approach, CLEAN helps with developing mental models to address misconceptions around climate science and energy awareness through a number of different avenues. These are: 1) Professional development opportunities for educators - interactive webinars for secondary teachers and virtual workshops for college faculty, 2) A collection of scientifically and pedagogically reviewed, high

  1. Extending network approach to language dynamics and human cognition. Comment on "Approaching human language with complex networks" by Cong and Liu

    Science.gov (United States)

    Gong, Tao; Shuai, Lan; Wu, Yicheng

    2014-12-01

    By analyzing complex networks constructed from authentic language data, Cong and Liu [1] advance linguistics research into the big data era. The network approach has revealed many intrinsic generalities and crucial differences at both the macro and micro scales between human languages. The axiom behind this research is that language is a complex adaptive system [2]. Although many lexical, semantic, or syntactic features have been discovered by means of analyzing the static and dynamic linguistic networks of world languages, available network-based language studies have not explicitly addressed the evolutionary dynamics of language systems and the correlations between language and human cognition. This commentary aims to provide some insights on how to use the network approach to study these issues.

  2. Synchronization enhancement via an oscillatory bath in a network of ...

    Indian Academy of Sciences (India)

    2015-02-05

    Feb 5, 2015 ... The possibility of using a dynamic environment to achieve and optimize phase synchronization in a network of self-excited cells with free-end boundary conditions is addressed in this paper. The dynamic environment is an oscillatory bath coupled linearly to a network of four cells. The boundaries of the ...

  3. Governing the Organic Cocoa Network from Ghana: Towards Hybrid Governance Arrangements?

    NARCIS (Netherlands)

    Glin, L.C.; Oosterveer, P.J.M.; Mol, A.P.J.

    2015-01-01

    In this paper, we examine the processes of initiation, construction and transformation of the organic cocoa network from Ghana. We address in particular how the state responded to and engaged with civil-society actors in the organic cocoa network and to what extent state involvement reshaped

  4. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Davis, William B.

    2002-01-01

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  5. Criminal Network Investigation: Processes, Tools, and Techniques

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    important challenge for criminal network investigation, despite the massive attention it receives from research and media. Challenges such as the investigation process, the context of the investigation, human factors such as thinking and creativity, and political decisions and legal laws are all challenges...... that could mean the success or failure of criminal network investigations. % include commission reports as indications of process related problems .. to "play a little politics" !! Information, process, and human factors, are challenges we find to be addressable by software system support. Based on those......Criminal network investigations such as police investigations, intelligence analysis, and investigative journalism involve a range of complex knowledge management processes and tasks. Criminal network investigators collect, process, and analyze information related to a specific target to create...

  6. One-Probe Search

    DEFF Research Database (Denmark)

    Östlin, Anna; Pagh, Rasmus

    2002-01-01

    We consider dictionaries that perform lookups by probing a single word of memory, knowing only the size of the data structure. We describe a randomized dictionary where a lookup returns the correct answer with probability 1 - e, and otherwise returns don't know. The lookup procedure uses an expan...

  7. Immunization of epidemics in multiplex networks.

    Directory of Open Access Journals (Sweden)

    Dawei Zhao

    Full Text Available Up to now, immunization of disease propagation has attracted great attention in both theoretical and experimental researches. However, vast majority of existing achievements are limited to the simple assumption of single layer networked population, which seems obviously inconsistent with recent development of complex network theory: each node could possess multiple roles in different topology connections. Inspired by this fact, we here propose the immunization strategies on multiplex networks, including multiplex node-based random (targeted immunization and layer node-based random (targeted immunization. With the theory of generating function, theoretical analysis is developed to calculate the immunization threshold, which is regarded as the most critical index for the effectiveness of addressed immunization strategies. Interestingly, both types of random immunization strategies show more efficiency in controlling disease spreading on multiplex Erdös-Rényi (ER random networks; while targeted immunization strategies provide better protection on multiplex scale-free (SF networks.

  8. Synchronization in complex networks with a modular structure.

    Science.gov (United States)

    Park, Kwangho; Lai, Ying-Cheng; Gupte, Saurabh; Kim, Jong-Won

    2006-03-01

    Networks with a community (or modular) structure arise in social and biological sciences. In such a network individuals tend to form local communities, each having dense internal connections. The linkage among the communities is, however, much more sparse. The dynamics on modular networks, for instance synchronization, may be of great social or biological interest. (Here by synchronization we mean some synchronous behavior among the nodes in the network, not, for example, partially synchronous behavior in the network or the synchronizability of the network with some external dynamics.) By using a recent theoretical framework, the master-stability approach originally introduced by Pecora and Carroll in the context of synchronization in coupled nonlinear oscillators, we address synchronization in complex modular networks. We use a prototype model and develop scaling relations for the network synchronizability with respect to variations of some key network structural parameters. Our results indicate that random, long-range links among distant modules is the key to synchronization. As an application we suggest a viable strategy to achieve synchronous behavior in social networks.

  9. Serial network simplifies the design of multiple microcomputer systems

    Energy Technology Data Exchange (ETDEWEB)

    Folkes, D.

    1981-01-01

    Recently there has been a lot of interest in developing network communication schemes for carrying digital data between locally distributed computing stations. Many of these schemes have focused on distributed networking techniques for data processing applications. These applications suggest the use of a serial, multipoint bus, where a number of remote intelligent units act as slaves to a central or host computer. Each slave would be serially addressable from the host and would perform required operations upon being addressed by the host. Based on an MK3873 single-chip microcomputer, the SCU 20 is designed to be such a remote slave device. The capabilities of the SCU 20 and its use in systems applications are examined.

  10. Routing Data Authentication in Wireless Networks; TOPICAL

    International Nuclear Information System (INIS)

    TORGERSON, MARK D.; VAN LEEUWEN, BRIAN P.

    2001-01-01

    In this paper, we discuss several specific threats directed at the routing data of an ad hoc network. We address security issues that arise from wrapping authentication mechanisms around ad hoc routing data. We show that this bolt-on approach to security may make certain attacks more difficult, but still leaves the network routing data vulnerable. We also show that under a certain adversarial model, most existing routing protocols cannot be secured with the aid of digital signatures

  11. Interestingness-Driven Diffusion Process Summarization in Dynamic Networks

    DEFF Research Database (Denmark)

    Qu, Qiang; Liu, Siyuan; Jensen, Christian S.

    2014-01-01

    The widespread use of social networks enables the rapid diffusion of information, e.g., news, among users in very large communities. It is a substantial challenge to be able to observe and understand such diffusion processes, which may be modeled as networks that are both large and dynamic. A key...... tool in this regard is data summarization. However, few existing studies aim to summarize graphs/networks for dynamics. Dynamic networks raise new challenges not found in static settings, including time sensitivity and the needs for online interestingness evaluation and summary traceability, which...... render existing techniques inapplicable. We study the topic of dynamic network summarization: how to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or edges over time, and we address the problem by finding interestingness-driven diffusion processes...

  12. Remote LAN Interconnection of the Same IP Address Based on IPSec%基于IPSec VPN的相同IP地址的异地局域网互联

    Institute of Scientific and Technical Information of China (English)

    殷玉明

    2013-01-01

    When companies communicate Securely with remote branches or partners, they often encounter the same network ad?dress communication.and they often need to re-planning their network address. Through technical analysis on IPSec VPN, virtual tunnel interface, address translation, Solve the problem of secure communication between the LAN with the same IP address.%企业与远程分支机构或合作伙伴在进行数据安全通信时,往往会遇到相同网络地址之间的通信需求,而需要重新规划地址.通过对IPSec VPN、虚拟隧道接口、地址转换等技术进行分析研究,解决了相同IP地址的局域网之间的安全通信问题.

  13. Jointly Optimize Data Augmentation and Network Training: Adversarial Data Augmentation in Human Pose Estimation

    OpenAIRE

    Peng, Xi; Tang, Zhiqiang; Yang, Fei; Feris, Rogerio; Metaxas, Dimitris

    2018-01-01

    Random data augmentation is a critical technique to avoid overfitting in training deep neural network models. However, data augmentation and network training are usually treated as two isolated processes, limiting the effectiveness of network training. Why not jointly optimize the two? We propose adversarial data augmentation to address this limitation. The main idea is to design an augmentation network (generator) that competes against a target network (discriminator) by generating `hard' au...

  14. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  15. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  16. Forms of address in Isizulu

    OpenAIRE

    2014-01-01

    M.A. (African Studies) The study deals with forms of address in isiZulu. Therefore, the various aspects of speech that play roles when addressing a person, the factors affecting forms of address in isiZulu and the effect of languages such as English, Afrikaans and other African languages on the forms of address in isiZulu are of interest. Research was conducted on forms of address in isiZulu in parts of Soweto and it was discovered that form of address are determined by different factors i...

  17. Worst-case optimal approximation algorithms for maximizing triplet consistency within phylogenetic networks

    NARCIS (Netherlands)

    J. Byrka (Jaroslaw); K.T. Huber; S.M. Kelk (Steven); P. Gawrychowski

    2009-01-01

    htmlabstractThe study of phylogenetic networks is of great interest to computational evolutionary biology and numerous different types of such structures are known. This article addresses the following question concerning rooted versions of phylogenetic networks. What is the maximum value of pset

  18. On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks

    Science.gov (United States)

    Li, Qiao-Qin; Gong, Haigang; Liu, Ming; Yang, Mei; Zheng, Jun

    2011-01-01

    This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC)-structure, a highly scalable wireless sensor network (WSN) architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures. PMID:22163809

  19. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  20. Introducing the PEC Network: Mailing Addresses of the Peace Education Commission. Peace Education Miniprints No. 1.

    Science.gov (United States)

    Bjerstedt, Ake, Ed.

    The Peace Education Commission (PEC) was established to facilitate international cooperation among individuals interested in peace education and research related to the field. The major ambition of PEC is to serve as a useful network for transnational information and support in the peace education area. This document gives current mailing…

  1. ACCPndn : adaptive congestion control protocol in named data networking by learning capacities using optimized time-lagged feedforward neural network

    OpenAIRE

    Karami, Amin

    2015-01-01

    Named Data Networking (NDN) is a promising network architecture being considered as a possible replacement for the current IP-based Internet infrastructure. However, NDN is subject to congestion when the number of data packets that reach one or various routers in a certain period of time is so high than its queue gets overflowed. To address this problem many congestion control protocols have been proposed in the literature which, however, they are highly sensitive to their control parameters ...

  2. Open Source in Higher Education: Towards an Understanding of Networked Universities

    Science.gov (United States)

    Quint-Rapoport, Mia

    2012-01-01

    This article addresses the question of understanding more about networked universities by looking at open source software developers working in academic contexts. It sketches their identities and work as an emerging professional community that both relies upon and develops digitally mediated networks and contributes to the progress of academic…

  3. Attack robustness and centrality of complex networks.

    Directory of Open Access Journals (Sweden)

    Swami Iyer

    Full Text Available Many complex systems can be described by networks, in which the constituent components are represented by vertices and the connections between the components are represented by edges between the corresponding vertices. A fundamental issue concerning complex networked systems is the robustness of the overall system to the failure of its constituent parts. Since the degree to which a networked system continues to function, as its component parts are degraded, typically depends on the integrity of the underlying network, the question of system robustness can be addressed by analyzing how the network structure changes as vertices are removed. Previous work has considered how the structure of complex networks change as vertices are removed uniformly at random, in decreasing order of their degree, or in decreasing order of their betweenness centrality. Here we extend these studies by investigating the effect on network structure of targeting vertices for removal based on a wider range of non-local measures of potential importance than simply degree or betweenness. We consider the effect of such targeted vertex removal on model networks with different degree distributions, clustering coefficients and assortativity coefficients, and for a variety of empirical networks.

  4. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  5. Networks: Innovation, Growth and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2013-05-01

    Full Text Available The emergence of the Internet as a measureable manifestation of our social and economic relationships changed the domination of networks in our lives. From about 2000, the internet has allowed us to study and understand the type of networks in which we live, and to model their behaviour. The Internet has fundamentally changed the distribution of wealth. The rich became richer simply because of the larger scale of the trading network and stretched national wealth distributions. Network effects are therefore likely to be responsible for much of the perceived increases in inequalities in the last 20-30 years, and policies to tackle poverty must therefore address the extent to which the poor can engage with society's networks of wealth creation. The greatest challenge to continued growth and prosperity, and therefore to peace and justice, is climate change. The potential cost of inaction on climate change could be as high. Our self-organising social networks have structured our societies and economies, and are now reflected in our technology networks. We can now replicate their evolution in computer simulations and can therefore better assess how to deal with the greatest challenges facing us in the next few decades.

  6. Disclosure of Personal Data in Ubiquitous Social Networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio

    users' privacy. Firstly, it updates the current privacy guidelines of ubiquitous computing by proposing four drawbacks to be avoided when designing for privacy in ubiquitous social networking environments. Secondly, this dissertation identifies and investigates the determinants that might influence......Ubiquitous social networking focuses on developing possible advantageous relationships such as friendships, partnerships and business relations in the physical world, by uncovering hidden connections that people share with others nearby. The foundation of these services is based on disclosure...... of personal information, which can provoke numerous accidental invasions of privacy. This dissertation contributes by addressing two problems, related to support of privacy-aware social networking in ubiquitous computing environments that focus on maximizing potential networking benefits while preserving...

  7. Comparison of neural network applications for channel assignment in cellular TDMA networks and dynamically sectored PCS networks

    Science.gov (United States)

    Hortos, William S.

    1997-04-01

    The use of artificial neural networks (NNs) to address the channel assignment problem (CAP) for cellular time-division multiple access and code-division multiple access networks has previously been investigated by this author and many others. The investigations to date have been based on a hexagonal cell structure established by omnidirectional antennas at the base stations. No account was taken of the use of spatial isolation enabled by directional antennas to reduce interference between mobiles. Any reduction in interference translates into increased capacity and consequently alters the performance of the NNs. Previous studies have sought to improve the performance of Hopfield- Tank network algorithms and self-organizing feature map algorithms applied primarily to static channel assignment (SCA) for cellular networks that handle uniformly distributed, stationary traffic in each cell for a single type of service. The resulting algorithms minimize energy functions representing interference constraint and ad hoc conditions that promote convergence to optimal solutions. While the structures of the derived neural network algorithms (NNAs) offer the potential advantages of inherent parallelism and adaptability to changing system conditions, this potential has yet to be fulfilled the CAP for emerging mobile networks. The next-generation communication infrastructures must accommodate dynamic operating conditions. Macrocell topologies are being refined to microcells and picocells that can be dynamically sectored by adaptively controlled, directional antennas and programmable transceivers. These networks must support the time-varying demands for personal communication services (PCS) that simultaneously carry voice, data and video and, thus, require new dynamic channel assignment (DCA) algorithms. This paper examines the impact of dynamic cell sectoring and geometric conditioning on NNAs developed for SCA in omnicell networks with stationary traffic to improve the metrics

  8. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  9. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  10. Improving the Robustness of Deep Neural Networks via Stability Training

    OpenAIRE

    Zheng, Stephan; Song, Yang; Leung, Thomas; Goodfellow, Ian

    2016-01-01

    In this paper we address the issue of output instability of deep neural networks: small perturbations in the visual input can significantly distort the feature embeddings and output of a neural network. Such instability affects many deep architectures with state-of-the-art performance on a wide range of computer vision tasks. We present a general stability training method to stabilize deep networks against small input distortions that result from various types of common image processing, such...

  11. How does network governance affect social-ecological fit across the land-sea interface? An empirical assessment from the Lesser Antilles

    Directory of Open Access Journals (Sweden)

    Jeremy Pittman

    2017-12-01

    Full Text Available Governance across the land-sea interface presents many challenges related to (1 the engagement of diverse actors and systems of knowledge, (2 the coordinated management of shared ecological resources, and (3 the development of mechanisms to address or account for biogeochemical (e.g., nutrient flows and ecological (e.g., species movements interdependencies between marine and terrestrial systems. If left unaddressed, these challenges can lead to multiple problems of social-ecological fit stemming from governance fragmentation or inattention to various components of land-sea systems. Network governance is hypothesized to address these multiple challenges, yet its specific role in affecting social-ecological fit across the land-sea interface is not well understood. We aim to improve this understanding by examining how network governance affects social-ecological fit across the land-sea interface in two empirical case studies from the Lesser Antilles: Dominica and Saint Lucia. We found that network governance plays a clear role in coordinating management of shared resources and providing capacity to address interactions between ecological entities. Yet, its potential role in engaging diverse actors and addressing, specifically, biogeochemical interactions across the land-sea interface has not been fully realized. Our research suggests that network governance is beneficial, but not sufficient, to improve social-ecological fit across the land-sea interface. Strategically leveraging the network processes (e.g., triadic closure leading to the existing governance networks could prove useful in addressing the current deficiencies in the networks. Additionally, the interplay between hierarchical and networked modes of governance appears to be a critical issue in determining social-ecological fit at the land-sea interface.

  12. Practical Application of Neural Networks in State Space Control

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon

    the networks, although some modifications are needed for the method to apply to the multilayer perceptron network. In connection with the multilayer perceptron networks it is also pointed out how instantaneous, sample-by-sample linearized state space models can be extracted from a trained network, thus opening......In the present thesis we address some problems in discrete-time state space control of nonlinear dynamical systems and attempt to solve them using generic nonlinear models based on artificial neural networks. The main aim of the work is to examine how well such control algorithms perform when...... theoretic notions followed by a detailed description of the topology, neuron functions and learning rules of the two types of neural networks treated in the thesis, the multilayer perceptron and the neurofuzzy networks. In both cases, a Least Squares second-order gradient method is used to train...

  13. Critical cooperation range to improve spatial network robustness.

    Directory of Open Access Journals (Sweden)

    Vitor H P Louzada

    Full Text Available A robust worldwide air-transportation network (WAN is one that minimizes the number of stranded passengers under a sequence of airport closures. Building on top of this realistic example, here we address how spatial network robustness can profit from cooperation between local actors. We swap a series of links within a certain distance, a cooperation range, while following typical constraints of spatially embedded networks. We find that the network robustness is only improved above a critical cooperation range. Such improvement can be described in the framework of a continuum transition, where the critical exponents depend on the spatial correlation of connected nodes. For the WAN we show that, except for Australia, all continental networks fall into the same universality class. Practical implications of this result are also discussed.

  14. Research Note: The consequences of different methods for handling missing network data in Stochastic Actor Based Models.

    Science.gov (United States)

    Hipp, John R; Wang, Cheng; Butts, Carter T; Jose, Rupa; Lakon, Cynthia M

    2015-05-01

    Although stochastic actor based models (e.g., as implemented in the SIENA software program) are growing in popularity as a technique for estimating longitudinal network data, a relatively understudied issue is the consequence of missing network data for longitudinal analysis. We explore this issue in our research note by utilizing data from four schools in an existing dataset (the AddHealth dataset) over three time points, assessing the substantive consequences of using four different strategies for addressing missing network data. The results indicate that whereas some measures in such models are estimated relatively robustly regardless of the strategy chosen for addressing missing network data, some of the substantive conclusions will differ based on the missing data strategy chosen. These results have important implications for this burgeoning applied research area, implying that researchers should more carefully consider how they address missing data when estimating such models.

  15. Robust-yet-fragile nature of interdependent networks

    Science.gov (United States)

    Tan, Fei; Xia, Yongxiang; Wei, Zhi

    2015-05-01

    Interdependent networks have been shown to be extremely vulnerable based on the percolation model. Parshani et al. [Europhys. Lett. 92, 68002 (2010), 10.1209/0295-5075/92/68002] further indicated that the more intersimilar networks are, the more robust they are to random failures. When traffic load is considered, how do the coupling patterns impact cascading failures in interdependent networks? This question has been largely unexplored until now. In this paper, we address this question by investigating the robustness of interdependent Erdös-Rényi random graphs and Barabási-Albert scale-free networks under either random failures or intentional attacks. It is found that interdependent Erdös-Rényi random graphs are robust yet fragile under either random failures or intentional attacks. Interdependent Barabási-Albert scale-free networks, however, are only robust yet fragile under random failures but fragile under intentional attacks. We further analyze the interdependent communication network and power grid and achieve similar results. These results advance our understanding of how interdependency shapes network robustness.

  16. Fundamental Tradeoffs among Reliability, Latency and Throughput in Cellular Networks

    DEFF Research Database (Denmark)

    Soret, Beatriz; Mogensen, Preben; Pedersen, Klaus I.

    2014-01-01

    We address the fundamental tradeoffs among latency, reliability and throughput in a cellular network. The most important elements influencing the KPIs in a 4G network are identified, and the inter-relationships among them is discussed. We use the effective bandwidth and the effective capacity......, in which latency and reliability will be two of the principal KPIs....

  17. Towards the creation of a European Network of Earth Observation Networks within GEO. The ConnectinGEO project.

    Science.gov (United States)

    Masó, Joan; Serral, Ivette; Menard, Lionel; Wald, Lucien; Nativi, Stefano; Plag, Hans-Peter; Jules-Plag, Shelley; Nüst, Daniel; Jirka, Simon; Pearlman, Jay; De Maziere, Martine

    2015-04-01

    ConnectinGEO (Coordinating an Observation Network of Networks EnCompassing saTellite and IN-situ to fill the Gaps in European Observations" is a new H2020 Coordination and Support Action with the primary goal of linking existing Earth Observation networks with science and technology (S&T) communities, the industry sector, the Group on Earth Observations (GEO), and Copernicus. ConnectinGEO aims to facilitate a broader and more accessible knowledge base to support the needs of GEO, its Societal Benefit Areas (SBAs) and the users of the Global Earth Observing System of Systems (GEOSS). A broad range of subjects from climate, natural resources and raw materials, to the emerging UN Sustainable Development Goals (SDGs) will be addressed. The project will generate a prioritized list of critical gaps within available observation data and models to translate observations into practice-relevant knowledge, based on stakeholder consultation and systematic analysis. Ultimately, it will increase coherency of European observation networks, increase the use of Earth observations for assessments and forecasts and inform the planning for future observation systems. ConnectinGEO will initiate a European Network of Earth Observation Networks (ENEON) that will encompass space-based, airborne and in-situ observations networks. ENEON will be composed by project partners representing thematic observation networks along with the GEOSS Science and Technology Stakeholder Network, GEO Communities of Practices, Copernicus services, Sentinel missions and in-situ support data representatives, representatives of the space-based, airborne and in-situ observations European networks (e.g. EPOS, EMSO and GROOM, etc), representatives of the industry sector and European and national funding agencies, in particular those participating in the future ERA-PlaNET. At the beginning, the ENEON will be created and managed by the project. Then the management will be transferred to the network itself to ensure

  18. Data Farming Process and Initial Network Analysis Capabilities

    Directory of Open Access Journals (Sweden)

    Gary Horne

    2016-01-01

    Full Text Available Data Farming, network applications and approaches to integrate network analysis and processes to the data farming paradigm are presented as approaches to address complex system questions. Data Farming is a quantified approach that examines questions in large possibility spaces using modeling and simulation. It evaluates whole landscapes of outcomes to draw insights from outcome distributions and outliers. Social network analysis and graph theory are widely used techniques for the evaluation of social systems. Incorporation of these techniques into the data farming process provides analysts examining complex systems with a powerful new suite of tools for more fully exploring and understanding the effect of interactions in complex systems. The integration of network analysis with data farming techniques provides modelers with the capability to gain insight into the effect of network attributes, whether the network is explicitly defined or emergent, on the breadth of the model outcome space and the effect of model inputs on the resultant network statistics.

  19. PCI bus content-addressable-memory (CAM) implementation on FPGA for pattern recognition/image retrieval in a distributed environment

    Science.gov (United States)

    Megherbi, Dalila B.; Yan, Yin; Tanmay, Parikh; Khoury, Jed; Woods, C. L.

    2004-11-01

    Recently surveillance and Automatic Target Recognition (ATR) applications are increasing as the cost of computing power needed to process the massive amount of information continues to fall. This computing power has been made possible partly by the latest advances in FPGAs and SOPCs. In particular, to design and implement state-of-the-Art electro-optical imaging systems to provide advanced surveillance capabilities, there is a need to integrate several technologies (e.g. telescope, precise optics, cameras, image/compute vision algorithms, which can be geographically distributed or sharing distributed resources) into a programmable system and DSP systems. Additionally, pattern recognition techniques and fast information retrieval, are often important components of intelligent systems. The aim of this work is using embedded FPGA as a fast, configurable and synthesizable search engine in fast image pattern recognition/retrieval in a distributed hardware/software co-design environment. In particular, we propose and show a low cost Content Addressable Memory (CAM)-based distributed embedded FPGA hardware architecture solution with real time recognition capabilities and computing for pattern look-up, pattern recognition, and image retrieval. We show how the distributed CAM-based architecture offers a performance advantage of an order-of-magnitude over RAM-based architecture (Random Access Memory) search for implementing high speed pattern recognition for image retrieval. The methods of designing, implementing, and analyzing the proposed CAM based embedded architecture are described here. Other SOPC solutions/design issues are covered. Finally, experimental results, hardware verification, and performance evaluations using both the Xilinx Virtex-II and the Altera Apex20k are provided to show the potential and power of the proposed method for low cost reconfigurable fast image pattern recognition/retrieval at the hardware/software co-design level.

  20. Stochastic modeling and analysis of telecoms networks

    CERN Document Server

    Decreusefond, Laurent

    2012-01-01

    This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.The authors propose a comprehensive mathematical construction of the foundations of stochastic network theory: Markov chains, continuous time Markov chains are extensively studied using an original martingale-based approach. A complete presentation of stochastic recursions from an