WorldWideScience

Sample records for network analyzer system

  1. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  2. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  3. System, apparatus and methods to implement high-speed network analyzers

    Energy Technology Data Exchange (ETDEWEB)

    Ezick, James; Lethin, Richard; Ros-Giralt, Jordi; Szilagyi, Peter; Wohlford, David E

    2015-11-10

    Systems, apparatus and methods for the implementation of high-speed network analyzers are provided. A set of high-level specifications is used to define the behavior of the network analyzer emitted by a compiler. An optimized inline workflow to process regular expressions is presented without sacrificing the semantic capabilities of the processing engine. An optimized packet dispatcher implements a subset of the functions implemented by the network analyzer, providing a fast and slow path workflow used to accelerate specific processing units. Such dispatcher facility can also be used as a cache of policies, wherein if a policy is found, then packet manipulations associated with the policy can be quickly performed. An optimized method of generating DFA specifications for network signatures is also presented. The method accepts several optimization criteria, such as min-max allocations or optimal allocations based on the probability of occurrence of each signature input bit.

  4. How Unstable Are Complex Financial Systems? Analyzing an Inter-bank Network of Credit Relations

    Science.gov (United States)

    Sinha, Sitabhra; Thess, Maximilian; Markose, Sheri

    The recent worldwide economic crisis of 2007-09 has focused attention on the need to analyze systemic risk in complex financial networks. We investigate the problem of robustness of such systems in the context of the general theory of dynamical stability in complex networks and, in particular, how the topology of connections influence the risk of the failure of a single institution triggering a cascade of successive collapses propagating through the network. We use data on bilateral liabilities (or exposure) in the derivatives market between 202 financial intermediaries based in USA and Europe in the last quarter of 2009 to empirically investigate the network structure of the over-the-counter (OTC) derivatives market. We observe that the network exhibits both heterogeneity in node properties and the existence of communities. It also has a prominent core-periphery organization and can resist large-scale collapse when subjected to individual bank defaults (however, failure of any bank in the core may result in localized collapse of the innermost core with substantial loss of capital) but is vulnerable to system-wide breakdown as a result of an accompanying liquidity crisis.

  5. ezBioNet: A modeling and simulation system for analyzing biological reaction networks

    Science.gov (United States)

    Yu, Seok Jong; Tung, Thai Quang; Park, Junho; Lim, Jongtae; Yoo, Jaesoo

    2012-10-01

    To achieve robustness against living environments, a living organism is composed of complicated regulatory mechanisms ranging from gene regulations to signal transduction. If such life phenomena are to be understand, an integrated analysis tool that should have modeling and simulation functions for biological reactions, as well as new experimental methods for measuring biological phenomena, is fundamentally required. We have designed and implemented modeling and simulation software (ezBioNet) for analyzing biological reaction networks. The software can simultaneously perform an integrated modeling of various responses occurring in cells, ranging from gene expressions to signaling processes. To support massive analysis of biological networks, we have constructed a server-side simulation system (VCellSim) that can perform ordinary differential equations (ODE) analysis, sensitivity analysis, and parameter estimates. ezBioNet integrates the BioModel database by connecting the european bioinformatics institute (EBI) servers through Web services APIs and supports the handling of systems biology markup language (SBML) files. In addition, we employed eclipse RCP (rich client platform) which is a powerful modularity framework allowing various functional expansions. ezBioNet is intended to be an easy-to-use modeling tool, as well as a simulation system, to understand the control mechanism by monitoring the change of each component in a biological network. A researcher may perform the kinetic modeling and execute the simulation. The simulation result can be managed and visualized on ezBioNet, which is freely available at http://ezbionet.cbnu.ac.kr.

  6. Software-based microwave CT system consisting of antennas and vector network analyzer.

    Science.gov (United States)

    Ogawa, Takahiro; Miyakawa, Michio

    2011-01-01

    We have developed a software-based microwave CT (SMCT) that consists of antennas and a vector network analyzer. Regardless of the scanner type, SMCT collects the S-parameters at each measurement position in the frequency range of interest. After collecting all the S-parameters, it calculates the shortest path to obtain the projection data for CPMCT. Because of the redundant data in SMCT, the calculation of the projection is easily optimized. Therefore, the system can improve the accuracy and stability of the measurement. Furthermore, the experimental system is constructed at a reasonable cost. Hence, SMCT is useful for imaging experiments for CP-MCT and particularly for basic studies. This paper describes the software-based microwave imaging system, and experimental results show the usefulness of the system.

  7. An Artificial Neural Network for Analyzing Overall Uniformity in Outdoor Lighting Systems

    Directory of Open Access Journals (Sweden)

    Antonio del Corte-Valiente

    2017-02-01

    Full Text Available Street lighting installations are an essential service for modern life due to their capability of creating a welcoming feeling at nighttime. Nevertheless, several studies have highlighted that it is possible to improve the quality of the light significantly improving the uniformity of the illuminance. The main difficulty arises when trying to improve some of the installation’s characteristics based only on statistical analysis of the light distribution. This paper presents a new algorithm that is able to obtain the overall illuminance uniformity in order to improve this sort of installations. To develop this algorithm it was necessary to perform a detailed study of all the elements which are part of street lighting installations. Because classification is one of the most important tasks in the application areas of artificial neural networks, we compared the performances of six types of training algorithms in a feed forward neural network for analyzing the overall uniformity in outdoor lighting systems. We found that the best algorithm that minimizes the error is “Levenberg-Marquardt back-propagation”, which approximates the desired output of the training pattern. By means of this kind of algorithm, it is possible to help to lighting professionals optimize the quality of street lighting installations.

  8. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social...... and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs...

  9. Analyzing the evolutionary mechanisms of the Air Transportation System-of-Systems using network theory and machine learning algorithms

    Science.gov (United States)

    Kotegawa, Tatsuya

    Complexity in the Air Transportation System (ATS) arises from the intermingling of many independent physical resources, operational paradigms, and stakeholder interests, as well as the dynamic variation of these interactions over time. Currently, trade-offs and cost benefit analyses of new ATS concepts are carried out on system-wide evaluation simulations driven by air traffic forecasts that assume fixed airline routes. However, this does not well reflect reality as airlines regularly add and remove routes. A airline service route network evolution model that projects route addition and removal was created and combined with state-of-the-art air traffic forecast methods to better reflect the dynamic properties of the ATS in system-wide simulations. Guided by a system-of-systems framework, network theory metrics and machine learning algorithms were applied to develop the route network evolution models based on patterns extracted from historical data. Constructing the route addition section of the model posed the greatest challenge due to the large pool of new link candidates compared to the actual number of routes historically added to the network. Of the models explored, algorithms based on logistic regression, random forests, and support vector machines showed best route addition and removal forecast accuracies at approximately 20% and 40%, respectively, when validated with historical data. The combination of network evolution models and a system-wide evaluation tool quantified the impact of airline route network evolution on air traffic delay. The expected delay minutes when considering network evolution increased approximately 5% for a forecasted schedule on 3/19/2020. Performance trade-off studies between several airline route network topologies from the perspectives of passenger travel efficiency, fuel burn, and robustness were also conducted to provide bounds that could serve as targets for ATS transformation efforts. The series of analysis revealed that high

  10. Software Design Analyzer System

    Science.gov (United States)

    Tausworthe, R. C.

    1985-01-01

    CRISP80 software design analyzer system a set of programs that supports top-down, hierarchic, modular structured design, and programing methodologies. CRISP80 allows for expression of design as picture of program.

  11. Analyzing Worms and Network Traffic using Compression

    OpenAIRE

    Wehner, Stephanie

    2005-01-01

    Internet worms have become a widespread threat to system and network operations. In order to fight them more efficiently, it is necessary to analyze newly discovered worms and attack patterns. This paper shows how techniques based on Kolmogorov Complexity can help in the analysis of internet worms and network traffic. Using compression, different species of worms can be clustered by type. This allows us to determine whether an unknown worm binary could in fact be a later version of an existin...

  12. System performance analyzer

    Science.gov (United States)

    Helbig, H. R.

    1981-01-01

    The System Performance Analyzer (SPA) designed to provide accurate real time information about the operation of complex systems and developed for use on the Airborne Data Analysis/Monitor System (ADAMS), a ROLM 1666 based system is described. The system uses an external processor to operate an intelligent, simulated control panel. Also provided are functions to trace operations, determine frequency of use of memory areas, and time or count user tasks in a multitask environment. This augments the information available from the standard debugger and control panel, and reduces the time and effort needed by ROLM 1666 users in optimizing their system, as well as providing documentation of the effect of any changes. The operation and state of the system are evaluated.

  13. Methods for Analyzing Pipe Networks

    DEFF Research Database (Denmark)

    Nielsen, Hans Bruun

    1989-01-01

    The governing equations for a general network are first set up and then reformulated in terms of matrices. This is developed to show that the choice of model for the flow equations is essential for the behavior of the iterative method used to solve the problem. It is shown that it is better to fo...... demonstrated that this method offers good starting values for a Newton-Raphson iteration.......The governing equations for a general network are first set up and then reformulated in terms of matrices. This is developed to show that the choice of model for the flow equations is essential for the behavior of the iterative method used to solve the problem. It is shown that it is better...... to formulate the flow equations in terms of pipe discharges than in terms of energy heads. The behavior of some iterative methods is compared in the initial phase with large errors. It is explained why the linear theory method oscillates when the iteration gets close to the solution, and it is further...

  14. Analyzing Spacecraft Telecommunication Systems

    Science.gov (United States)

    Kordon, Mark; Hanks, David; Gladden, Roy; Wood, Eric

    2004-01-01

    Multi-Mission Telecom Analysis Tool (MMTAT) is a C-language computer program for analyzing proposed spacecraft telecommunication systems. MMTAT utilizes parameterized input and computational models that can be run on standard desktop computers to perform fast and accurate analyses of telecommunication links. MMTAT is easy to use and can easily be integrated with other software applications and run as part of almost any computational simulation. It is distributed as either a stand-alone application program with a graphical user interface or a linkable library with a well-defined set of application programming interface (API) calls. As a stand-alone program, MMTAT provides both textual and graphical output. The graphs make it possible to understand, quickly and easily, how telecommunication performance varies with variations in input parameters. A delimited text file that can be read by any spreadsheet program is generated at the end of each run. The API in the linkable-library form of MMTAT enables the user to control simulation software and to change parameters during a simulation run. Results can be retrieved either at the end of a run or by use of a function call at any time step.

  15. Electrical spectrum & network analyzers a practical approach

    CERN Document Server

    Helfrick, Albert D

    1991-01-01

    This book presents fundamentals and the latest techniques of electrical spectrum analysis. It focuses on instruments and techniques used on spectrum and network analysis, rather than theory. The book covers the use of spectrum analyzers, tracking generators, and network analyzers. Filled with practical examples, the book presents techniques that are widely used in signal processing and communications applications, yet are difficult to find in most literature.Key Features* Presents numerous practical examples, including actual spectrum analyzer circuits* Instruction on how to us

  16. Analyzing negative ties in social networks

    Directory of Open Access Journals (Sweden)

    Mankirat Kaur

    2016-03-01

    Full Text Available Online social networks are a source of sharing information and maintaining personal contacts with other people through social interactions and thus forming virtual communities online. Social networks are crowded with positive and negative relations. Positive relations are formed by support, endorsement and friendship and thus, create a network of well-connected users whereas negative relations are a result of opposition, distrust and avoidance creating disconnected networks. Due to increase in illegal activities such as masquerading, conspiring and creating fake profiles on online social networks, exploring and analyzing these negative activities becomes the need of hour. Usually negative ties are treated in same way as positive ties in many theories such as balance theory and blockmodeling analysis. But the standard concepts of social network analysis do not yield same results in respect of each tie. This paper presents a survey on analyzing negative ties in social networks through various types of network analysis techniques that are used for examining ties such as status, centrality and power measures. Due to the difference in characteristics of flow in positive and negative tie networks some of these measures are not applicable on negative ties. This paper also discusses new methods that have been developed specifically for analyzing negative ties such as negative degree, and h∗ measure along with the measures based on mixture of positive and negative ties. The different types of social network analysis approaches have been reviewed and compared to determine the best approach that can appropriately identify the negative ties in online networks. It has been analyzed that only few measures such as Degree and PN centrality are applicable for identifying outsiders in network. For applicability in online networks, the performance of PN measure needs to be verified and further, new measures should be developed based upon negative clique concept.

  17. Qualitative networks: a symbolic approach to analyze biological signaling networks

    Directory of Open Access Journals (Sweden)

    Henzinger Thomas A

    2007-01-01

    Full Text Available Abstract Background A central goal of Systems Biology is to model and analyze biological signaling pathways that interact with one another to form complex networks. Here we introduce Qualitative networks, an extension of Boolean networks. With this framework, we use formal verification methods to check whether a model is consistent with the laboratory experimental observations on which it is based. If the model does not conform to the data, we suggest a revised model and the new hypotheses are tested in-silico. Results We consider networks in which elements range over a small finite domain allowing more flexibility than Boolean values, and add target functions that allow to model a rich set of behaviors. We propose a symbolic algorithm for analyzing the steady state of these networks, allowing us to scale up to a system consisting of 144 elements and state spaces of approximately 1086 states. We illustrate the usefulness of this approach through a model of the interaction between the Notch and the Wnt signaling pathways in mammalian skin, and its extensive analysis. Conclusion We introduce an approach for constructing computational models of biological systems that extends the framework of Boolean networks and uses formal verification methods for the analysis of the model. This approach can scale to multicellular models of complex pathways, and is therefore a useful tool for the analysis of complex biological systems. The hypotheses formulated during in-silico testing suggest new avenues to explore experimentally. Hence, this approach has the potential to efficiently complement experimental studies in biology.

  18. Structural factoring approach for analyzing stochastic networks

    Science.gov (United States)

    Hayhurst, Kelly J.; Shier, Douglas R.

    1991-01-01

    The problem of finding the distribution of the shortest path length through a stochastic network is investigated. A general algorithm for determining the exact distribution of the shortest path length is developed based on the concept of conditional factoring, in which a directed, stochastic network is decomposed into an equivalent set of smaller, generally less complex subnetworks. Several network constructs are identified and exploited to reduce significantly the computational effort required to solve a network problem relative to complete enumeration. This algorithm can be applied to two important classes of stochastic path problems: determining the critical path distribution for acyclic networks and the exact two-terminal reliability for probabilistic networks. Computational experience with the algorithm was encouraging and allowed the exact solution of networks that have been previously analyzed only by approximation techniques.

  19. How to Analyze Company Using Social Network?

    Science.gov (United States)

    Palus, Sebastian; Bródka, Piotr; Kazienko, Przemysław

    Every single company or institution wants to utilize its resources in the most efficient way. In order to do so they have to be have good structure. The new way to analyze company structure by utilizing existing within company natural social network and example of its usage on Enron company are presented in this paper.

  20. Using graph theory to analyze biological networks

    Science.gov (United States)

    2011-01-01

    Understanding complex systems often requires a bottom-up analysis towards a systems biology approach. The need to investigate a system, not only as individual components but as a whole, emerges. This can be done by examining the elementary constituents individually and then how these are connected. The myriad components of a system and their interactions are best characterized as networks and they are mainly represented as graphs where thousands of nodes are connected with thousands of vertices. In this article we demonstrate approaches, models and methods from the graph theory universe and we discuss ways in which they can be used to reveal hidden properties and features of a network. This network profiling combined with knowledge extraction will help us to better understand the biological significance of the system. PMID:21527005

  1. CALIBRATION OF ONLINE ANALYZERS USING NEURAL NETWORKS

    Energy Technology Data Exchange (ETDEWEB)

    Rajive Ganguli; Daniel E. Walsh; Shaohai Yu

    2003-12-05

    Neural networks were used to calibrate an online ash analyzer at the Usibelli Coal Mine, Healy, Alaska, by relating the Americium and Cesium counts to the ash content. A total of 104 samples were collected from the mine, with 47 being from screened coal, and the rest being from unscreened coal. Each sample corresponded to 20 seconds of coal on the running conveyor belt. Neural network modeling used the quick stop training procedure. Therefore, the samples were split into training, calibration and prediction subsets. Special techniques, using genetic algorithms, were developed to representatively split the sample into the three subsets. Two separate approaches were tried. In one approach, the screened and unscreened coal was modeled separately. In another, a single model was developed for the entire dataset. No advantage was seen from modeling the two subsets separately. The neural network method performed very well on average but not individually, i.e. though each prediction was unreliable, the average of a few predictions was close to the true average. Thus, the method demonstrated that the analyzers were accurate at 2-3 minutes intervals (average of 6-9 samples), but not at 20 seconds (each prediction).

  2. Analyzing Bullwhip Effect in Supply Networks under Exogenous Uncertainty

    Directory of Open Access Journals (Sweden)

    Mitra Darvish

    2014-05-01

    Full Text Available This paper explains a model for analyzing and measuring the propagation of order amplifications (i.e. bullwhip effect for a single-product supply network topology considering exogenous uncertainty and linear and time-invariant inventory management policies for network entities. The stream of orders placed by each entity of the network is characterized assuming customer demand is ergodic. In fact, we propose an exact formula in order to measure the bullwhip effect in the addressed supply network topology considering the system in Markovian chain framework and presenting a matrix of network member relationships and relevant order sequences. The formula turns out using a mathematical method called frequency domain analysis. The major contribution of this paper is analyzing the bullwhip effect considering exogenous uncertainty in supply networks and using the Fourier transform in order to simplify the relevant calculations. We present a number of numerical examples to assess the analytical results accuracy in quantifying the bullwhip effect.

  3. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  4. Novel topological descriptors for analyzing biological networks

    Directory of Open Access Journals (Sweden)

    Varmuza Kurt K

    2010-06-01

    Full Text Available Abstract Background Topological descriptors, other graph measures, and in a broader sense, graph-theoretical methods, have been proven as powerful tools to perform biological network analysis. However, the majority of the developed descriptors and graph-theoretical methods does not have the ability to take vertex- and edge-labels into account, e.g., atom- and bond-types when considering molecular graphs. Indeed, this feature is important to characterize biological networks more meaningfully instead of only considering pure topological information. Results In this paper, we put the emphasis on analyzing a special type of biological networks, namely bio-chemical structures. First, we derive entropic measures to calculate the information content of vertex- and edge-labeled graphs and investigate some useful properties thereof. Second, we apply the mentioned measures combined with other well-known descriptors to supervised machine learning methods for predicting Ames mutagenicity. Moreover, we investigate the influence of our topological descriptors - measures for only unlabeled vs. measures for labeled graphs - on the prediction performance of the underlying graph classification problem. Conclusions Our study demonstrates that the application of entropic measures to molecules representing graphs is useful to characterize such structures meaningfully. For instance, we have found that if one extends the measures for determining the structural information content of unlabeled graphs to labeled graphs, the uniqueness of the resulting indices is higher. Because measures to structurally characterize labeled graphs are clearly underrepresented so far, the further development of such methods might be valuable and fruitful for solving problems within biological network analysis.

  5. Software-Design-Analyzer System

    Science.gov (United States)

    Tausworthe, Robert C.

    1991-01-01

    CRISP-90 software-design-analyzer system, update of CRISP-80, is set of computer programs constituting software tool for design and documentation of other software and supporting top-down, hierarchical, modular, structured methodologies for design and programming. Written in Microsoft QuickBasic.

  6. Vector network analyzer (VNA) measurements and uncertainty assessment

    CERN Document Server

    Shoaib, Nosherwan

    2017-01-01

    This book describes vector network analyzer measurements and uncertainty assessments, particularly in waveguide test-set environments, in order to establish their compatibility to the International System of Units (SI) for accurate and reliable characterization of communication networks. It proposes a fully analytical approach to measurement uncertainty evaluation, while also highlighting the interaction and the linear propagation of different uncertainty sources to compute the final uncertainties associated with the measurements. The book subsequently discusses the dimensional characterization of waveguide standards and the quality of the vector network analyzer (VNA) calibration techniques. The book concludes with an in-depth description of the novel verification artefacts used to assess the performance of the VNAs. It offers a comprehensive reference guide for beginners to experts, in both academia and industry, whose work involves the field of network analysis, instrumentation and measurements.

  7. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...

  8. A framework for analyzing contagion in assortative banking networks.

    Science.gov (United States)

    Hurd, Thomas R; Gleeson, James P; Melnik, Sergey

    2017-01-01

    We introduce a probabilistic framework that represents stylized banking networks with the aim of predicting the size of contagion events. Most previous work on random financial networks assumes independent connections between banks, whereas our framework explicitly allows for (dis)assortative edge probabilities (i.e., a tendency for small banks to link to large banks). We analyze default cascades triggered by shocking the network and find that the cascade can be understood as an explicit iterated mapping on a set of edge probabilities that converges to a fixed point. We derive a cascade condition, analogous to the basic reproduction number R0 in epidemic modelling, that characterizes whether or not a single initially defaulted bank can trigger a cascade that extends to a finite fraction of the infinite network. This cascade condition is an easily computed measure of the systemic risk inherent in a given banking network topology. We use percolation theory for random networks to derive a formula for the frequency of global cascades. These analytical results are shown to provide limited quantitative agreement with Monte Carlo simulation studies of finite-sized networks. We show that edge-assortativity, the propensity of nodes to connect to similar nodes, can have a strong effect on the level of systemic risk as measured by the cascade condition. However, the effect of assortativity on systemic risk is subtle, and we propose a simple graph theoretic quantity, which we call the graph-assortativity coefficient, that can be used to assess systemic risk.

  9. Innovation Networks New Approaches in Modelling and Analyzing

    CERN Document Server

    Pyka, Andreas

    2009-01-01

    The science of graphs and networks has become by now a well-established tool for modelling and analyzing a variety of systems with a large number of interacting components. Starting from the physical sciences, applications have spread rapidly to the natural and social sciences, as well as to economics, and are now further extended, in this volume, to the concept of innovations, viewed broadly. In an abstract, systems-theoretical approach, innovation can be understood as a critical event which destabilizes the current state of the system, and results in a new process of self-organization leading to a new stable state. The contributions to this anthology address different aspects of the relationship between innovation and networks. The various chapters incorporate approaches in evolutionary economics, agent-based modeling, social network analysis and econophysics and explore the epistemic tension between insights into economics and society-related processes, and the insights into new forms of complex dynamics.

  10. Analyzing Evolving Social Network 2 (EVOLVE2)

    Science.gov (United States)

    2015-04-01

    social media. We have demonstrated recently that information spread cannot be modeled as an epidemic diffusion. Instead, cognitive constraints, such as...respond to any one stimulus. Cognitive constraints the nature of social interactions and therefore, how central nodes are identified. Now a node’s...link prediction task and their properties. network nodes edges missing density social networks dolphins 62 159 16 0.084 email 1133 5452 545 0.0085

  11. Design and Research on Automotive Controller Area Network Bus Analyzer

    Directory of Open Access Journals (Sweden)

    Hongwei CUI

    2014-03-01

    Full Text Available The detection method of automotive controller area network bus is researched in this paper. Failure identifying of CAN bus under different working conditions has been realized. In order to realizing intelligent failure diagnosis, data fusion means has been put forward in this paper. The composition of analysis and detection system is introduced. By analyzing and processing the data of CAN bus and sensors, work condition of automotive is achieved. Multi-pattern data fusion model and algorithm for failure diagnosis are researched. The analyzer and detection system designed in this paper can be applied to automotive fault analysis, troubleshooting and maintenance.

  12. Quantifying and analyzing the network basis of genetic complexity.

    Directory of Open Access Journals (Sweden)

    Ethan G Thompson

    Full Text Available Genotype-to-phenotype maps exhibit complexity. This genetic complexity is mentioned frequently in the literature, but a consistent and quantitative definition is lacking. Here, we derive such a definition and investigate its consequences for model genetic systems. The definition equates genetic complexity with a surplus of genotypic diversity over phenotypic diversity. Applying this definition to ensembles of Boolean network models, we found that the in-degree distribution and the number of periodic attractors produced determine the relative complexity of different topology classes. We found evidence that networks that are difficult to control, or that exhibit a hierarchical structure, are genetically complex. We analyzed the complexity of the cell cycle network of Sacchoromyces cerevisiae and pinpointed genes and interactions that are most important for its high genetic complexity. The rigorous definition of genetic complexity is a tool for unraveling the structure and properties of genotype-to-phenotype maps by enabling the quantitative comparison of the relative complexities of different genetic systems. The definition also allows the identification of specific network elements and subnetworks that have the greatest effects on genetic complexity. Moreover, it suggests ways to engineer biological systems with desired genetic properties.

  13. Analyzing, Modeling, and Simulation for Human Dynamics in Social Network

    Directory of Open Access Journals (Sweden)

    Yunpeng Xiao

    2012-01-01

    Full Text Available This paper studies the human behavior in the top-one social network system in China (Sina Microblog system. By analyzing real-life data at a large scale, we find that the message releasing interval (intermessage time obeys power law distribution both at individual level and at group level. Statistical analysis also reveals that human behavior in social network is mainly driven by four basic elements: social pressure, social identity, social participation, and social relation between individuals. Empirical results present the four elements' impact on the human behavior and the relation between these elements. To further understand the mechanism of such dynamic phenomena, a hybrid human dynamic model which combines “interest” of individual and “interaction” among people is introduced, incorporating the four elements simultaneously. To provide a solid evaluation, we simulate both two-agent and multiagent interactions with real-life social network topology. We achieve the consistent results between empirical studies and the simulations. The model can provide a good understanding of human dynamics in social network.

  14. ToppCluster: a multiple gene list feature analyzer for comparative enrichment clustering and network-based dissection of biological systems.

    Science.gov (United States)

    Kaimal, Vivek; Bardes, Eric E; Tabar, Scott C; Jegga, Anil G; Aronow, Bruce J

    2010-07-01

    ToppCluster is a web server application that leverages a powerful enrichment analysis and underlying data environment for comparative analyses of multiple gene lists. It generates heatmaps or connectivity networks that reveal functional features shared or specific to multiple gene lists. ToppCluster uses hypergeometric tests to obtain list-specific feature enrichment P-values for currently 17 categories of annotations of human-ortholog genes, and provides user-selectable cutoffs and multiple testing correction methods to control false discovery. Each nameable gene list represents a column input to a resulting matrix whose rows are overrepresented features, and individual cells per-list P-values and corresponding genes per feature. ToppCluster provides users with choices of tabular outputs, hierarchical clustering and heatmap generation, or the ability to interactively select features from the functional enrichment matrix to be transformed into XGMML or GEXF network format documents for use in Cytoscape or Gephi applications, respectively. Here, as example, we demonstrate the ability of ToppCluster to enable identification of list-specific phenotypic and regulatory element features (both cis-elements and 3'UTR microRNA binding sites) among tissue-specific gene lists. ToppCluster's functionalities enable the identification of specialized biological functions and regulatory networks and systems biology-based dissection of biological states. ToppCluster can be accessed freely at http://toppcluster.cchmc.org.

  15. Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data

    Science.gov (United States)

    Johansson, Fredrik; Svenson, Pontus

    Social network analysis and link diagrams are popular tools among intelligence analysts for analyzing and understanding criminal and terrorist organizations. A bottleneck in the use of such techniques is the manual effort needed to create the network to analyze from available source information. We describe how text mining techniques can be used for extraction of named entities and the relations among them, in order to enable automatic construction of networks from unstructured text. Since the text mining techniques used, viz. algorithms for named entity recognition and relation extraction, are not perfect, we also describe a method for incorporating information about uncertainty when constructing the networks and when doing the social network analysis. The presented approach is applied on text documents describing terrorist activities in Indonesia.

  16. Towards a theoretical framework for analyzing complex linguistic networks

    CERN Document Server

    Lücking, Andy; Banisch, Sven; Blanchard, Philippe; Job, Barbara

    2016-01-01

    The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics. In this way, the book contributes first steps towards establishing a statistical network theory as a theoretical basis of linguistic network analysis the boarder of the natural sciences and the humanities.This book addresses researchers who want to get familiar with theoretical developments, computational models and their empirical evaluation in the field of complex linguistic networks. It is intended to all those who are interested in statisticalmodels of linguistic systems from the point of view of network research. This includes all relevant areas of linguistics ranging from phonological, morphological and lexical networks on the one hand and syntactic, semantic and pragmatic networks on the other. In this sense, the volume concerns readers from many disciplines such as physics, linguistics, computer science and information scien...

  17. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  18. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  19. Analyzing the Bitcoin Network: The First Four Years

    Directory of Open Access Journals (Sweden)

    Matthias Lischke

    2016-03-01

    Full Text Available In this explorative study, we examine the economy and transaction network of the decentralized digital currency Bitcoin during the first four years of its existence. The objective is to develop insights into the evolution of the Bitcoin economy during this period. For this, we establish and analyze a novel integrated dataset that enriches data from the Bitcoin blockchain with off-network data such as business categories and geo-locations. Our analyses reveal the major Bitcoin businesses and markets. Our results also give insights on the business distribution by countries and how businesses evolve over time. We also show that there is a gambling network that features many very small transactions. Furthermore, regional differences in the adoption and business distribution could be found. In the network analysis, the small world phenomenon is investigated and confirmed for several subgraphs of the Bitcoin network.

  20. The wireshark field guide analyzing and troubleshooting network traffic

    CERN Document Server

    Shimonski, Robert

    2013-01-01

    The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill

  1. Analyzing the multilevel structure of the European airport network

    Directory of Open Access Journals (Sweden)

    Oriol Lordan

    2017-04-01

    Full Text Available The multilayered structure of the European airport network (EAN, composed of connections and flights between European cities, is analyzed through the k-core decomposition of the connections network. This decomposition allows to identify the core, bridge and periphery layers of the EAN. The core layer includes the best-connected cities, which include important business air traffic destinations. The periphery layer includes cities with lesser connections, which serve low populated areas where air travel is an economic alternative. The remaining cities form the bridge of the EAN, including important leisure travel origins and destinations. The multilayered structure of the EAN affects network robustness, as the EAN is more robust to isolation of nodes of the core, than to the isolation of a combination of core and bridge nodes.

  2. Detecting and analyzing research communities in longitudinal scientific networks.

    Science.gov (United States)

    Leone Sciabolazza, Valerio; Vacca, Raffaele; Kennelly Okraku, Therese; McCarty, Christopher

    2017-01-01

    A growing body of evidence shows that collaborative teams and communities tend to produce the highest-impact scientific work. This paper proposes a new method to (1) Identify collaborative communities in longitudinal scientific networks, and (2) Evaluate the impact of specific research institutes, services or policies on the interdisciplinary collaboration between these communities. First, we apply community-detection algorithms to cross-sectional scientific collaboration networks and analyze different types of co-membership in the resulting subgroups over time. This analysis summarizes large amounts of longitudinal network data to extract sets of research communities whose members have consistently collaborated or shared collaborators over time. Second, we construct networks of cross-community interactions and estimate Exponential Random Graph Models to predict the formation of interdisciplinary collaborations between different communities. The method is applied to longitudinal data on publication and grant collaborations at the University of Florida. Results show that similar institutional affiliation, spatial proximity, transitivity effects, and use of the same research services predict higher degree of interdisciplinary collaboration between research communities. Our application also illustrates how the identification of research communities in longitudinal data and the analysis of cross-community network formation can be used to measure the growth of interdisciplinary team science at a research university, and to evaluate its association with research policies, services or institutes.

  3. Detecting and analyzing research communities in longitudinal scientific networks.

    Directory of Open Access Journals (Sweden)

    Valerio Leone Sciabolazza

    Full Text Available A growing body of evidence shows that collaborative teams and communities tend to produce the highest-impact scientific work. This paper proposes a new method to (1 Identify collaborative communities in longitudinal scientific networks, and (2 Evaluate the impact of specific research institutes, services or policies on the interdisciplinary collaboration between these communities. First, we apply community-detection algorithms to cross-sectional scientific collaboration networks and analyze different types of co-membership in the resulting subgroups over time. This analysis summarizes large amounts of longitudinal network data to extract sets of research communities whose members have consistently collaborated or shared collaborators over time. Second, we construct networks of cross-community interactions and estimate Exponential Random Graph Models to predict the formation of interdisciplinary collaborations between different communities. The method is applied to longitudinal data on publication and grant collaborations at the University of Florida. Results show that similar institutional affiliation, spatial proximity, transitivity effects, and use of the same research services predict higher degree of interdisciplinary collaboration between research communities. Our application also illustrates how the identification of research communities in longitudinal data and the analysis of cross-community network formation can be used to measure the growth of interdisciplinary team science at a research university, and to evaluate its association with research policies, services or institutes.

  4. Analyzing the Pension System of the USSR

    Directory of Open Access Journals (Sweden)

    Aleksei V. Pudovkin

    2015-01-01

    Full Text Available The article under the title "ANALYSIS OF THE PENSION SYSTEM OF THE USSR" deals with numerous aspects of development of the pension system of the former USSR. Since the improvement of the Russian pension system is presently high on the agenda, the author believes that analyzing the own historical experience in the first line is essential in order to create a sound and efficient pension system in Russia. The study presented in the article aims to execute an in-depth analysis of legislature on the soviet pension system with the view to recreate the architecture of the pension system of the USSR. In addition, the study also reflects on the official statistics for the said period to make a qualified and fundamental conclusion on the efficiency of the soviet pension system. The evolution of the pension system, based on statistical data evidently proves the efficiently of the soviet pension system. It is highly recommended that the positive aspects of the soviet pension system are taken into consideration when reforming the actual pension system of Russian Federation.

  5. Tiny Integrated Network Analyzer for Noninvasive Measurements of Electrically Small Antennas

    DEFF Research Database (Denmark)

    Buskgaard, Emil Feldborg; Krøyer, Ben; Tatomirescu, Alexandru

    2016-01-01

    the system. The tiny integrated network analyzer is a stand-alone Arduino-based measurement system that utilizes the transmit signal of the system under test as its reference. It features a power meter with triggering ability, on-board memory, universal serial bus, and easy extendibility with general...

  6. Characterization of leadership styles by analyzing social networks

    Directory of Open Access Journals (Sweden)

    Enrique Saravia Vergara

    2015-12-01

    Full Text Available The study presents an analysis of networks to characterize the leadership styles in an institution volunteer, complementary or alternative to classic questionnaires to measure leadership. The study raises test questions to identify friendly relations and prominent leaders in the leadership dimensions of transformational, transactional and passive / avoidant and analyzes, for each of them, the metrics of the network structure as a whole and the role each individual actor. The study exploratory level, based on the opinion of 9 members of a specific project, allowed to show the benefits of network analysis applied to the subject of leadership: (i identified that the climate of "respect and trust", "enthusiasm" and "concern for the welfare of the people" dominate the organization; and (ii the individual role of each leader was identified. Three leaders who are considered as the best friends and care about the welfare of others were identified, but one of them stands for broadcasting "greater respect and trust" and is "an example to follow"; while the other two leaders stand out as being more "enthusiastic and optimistic" and "promote innovation and creativity," among other findings.

  7. A network approach to analyzing highly recombinant malaria parasite genes.

    Directory of Open Access Journals (Sweden)

    Daniel B Larremore

    Full Text Available The var genes of the human malaria parasite Plasmodium falciparum present a challenge to population geneticists due to their extreme diversity, which is generated by high rates of recombination. These genes encode a primary antigen protein called PfEMP1, which is expressed on the surface of infected red blood cells and elicits protective immune responses. Var gene sequences are characterized by pronounced mosaicism, precluding the use of traditional phylogenetic tools that require bifurcating tree-like evolutionary relationships. We present a new method that identifies highly variable regions (HVRs, and then maps each HVR to a complex network in which each sequence is a node and two nodes are linked if they share an exact match of significant length. Here, networks of var genes that recombine freely are expected to have a uniformly random structure, but constraints on recombination will produce network communities that we identify using a stochastic block model. We validate this method on synthetic data, showing that it correctly recovers populations of constrained recombination, before applying it to the Duffy Binding Like-α (DBLα domain of var genes. We find nine HVRs whose network communities map in distinctive ways to known DBLα classifications and clinical phenotypes. We show that the recombinational constraints of some HVRs are correlated, while others are independent. These findings suggest that this micromodular structuring facilitates independent evolutionary trajectories of neighboring mosaic regions, allowing the parasite to retain protein function while generating enormous sequence diversity. Our approach therefore offers a rigorous method for analyzing evolutionary constraints in var genes, and is also flexible enough to be easily applied more generally to any highly recombinant sequences.

  8. Analyzing the international exergy flow network of ferrous metal ores.

    Science.gov (United States)

    Qi, Hai; An, Haizhong; Hao, Xiaoqing; Zhong, Weiqiong; Zhang, Yanbing

    2014-01-01

    This paper employs an un-weighted and weighted exergy network to study the properties of ferrous metal ores in countries worldwide and their evolution from 2002 to 2012. We find that there are few countries controlling most of the ferrous metal ore exports in terms of exergy and that the entire exergy flow network is becoming more heterogeneous though the addition of new nodes. The increasing of the average clustering coefficient indicates that the formation of an international exergy flow system and regional integration is improving. When we contrast the average out strength of exergy and the average out strength of currency, we find both similarities and differences. Prices are affected largely by human factors; thus, the growth rate of the average out strength of currency has fluctuated acutely in the eleven years from 2002 to 2012. Exergy is defined as the maximum work that can be extracted from a system and can reflect the true cost in the world, and this parameter fluctuates much less. Performing an analysis based on the two aspects of exergy and currency, we find that the network is becoming uneven.

  9. CRISP90 - SOFTWARE DESIGN ANALYZER SYSTEM

    Science.gov (United States)

    Tausworthe, R. C.

    1994-01-01

    The CRISP90 Software Design Analyzer System, an update of CRISP-80, is a set of programs forming a software design and documentation tool which supports top-down, hierarchic, modular, structured design and programming methodologies. The quality of a computer program can often be significantly influenced by the design medium in which the program is developed. The medium must foster the expression of the programmer's ideas easily and quickly, and it must permit flexible and facile alterations, additions, and deletions to these ideas as the design evolves. The CRISP90 software design analyzer system was developed to provide the PDL (Programmer Design Language) programmer with such a design medium. A program design using CRISP90 consists of short, English-like textual descriptions of data, interfaces, and procedures that are imbedded in a simple, structured, modular syntax. The display is formatted into two-dimensional, flowchart-like segments for a graphic presentation of the design. Together with a good interactive full-screen editor or word processor, the CRISP90 design analyzer becomes a powerful tool for the programmer. In addition to being a text formatter, the CRISP90 system prepares material that would be tedious and error prone to extract manually, such as a table of contents, module directory, structure (tier) chart, cross-references, and a statistics report on the characteristics of the design. Referenced modules are marked by schematic logic symbols to show conditional, iterative, and/or concurrent invocation in the program. A keyword usage profile can be generated automatically and glossary definitions inserted into the output documentation. Another feature is the capability to detect changes that were made between versions. Thus, "change-bars" can be placed in the output document along with a list of changed pages and a version history report. Also, items may be marked as "to be determined" and each will appear on a special table until the item is

  10. Visual analyzer as anticipatory system (functional organization)

    Science.gov (United States)

    Kirvelis, Dobilas

    2000-05-01

    Hypothetical functional organization of the visual analyzer is presented. The interpretation of visual perception, anatomic and morphological structure of visual systems of animals, neuro-physiological, psychological and psycho-physiological data in the light of a number of the theoretical solutions of image recognition and visual processes simulation enable active information processing. The activities in special areas of cortex are as follows: focused attention, prediction with analysis of visual scenes and synthesis, predictive mental images. In the projection zone of visual cortex Area Streata or V1 a "sensory" screen (SS) and "reconstruction" screen (RS) are supposed to exist. The functional structure of visual analyzer consist of: analysis of visual scenes projected onto SS; "tracing" of images; preliminary recognition; reversive image reconstruction onto RS; comparison of images projected onto SS with images reconstructed onto RS; and "correction" of preliminary recognition. Special attention is paid to the quasiholographical principles of the neuronal organization within the brain, of the image "tracing," and of reverse image reconstruction. Tachistoscopic experiments revealed that the duration of one such hypothesis-testing cycle of the human visual analyzers is about 8-10 milliseconds.

  11. Analyzing endocrine system conservation and evolution.

    Science.gov (United States)

    Bonett, Ronald M

    2016-08-01

    Analyzing variation in rates of evolution can provide important insights into the factors that constrain trait evolution, as well as those that promote diversification. Metazoan endocrine systems exhibit apparent variation in evolutionary rates of their constituent components at multiple levels, yet relatively few studies have quantified these patterns and analyzed them in a phylogenetic context. This may be in part due to historical and current data limitations for many endocrine components and taxonomic groups. However, recent technological advancements such as high-throughput sequencing provide the opportunity to collect large-scale comparative data sets for even non-model species. Such ventures will produce a fertile data landscape for evolutionary analyses of nucleic acid and amino acid based endocrine components. Here I summarize evolutionary rate analyses that can be applied to categorical and continuous endocrine traits, and also those for nucleic acid and protein-based components. I emphasize analyses that could be used to test whether other variables (e.g., ecology, ontogenetic timing of expression, etc.) are related to patterns of rate variation and endocrine component diversification. The application of phylogenetic-based rate analyses to comparative endocrine data will greatly enhance our understanding of the factors that have shaped endocrine system evolution. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Analyzing Nonblocking Switching Networks using Linear Programming (Duality)

    CERN Document Server

    Ngo, Hung Q; Le, Anh N; Nguyen, Thanh-Nhan

    2012-01-01

    The main task in analyzing a switching network design (including circuit-, multirate-, and photonic-switching) is to determine the minimum number of some switching components so that the design is non-blocking in some sense (e.g., strict- or wide-sense). We show that, in many cases, this task can be accomplished with a simple two-step strategy: (1) formulate a linear program whose optimum value is a bound for the minimum number we are seeking, and (2) specify a solution to the dual program, whose objective value by weak duality immediately yields a sufficient condition for the design to be non-blocking. We illustrate this technique through a variety of examples, ranging from circuit to multirate to photonic switching, from unicast to $f$-cast and multicast, and from strict- to wide-sense non-blocking. The switching architectures in the examples are of Clos-type and Banyan-type, which are the two most popular architectural choices for designing non-blocking switching networks. To prove the result in the multir...

  13. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  14. Strategizing through analyzing and influencing the network horizon

    NARCIS (Netherlands)

    Holmen, Elsebeth; Pedersen, Ann-Charlott

    2003-01-01

    How does a firm keep on being valuable in a network? One requirement is that the firm has a sufficient overview of the network and its dynamics. In other words, a firm's strategy depends on the firm's overview of the network—its network horizon. How comprehensive or limited should its network

  15. Developing an Approach for Analyzing and Verifying System Communication

    Science.gov (United States)

    Stratton, William C.; Lindvall, Mikael; Ackermann, Chris; Sibol, Deane E.; Godfrey, Sally

    2009-01-01

    This slide presentation reviews a project for developing an approach for analyzing and verifying the inter system communications. The motivation for the study was that software systems in the aerospace domain are inherently complex, and operate under tight constraints for resources, so that systems of systems must communicate with each other to fulfill the tasks. The systems of systems requires reliable communications. The technical approach was to develop a system, DynSAVE, that detects communication problems among the systems. The project enhanced the proven Software Architecture Visualization and Evaluation (SAVE) tool to create Dynamic SAVE (DynSAVE). The approach monitors and records low level network traffic, converting low level traffic into meaningful messages, and displays the messages in a way the issues can be detected.

  16. Analyzing Distributed Generation Impact on the Reliability of Electric Distribution Network

    OpenAIRE

    Sanaullah Ahmad; Sana Sardar; Babar Noor; Azzam ul Asar

    2016-01-01

    With proliferation of Distribution Generation (DG) and renewable energy technologies the power system is becoming more complex, with passage of time the development of distributed generation technologies is becoming diverse and broad. Power system reliability is one of most vital area in electric power system which deals with continuous supply of power and customer satisfaction. Distribution network in power system contributed up to 80% of reliability problems. This paper analyzes the impact ...

  17. Climate Model Diagnostic Analyzer Web Service System

    Science.gov (United States)

    Lee, S.; Pan, L.; Zhai, C.; Tang, B.; Kubar, T. L.; Li, J.; Zhang, J.; Wang, W.

    2015-12-01

    Both the National Research Council Decadal Survey and the latest Intergovernmental Panel on Climate Change Assessment Report stressed the need for the comprehensive and innovative evaluation of climate models with the synergistic use of global satellite observations in order to improve our weather and climate simulation and prediction capabilities. The abundance of satellite observations for fundamental climate parameters and the availability of coordinated model outputs from CMIP5 for the same parameters offer a great opportunity to understand and diagnose model biases in climate models. In addition, the Obs4MIPs efforts have created several key global observational datasets that are readily usable for model evaluations. However, a model diagnostic evaluation process requires physics-based multi-variable comparisons that typically involve large-volume and heterogeneous datasets, making them both computationally- and data-intensive. In response, we have developed a novel methodology to diagnose model biases in contemporary climate models and implementing the methodology as a web-service based, cloud-enabled, provenance-supported climate-model evaluation system. The evaluation system is named Climate Model Diagnostic Analyzer (CMDA), which is the product of the research and technology development investments of several current and past NASA ROSES programs. The current technologies and infrastructure of CMDA are designed and selected to address several technical challenges that the Earth science modeling and model analysis community faces in evaluating and diagnosing climate models. In particular, we have three key technology components: (1) diagnostic analysis methodology; (2) web-service based, cloud-enabled technology; (3) provenance-supported technology. The diagnostic analysis methodology includes random forest feature importance ranking, conditional probability distribution function, conditional sampling, and time-lagged correlation map. We have implemented the

  18. Analyzing the Dynamics of Communication in Online Social Networks

    Science.gov (United States)

    de Choudhury, Munmun; Sundaram, Hari; John, Ajita; Seligmann, Doree Duncan

    This chapter deals with the analysis of interpersonal communication dynamics in online social networks and social media. Communication is central to the evolution of social systems. Today, the different online social sites feature variegated interactional affordances, ranging from blogging, micro-blogging, sharing media elements (i.e., image, video) as well as a rich set of social actions such as tagging, voting, commenting and so on. Consequently, these communication tools have begun to redefine the ways in which we exchange information or concepts, and how the media channels impact our online interactional behavior. Our central hypothesis is that such communication dynamics between individuals manifest themselves via two key aspects: the information or concept that is the content of communication, and the channel i.e., the media via which communication takes place. We present computational models and discuss large-scale quantitative observational studies for both these organizing ideas. First, we develop a computational framework to determine the "interestingness" property of conversations cented around rich media. Second, we present user models of diffusion of social actions and study the impact of homophily on the diffusion process. The outcome of this research is twofold. First, extensive empirical studies on datasets from YouTube have indicated that on rich media sites, the conversations that are deemed "interesting" appear to have consequential impact on the properties of the social network they are associated with: in terms of degree of participation of the individuals in future conversations, thematic diffusion as well as emergent cohesiveness in activity among the concerned participants in the network. Second, observational and computational studies on large social media datasets such as Twitter have indicated that diffusion of social actions in a network can be indicative of future information cascades. Besides, given a topic, these cascades are often a

  19. An integrated systems calculation of a steam generator tube rupture in a modular prismatic HTGR (high-temperature gas-cooled reactor) conceptual design using ATHENA (Advanced Thermal-Hydraulic Energy Network Analyzer)

    Energy Technology Data Exchange (ETDEWEB)

    Beelman, R.J. (Idaho National Engineering Laboratory, Idaho Falls (USA))

    1989-11-01

    The capability to perform integrated systems calculations of modular high-temperature gas-cooled reactor (MHTGR) transients has been developed at the Idaho National Engineering Laboratory (INEL) using the Advanced Thermal-Hydraulic Energy Network Analyzer (ATHENA) computer code. A scoping calculation of a steam generator tube rupture (SGTR) water ingress event in a prismatic 2 {times} 350-MW(thermal) MHTGR conceptual design has been completed at INEL using ATHENA. The proposed MHTGR design incorporates dual, graphite-moderated, helium-cooled, 350-MW(thermal), annular prismatic core concept reactor plants, each configured with an individual helical once-through steam generator steaming a common 280-MW(electric) turbine generator set.

  20. Interorganizational Innovation in Systemic Networks

    DEFF Research Database (Denmark)

    Seemann, Janne; Dinesen, Birthe; Gustafsson, Jeppe

    2013-01-01

    that linear n-stage models by reducing complexity and flux end up focusing only on the surface of the network and are thus unable to grasp important aspects of network dynamics. The paper suggests that there is a need for a more dynamic innovation model able to grasp the whole picture of dynamics in systemic...... patients with chronic obstructive pulmonary disease (COPD) to avoid readmission, perform self monitoring and to maintain rehabilitation in their homes. The aim of the paper is to identify, analyze and discuss innovation dynamics in the COPD network and on a preliminary basis to identify implications...... for managing innovations in systemic networks. The main argument of this paper is that innovation dynamics in systemic networks should be understood as a complex interplay of four logics: 1) Fragmented innovation, 2) Interface innovation, 3) Competing innovation, 4) Co-innovation. The findings indicate...

  1. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  2. Network of networks in Linux operating system

    Science.gov (United States)

    Wang, Haoqin; Chen, Zhen; Xiao, Guanping; Zheng, Zheng

    2016-04-01

    Operating system represents one of the most complex man-made systems. In this paper, we analyze Linux Operating System (LOS) as a complex network via modeling functions as nodes and function calls as edges. It is found that for the LOS network and modularized components within it, the out-degree follows an exponential distribution and the in-degree follows a power-law distribution. For better understanding the underlying design principles of LOS, we explore the coupling correlations of components in LOS from aspects of topology and function. The result shows that the component for device drivers has a strong manifestation in topology while a weak manifestation in function. However, the component for process management shows the contrary phenomenon. Moreover, in an effort to investigate the impact of system failures on networks, we make a comparison between the networks traced from normal and failure status of LOS. This leads to a conclusion that the failure will change function calls which should be executed in normal status and introduce new function calls in the meanwhile.

  3. Climate Model Diagnostic Analyzer Web Service System

    Science.gov (United States)

    Lee, S.; Pan, L.; Zhai, C.; Tang, B.; Jiang, J. H.

    2013-12-01

    The latest Intergovernmental Panel on Climate Change (IPCC) Fourth Assessment Report stressed the need for the comprehensive and innovative evaluation of climate models with newly available global observations. The traditional approach to climate model evaluation, which compares a single parameter at a time, identifies symptomatic model biases and errors but fails to diagnose the model problems. The model diagnosis process requires physics-based multi-variable comparisons that typically involve large-volume and heterogeneous datasets, making them both computationally- and data-intensive. To address these challenges, we are developing a parallel, distributed web-service system that enables the physics-based multi-variable model performance evaluations and diagnoses through the comprehensive and synergistic use of multiple observational data, reanalysis data, and model outputs. We have developed a methodology to transform an existing science application code into a web service using a Python wrapper interface and Python web service frameworks (i.e., Flask, Gunicorn, and Tornado). The web-service system, called Climate Model Diagnostic Analyzer (CMDA), currently supports (1) all the datasets from Obs4MIPs and a few ocean datasets from NOAA and Argo, which can serve as observation-based reference data for model evaluation and (2) many of CMIP5 model outputs covering a broad range of atmosphere, ocean, and land variables from the CMIP5 specific historical runs and AMIP runs. Analysis capabilities currently supported by CMDA are (1) the calculation of annual and seasonal means of physical variables, (2) the calculation of time evolution of the means in any specified geographical region, (3) the calculation of correlation between two variables, and (4) the calculation of difference between two variables. A web user interface is chosen for CMDA because it not only lowers the learning curve and removes the adoption barrier of the tool but also enables instantaneous use

  4. Systems Analyze Water Quality in Real Time

    Science.gov (United States)

    2010-01-01

    A water analyzer developed under Small Business Innovation Research (SBIR) contracts with Kennedy Space Center now monitors treatment processes at water and wastewater facilities around the world. Originally designed to provide real-time detection of nutrient levels in hydroponic solutions for growing plants in space, the ChemScan analyzer, produced by ASA Analytics Inc., of Waukesha, Wisconsin, utilizes spectrometry and chemometric algorithms to automatically analyze multiple parameters in the water treatment process with little need for maintenance, calibration, or operator intervention. The company has experienced a compound annual growth rate of 40 percent over its 15-year history as a direct result of the technology's success.

  5. Social network analyzer on the example of Twitter

    Science.gov (United States)

    Gorodetskaia, Mariia; Khruslova, Diana

    2017-09-01

    Social networks are powerful sources of data due to their popularity. Twitter is one of the networks providing a lot of data. There is need to collect this data for future usage from linguistics to SMM and marketing. The report examines the existing software solutions and provides new ones. The study includes information about the software developed. Some future features are listed.

  6. Analyzing Trust Perceptions in System Implementations

    DEFF Research Database (Denmark)

    Schlichter, Bjarne Rerup; Rose, Jeremy

    2009-01-01

    mount, trust relations become strained, leading to a circle of suspicion and disbelief which is both destructive and hard to break out of. This case study analyses trust relations during a problematic period of time in the implementation of the Faroese integrated healthcare information system, using......' perceptions of trust relations influence future actions, and in this way have both negative and positive consequences. We also conclude that Giddens' theories of trust provide a promising insight into the dynamic aspects of trust relations in implementation projects, which go further than trust theories...

  7. Analyzing GAIAN Database (GaianDB) on a Tactical Network

    Science.gov (United States)

    2015-11-30

    we connected 3 Raspberry Pi’s running GaianDB and our augmented version of splatform to a network of 3 CSRs. The Raspberry Pi is a low power, low...based on Debian from a connected secure digital high capacity (SDHC) card or a universal serial bus (USB) device. The Raspberry Pi comes equipped with...requirements, capabilities, and cost make the Raspberry Pi a useful device for sensor experimentation. From there, we performed 3 types of benchmarks

  8. Analyzing Spread of Influence in Social Networks for Transportation Application.

    Science.gov (United States)

    2016-09-02

    This project analyzed the spread of influence in social media, in particular, the Twitter social media site, and identified the individuals who exert the most influence to those they interact with. There are published studies that use social media to...

  9. Analyzing Spread of Influence in Social Networks for Transportation Applications

    Science.gov (United States)

    2016-09-02

    This project analyzed the spread of influence in social media, in particular, the Twitter social media site, and identified the individuals who exert the most influence to those they interact with. There are published studies that use social media to...

  10. Systems engineering technology for networks

    Science.gov (United States)

    1994-01-01

    The report summarizes research pursued within the Systems Engineering Design Laboratory at Virginia Polytechnic Institute and State University between May 16, 1993 and January 31, 1994. The project was proposed in cooperation with the Computational Science and Engineering Research Center at Howard University. Its purpose was to investigate emerging systems engineering tools and their applicability in analyzing the NASA Network Control Center (NCC) on the basis of metrics and measures.

  11. Analyzing energy consumption of wireless networks. A model-based approach

    Energy Technology Data Exchange (ETDEWEB)

    Yue, Haidi

    2013-03-04

    During the last decades, wireless networking has been continuously a hot topic both in academy and in industry. Many different wireless networks have been introduced like wireless local area networks, wireless personal networks, wireless ad hoc networks, and wireless sensor networks. If these networks want to have a long term usability, the power consumed by the wireless devices in each of these networks needs to be managed efficiently. Hence, a lot of effort has been carried out for the analysis and improvement of energy efficiency, either for a specific network layer (protocol), or new cross-layer designs. In this thesis, we apply model-based approach for the analysis of energy consumption of different wireless protocols. The protocols under consideration are: one leader election protocol, one routing protocol, and two medium access control protocols. By model-based approach we mean that all these four protocols are formalized as some formal models, more precisely, as discrete-time Markov chains (DTMCs), Markov decision processes (MDPs), or stochastic timed automata (STA). For the first two models, DTMCs and MDPs, we model them in PRISM, a prominent model checker for probabilistic model checking, and apply model checking technique to analyze them. Model checking belongs to the family of formal methods. It discovers exhaustively all possible (reachable) states of the models, and checks whether these models meet a given specification. Specifications are system properties that we want to study, usually expressed by some logics, for instance, probabilistic computer tree logic (PCTL). However, while model checking relies on rigorous mathematical foundations and automatically explores the entire state space of a model, its applicability is also limited by the so-called state space explosion problem -- even systems of moderate size often yield models with an exponentially larger state space that thwart their analysis. Hence for the STA models in this thesis, since there

  12. Look Together: Analyzing Gaze Coordination with Epistemic Network Analysis

    Directory of Open Access Journals (Sweden)

    Sean eAndrist

    2015-07-01

    Full Text Available When conversing and collaborating in everyday situations, people naturally and interactively align their behaviors with each other across various communication channels, including speech, gesture, posture, and gaze. Having access to a partner's referential gaze behavior has been shown to be particularly important in achieving collaborative outcomes, but the process in which people's gaze behaviors unfold over the course of an interaction and become tightly coordinated is not well understood. In this paper, we present work to develop a deeper and more nuanced understanding of coordinated referential gaze in collaborating dyads. We recruited 13 dyads to participate in a collaborative sandwich-making task and used dual mobile eye tracking to synchronously record each participant's gaze behavior. We used a relatively new analysis technique—epistemic network analysis—to jointly model the gaze behaviors of both conversational participants. In this analysis, network nodes represent gaze targets for each participant, and edge strengths convey the likelihood of simultaneous gaze to the connected target nodes during a given time-slice. We divided collaborative task sequences into discrete phases to examine how the networks of shared gaze evolved over longer time windows. We conducted three separate analyses of the data to reveal (1 properties and patterns of how gaze coordination unfolds throughout an interaction sequence, (2 optimal time lags of gaze alignment within a dyad at different phases of the interaction, and (3 differences in gaze coordination patterns for interaction sequences that lead to breakdowns and repairs. In addition to contributing to the growing body of knowledge on the coordination of gaze behaviors in joint activities, this work has implications for the design of future technologies that engage in situated interactions with human users.

  13. Analyzing self-similar and fractal properties of the C. elegans neural network.

    Directory of Open Access Journals (Sweden)

    Tyler M Reese

    Full Text Available The brain is one of the most studied and highly complex systems in the biological world. While much research has concentrated on studying the brain directly, our focus is the structure of the brain itself: at its core an interconnected network of nodes (neurons. A better understanding of the structural connectivity of the brain should elucidate some of its functional properties. In this paper we analyze the connectome of the nematode Caenorhabditis elegans. Consisting of only 302 neurons, it is one of the better-understood neural networks. Using a Laplacian Matrix of the 279-neuron "giant component" of the network, we use an eigenvalue counting function to look for fractal-like self similarity. This matrix representation is also used to plot visualizations of the neural network in eigenfunction coordinates. Small-world properties of the system are examined, including average path length and clustering coefficient. We test for localization of eigenfunctions, using graph energy and spacial variance on these functions. To better understand results, all calculations are also performed on random networks, branching trees, and known fractals, as well as fractals which have been "rewired" to have small-world properties. We propose algorithms for generating Laplacian matrices of each of these graphs.

  14. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  15. Using a modified Hewlett Packard 8410 network analyzer as an automated farfield antenna range receiver

    Science.gov (United States)

    Terry, John D.; Kunath, Richard R.

    1990-01-01

    A Hewlett Packard 8410 Network Analyzer was modified to be used as an automated far-field antenna range receiver. By using external mixers, analog to digital signal conversion, and an external computer/controller, the HP8410 is capable of measuring signals as low as -110 dBm. The modified receiver is an integral part of an automated far-field range which features computer controlled test antenna positioning, system measurement parameters, and data acquisition, as well as customized measurement file management. The system described was assembled and made operational, taking advantage of off-the-shelf hardware available at minimal cost.

  16. Near-field antenna testing using the Hewlett Packard 8510 automated network analyzer

    Science.gov (United States)

    Kunath, Richard R.; Garrett, Michael J.

    1990-01-01

    Near-field antenna measurements were made using a Hewlett-Packard 8510 automated network analyzer. This system features measurement sensitivity better than -90 dBm, at measurement speeds of one data point per millisecond in the fast data acquisition mode. The system was configured using external, even harmonic mixers and a fiber optic distributed local oscillator signal. Additionally, the time domain capability of the HP8510, made it possible to generate far-field diagnostic results immediately after data acquisition without the use of an external computer.

  17. Analyzing traffic layout using dynamic social network analysis.

    Science.gov (United States)

    2014-07-12

    it is essential to build, maintain, and use our transportation systems in a manner that meets our current : needs while addressing the social and economic needs of future generations. In todays world, : transportation congestion causes serious neg...

  18. Analyzing resilience of urban networks: a preliminary step towards more flood resilient cities

    Science.gov (United States)

    Lhomme, S.; Serre, D.; Diab, Y.; Laganier, R.

    2013-02-01

    In Europe, river floods have been increasing in frequency and severity. These circumstances require the management of flood risk by integrating new concepts like urban resilience. Nevertheless, urban resilience seems to have no accurate meanings. That is why researchers are primarily concerned with defining resilience. Nevertheless, focus on research object seems to be more important than focus on conceptual debate (Resilience of what? Rather than what is resilience?). Thus the methodology designed here is focused on urban considerations. In fact, a system approach emphasizes technical networks' importance concerning urban resilience. Principles and assumptions applied in this research finally lead to the analysis of how urban networks are able to face natural hazards. In this context, a Web-GIS has been developed for analyzing resistance capacity, absorption capacity and recovery capacity of different technical networks. A first application has been carried out on a French agglomeration in order to analyze road network absorption capacity. This application is very specific but, thanks to this example, it is already possible to highlight the methodology's usefulness.

  19. ANALYZING SOCIAL NETWORKS FROM THE PERSPECTIVE OF MARKETING DECISIONS

    Directory of Open Access Journals (Sweden)

    Logica BANICA

    2015-12-01

    Full Text Available Nowadays, the Web became more than a space for product presentation, but also a capitalization market (e-commerce and an efficient way to know the customer preferences and to meet their requirements. Large companies have the financial potential to use various marketing strategies and, in particular, digital-marketing. Instead, small businesses are looking for lower cost or no cost methods (also called guerrilla marketing. A small company can compete with a large company by approaching a particular range of products that excel in quality, and also by inventiveness in the marketing strategy. During 2010-2015 the potential of Information Technology and Communications (IT&C sector was proved for the companies which aimed towards modernization of technologies and introduced new strategies in order to commercialize new products. An important challenge for companies was to be aware of the changes in customer behaviour, using social networks software. Finally, research centers have set up new IT&C services and improved marketing and communications following the crisis. More and more companies invest in analytic tools to monitor their marketing strategies and Big Data becomes extremely useful for this purpose, using information like customer demographics and spending habits, oscillation between simplicity, comfort and glamour. There are various tools that can transform in a very short time, massive amounts of data into real business value in a very short time, helping companies and retailers to understand, at any point in the product lifecycle, which trends are gaining and which are losing ground. These insights give them the possibility to reduce the risk of not selling their products by making adjustments to the design, production or promotional strategies, before putting the goods on the market. In this paper we aim to present the advantages of exploring customer requirements from social media for marketing strategy of an enterprise, by using SNA

  20. Analyzing and constraining signaling networks: parameter estimation for the user.

    Science.gov (United States)

    Geier, Florian; Fengos, Georgios; Felizzi, Federico; Iber, Dagmar

    2012-01-01

    The behavior of most dynamical models not only depends on the wiring but also on the kind and strength of interactions which are reflected in the parameter values of the model. The predictive value of mathematical models therefore critically hinges on the quality of the parameter estimates. Constraining a dynamical model by an appropriate parameterization follows a 3-step process. In an initial step, it is important to evaluate the sensitivity of the parameters of the model with respect to the model output of interest. This analysis points at the identifiability of model parameters and can guide the design of experiments. In the second step, the actual fitting needs to be carried out. This step requires special care as, on the one hand, noisy as well as partial observations can corrupt the identification of system parameters. On the other hand, the solution of the dynamical system usually depends in a highly nonlinear fashion on its parameters and, as a consequence, parameter estimation procedures get easily trapped in local optima. Therefore any useful parameter estimation procedure has to be robust and efficient with respect to both challenges. In the final step, it is important to access the validity of the optimized model. A number of reviews have been published on the subject. A good, nontechnical overview is provided by Jaqaman and Danuser (Nat Rev Mol Cell Biol 7(11):813-819, 2006) and a classical introduction, focussing on the algorithmic side, is given in Press (Numerical recipes: The art of scientific computing, Cambridge University Press, 3rd edn., 2007, Chapters 10 and 15). We will focus on the practical issues related to parameter estimation and use a model of the TGFβ-signaling pathway as an educative example. Corresponding parameter estimation software and models based on MATLAB code can be downloaded from the authors's web page ( http://www.bsse.ethz.ch/cobi ).

  1. Synthesize, optimize, analyze, repeat (SOAR): Application of neural network tools to ECG patient monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Watrous, R.; Towell, G.; Glassman, M.S. [Siemens Corporate Research, Princeton, NJ (United States)

    1995-12-31

    Results are reported from the application of tools for synthesizing, optimizing and analyzing neural networks to an ECG Patient Monitoring task. A neural network was synthesized from a rule-based classifier and optimized over a set of normal and abnormal heartbeats. The classification error rate on a separate and larger test set was reduced by a factor of 2. When the network was analyzed and reduced in size by a factor of 40%, the same level of performance was maintained.

  2. ATHENA (Advanced Thermal Hydraulic Energy Network Analyzer) solutions to developmental assessment problems

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, K.E.; Ransom, V.H.; Roth, P.A.

    1987-03-01

    The ATHENA (Advanced Thermal Hydraulic Energy Network Analyzer) code has been developed to perform transient simulation of the thermal hydraulic systems that may be found in fusion reactors, space reactors, and other advanced systems. As an assessment of current capability the code was applied to a number of physical problems, both conceptual and actual experiments. Results indicate that the numerical solution to the basic conservation equations is technically sound, and that generally good agreement can be obtained when modeling relevant hydrodynamic experiments. The assessment also demonstrates basic fusion system modeling capability and verifies compatibility of the code with both CDC and CRAY mainframes. Areas where improvements could be made include constitutive modeling, which describes the interfacial exchange term. 13 refs., 84 figs.

  3. [Preliminary design for a VI system combining the voice acoustic analyzing and glottal image analyzing].

    Science.gov (United States)

    Pan, Yan; Liu, Yan; Cai, Xiaolan; Li, Qiao; Meng, Yan; Xu, Xin; Sun, Wenhong; Zhang, Yuhua; Li, Xin; Qi, Yan

    2008-04-01

    This work is directed at developing a virtual instrument system as an accessorial diagnostic instrument for laryngeal diseases. Programmed with LabWindows/CVI, the system combines the voice acoustic analyzing function with the glottal image measuring function. The voice acoustic analyzing system can sample, store and replay vocal signals; can extract and analyze parameters, including fundamental frequency (F0), frequency perturbation quotient (FPQ), amplitude perturbation quotient(APQ), harmonics-to-noise ratio (HNR), jitter frequency (JF), Shimmer; and can do 3D sound graph analysis. The glottal image analyzing system can sample and store the image observed by the laryngostroboscope; can display any phase in one cycle of the vibration of the vocal cords or a slow and continuous movement of vibrating vocal cords; can snap and save the diagnostic frame of image; and can extract the parameters of the image such as the length and area of the glottis, the length and area of the vocal cords and the diseased part.

  4. Network operating system

    Science.gov (United States)

    Perotto, E.

    1987-08-01

    The Network Operating System is an addition to CMS designed to allow multitasking operation, while conserving all the facilities of CMS: file system, interactivity, high level language environment. Multitasking is useful for server virtual machines, e.g. Network Transport Managers, File Managers, Disk space Managers, Tape Unit Managers, where the execution of a task involves long waits due to I/O completion, VCMF communication delays or human responses, during which the task status stays as a control block in memory, while the virtual machine serves other users executing the same lines of code. Multitasking is not only for multi-user service: a big data reduction program may run as a main task, while a side task, connected to the virtual console, gives reports on the ongoing work of the main task in response to user commands and steers the main task through common data. All the service routines (Wait, Create and Delete Task, Get and Release Buffer, VMCF Open and Close Link, Send and Receive, I/O and Console Routines) are FORTRAN callable, and may be used from any language environment consistent with the same parameter passing conventions. The outstanding feature of this system is efficiency, no user defined SVC are used, and the use of other privileged instructions as LPSW or SSM is the bare necessary, so that CP (with the associated overhead) is not too involved. System code and read-only data are write-protected with a different storage key from CMS and user program.

  5. Accuracy assessment of the scalar network analyzer using sliding termination techniques

    DEFF Research Database (Denmark)

    Knudsen, Bent; Engen, Glenn F.; Guldbrandsen, Birthe

    1989-01-01

    In the absence of phase response the major, if not the primary, sources of error in the scalar network analyzer are the imperfect directivity, etc., associated with its internal and frequently inaccessible test set or measurement network. An explicit expression is obtained for this error in terms...

  6. S-Parameter Uncertainties in Network Analyzer Measurements with Application to Antenna Patterns

    Directory of Open Access Journals (Sweden)

    N. Yannopoulou

    2008-04-01

    Full Text Available An analytical method was developed to estimate uncertainties in full two-port Vector Network Analyzer measurements, using total differentials of S-parameters. System error uncertainties were also estimated from total differentials involving two triples of standards, in the Direct Through connection case. Standard load uncertainties and measurement inaccuracies were represented by independent differentials. Complex uncertainty in any quantity, differentiably dependent on S-parameters, is estimated by the corresponding Differential Error Region. Real uncertainties, rectangular and polar, are estimated by the orthogonal parallelogram and annular sector circumscribed about the Differential Error Region, respectively. From the user's point of view, manufactures' data may be used to set the independent differentials and apply the method. Demonstration results include: (1 System error differentials for Short, matching Load and Open pairs of opposite sex standards; (2 System error uncertainties for VNA extended by two lengthy transmission lines of opposite sex end-connectors; (3 High uncertainties in Z-parameters against frequency of an appropriately designed, DC resistive, T-Network; (4 Moderate uncertainties in amplitude and phase patterns of a designed UHF radial discone antenna (azimuthally rotated by a built positioner, under developed software control of a built hardware controller polarization coupled with a constructed gain standard antenna (stationary into an anechoic chamber.

  7. Building and analyzing protein interactome networks by cross-species comparisons

    Directory of Open Access Journals (Sweden)

    Blackman Barron

    2010-03-01

    Full Text Available Abstract Background A genomic catalogue of protein-protein interactions is a rich source of information, particularly for exploring the relationships between proteins. Numerous systems-wide and small-scale experiments have been conducted to identify interactions; however, our knowledge of all interactions for any one species is incomplete, and alternative means to expand these network maps is needed. We therefore took a comparative biology approach to predict protein-protein interactions across five species (human, mouse, fly, worm, and yeast and developed InterologFinder for research biologists to easily navigate this data. We also developed a confidence score for interactions based on available experimental evidence and conservation across species. Results The connectivity of the resultant networks was determined to have scale-free distribution, small-world properties, and increased local modularity, indicating that the added interactions do not disrupt our current understanding of protein network structures. We show examples of how these improved interactomes can be used to analyze a genome-scale dataset (RNAi screen and to assign new function to proteins. Predicted interactions within this dataset were tested by co-immunoprecipitation, resulting in a high rate of validation, suggesting the high quality of networks produced. Conclusions Protein-protein interactions were predicted in five species, based on orthology. An InteroScore, a score accounting for homology, number of orthologues with evidence of interactions, and number of unique observations of interactions, is given to each known and predicted interaction. Our website http://www.interologfinder.org provides research biologists intuitive access to this data.

  8. Computer Networks A Systems Approach

    CERN Document Server

    Peterson, Larry L

    2011-01-01

    This best-selling and classic book teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, the authors explain various protocols and networking technologies. Their systems-oriented approach encourages you to think about how individual network components fit into a larger, complex system of interactions. Whatever your perspective, whether it be that of an application developer, network administrator, or a designer of network equipment or protocols, you will come away with a "big pictur

  9. Analyzing Software Errors in Safety-Critical Embedded Systems

    Science.gov (United States)

    Lutz, Robyn R.

    1994-01-01

    This paper analyzes the root causes of safty-related software faults identified as potentially hazardous to the system are distributed somewhat differently over the set of possible error causes than non-safety-related software faults.

  10. Analysis of Few-Mode Multi-Core Fiber Splice Behavior Using an Optical Vector Network Analyzer

    DEFF Research Database (Denmark)

    Rommel, Simon; Mendinueta, Jose Manuel Delgado; Klaus, Werner

    2017-01-01

    The behavior of splices in a 3-mode 36-core fiber is analyzed using optical vector network analysis. Time-domain response analysis confirms splices may cause significant mode-mixing, while frequency-domain analysis shows splices may affect system level mode-dependent loss both positively...

  11. Biana: a software framework for compiling biological interactions and analyzing networks.

    Science.gov (United States)

    Garcia-Garcia, Javier; Guney, Emre; Aragues, Ramon; Planas-Iglesias, Joan; Oliva, Baldo

    2010-01-27

    The analysis and usage of biological data is hindered by the spread of information across multiple repositories and the difficulties posed by different nomenclature systems and storage formats. In particular, there is an important need for data unification in the study and use of protein-protein interactions. Without good integration strategies, it is difficult to analyze the whole set of available data and its properties. We introduce BIANA (Biologic Interactions and Network Analysis), a tool for biological information integration and network management. BIANA is a Python framework designed to achieve two major goals: i) the integration of multiple sources of biological information, including biological entities and their relationships, and ii) the management of biological information as a network where entities are nodes and relationships are edges. Moreover, BIANA uses properties of proteins and genes to infer latent biomolecular relationships by transferring edges to entities sharing similar properties. BIANA is also provided as a plugin for Cytoscape, which allows users to visualize and interactively manage the data. A web interface to BIANA providing basic functionalities is also available. The software can be downloaded under GNU GPL license from http://sbi.imim.es/web/BIANA.php. BIANA's approach to data unification solves many of the nomenclature issues common to systems dealing with biological data. BIANA can easily be extended to handle new specific data repositories and new specific data types. The unification protocol allows BIANA to be a flexible tool suitable for different user requirements: non-expert users can use a suggested unification protocol while expert users can define their own specific unification rules.

  12. Analyzing the Effects of Gap Junction Blockade on Neural Synchrony via a Motoneuron Network Computational Model

    Directory of Open Access Journals (Sweden)

    Heraldo Memelli

    2012-01-01

    Full Text Available In specific regions of the central nervous system (CNS, gap junctions have been shown to participate in neuronal synchrony. Amongst the CNS regions identified, some populations of brainstem motoneurons are known to be coupled by gap junctions. The application of various gap junction blockers to these motoneuron populations, however, has led to mixed results regarding their synchronous firing behavior, with some studies reporting a decrease in synchrony while others surprisingly find an increase in synchrony. To address this discrepancy, we employ a neuronal network model of Hodgkin-Huxley-style motoneurons connected by gap junctions. Using this model, we implement a series of simulations and rigorously analyze their outcome, including the calculation of a measure of neuronal synchrony. Our simulations demonstrate that under specific conditions, uncoupling of gap junctions is capable of producing either a decrease or an increase in neuronal synchrony. Subsequently, these simulations provide mechanistic insight into these different outcomes.

  13. Analyzing Systemic Risk in the Chinese Banking System

    NARCIS (Netherlands)

    Huang, Qiubin; de Haan, Jakob; Scholtens, Bert

    We examine systemic risk in the Chinese banking system by estimating the conditional value at risk (CoVaR), the marginal expected shortfall (MES), the systemic impact index (SII) and the vulnerability index (VI) for 16 listed banks in China. Although these measures show different patterns, our

  14. Analyzing the scheduling system stage of production system life cycle

    Directory of Open Access Journals (Sweden)

    Rajesh Attri

    2015-05-01

    Full Text Available The main objective of this paper is to identify and understand the relationship dynamics among the quality enabled factors affecting the scheduling stage of production system life cycle. For this purpose, Interpretative structural modelling (ISM approach has been utilized for developing the relationships among the various factors of the scheduling system stage. Afterwards, MICMAC (Matriced Impacts Croises Multiplication Appliqueeaun Classement analysis has been carried out in order to classify the factors into different categories and to disclose the direct and indirect effects of each factor on the scheduling system. It is an approach for refining the decision making in the scheduling stage of production system life cycle.

  15. Discriminating different classes of biological networks by analyzing the graphs spectra distribution

    CERN Document Server

    Takahashi, Daniel Yasumasa; Ferreira, Carlos Eduardo; Fujita, André

    2012-01-01

    The brain's structural and functional systems, protein-protein interaction, and gene networks are examples of biological systems that share some features of complex networks, such as highly connected nodes, modularity, and small-world topology. Recent studies indicate that some pathologies present topological network alterations relative to norms seen in the general population. Therefore, methods to discriminate the processes that generate the different classes of networks (e.g., normal and disease) might be crucial for the diagnosis, prognosis, and treatment of the disease. It is known that several topological properties of a network (graph) can be described by the distribution of the spectrum of its adjacency matrix. Moreover, large networks generated by the same random process have the same spectrum distribution, allowing us to use it as a "fingerprint". Based on this relationship, we introduce and propose the entropy of a graph spectrum to measure the "uncertainty" of a random graph and the Kullback-Leibl...

  16. Wind energy system time-domain (WEST) analyzers

    Science.gov (United States)

    Dreier, M. E.; Hoffman, J. A.

    1981-01-01

    A portable analyzer which simulates in real time the complex nonlinear dynamics of horizontal axis wind energy systems was constructed. Math models for an aeroelastic rotor featuring nonlinear aerodynamic and inertial terms were implemented with high speed digital controllers and analog calculation. This model was combined with other math models of elastic supports, control systems, a power train and gimballed rotor kinematics. A stroboscopic display system graphically depicting distributed blade loads, motion, and other aerodynamic functions on a cathode ray tube is included. Limited correlation efforts showed good comparison between the results of this analyzer and other sophisticated digital simulations. The digital simulation results were successfully correlated with test data.

  17. Quasi-Optical Network Analyzers and High-Reliability RF MEMS Switched Capacitors

    Science.gov (United States)

    Grichener, Alexander

    The thesis first presents a 2-port quasi-optical scalar network analyzer consisting of a transmitter and receiver both built in planar technology. The network analyzer is based on a Schottky-diode mixer integrated inside a planar antenna and fed differentially by a CPW transmission line. The antenna is placed on an extended hemispherical high-resistivity silicon substrate lens. The LO signal is swept from 3-5 GHz and high-order harmonic mixing in both up- and down- conversion mode is used to realize the 15-50 GHz RF bandwidth. The network analyzer resulted in a dynamic range of greater than 40 dB and was successfully used to measure a frequency selective surface with a second-order bandpass response. Furthermore, the system was built with circuits and components for easy scaling to millimeter-wave frequencies which is the primary motivation for this work. The application areas for a millimeter and submillimeter-wave network analyzer include material characterization and art diagnostics. The second project presents several RF MEMS switched capacitors designed for high-reliability operation and suitable for tunable filters and reconfigurable networks. The first switched-capacitor resulted in a digital capacitance ratio of 5 and an analog capacitance ratio of 5-9. The analog tuning of the down-state capacitance is enhanced by a positive vertical stress gradient in the the beam, making it ideal for applications that require precision tuning. A thick electroplated beam resulted in Q greater than 100 at C to X-band frequencies, and power handling of 0.6-1.1 W. The design also minimized charging in the dielectric, resulting in excellent reliability performance even under hot-switched and high power (1 W) conditions. The second switched-capacitor was designed without any dielectric to minimize charging. The device was hot-switched at 1 W of RF power for greater than 11 billion cycles with virtually no change in the C-V curve. The final project presents a 7-channel

  18. Pseudomonas aeruginosa Virulence Analyzed in a Dictyostelium discoideum Host System

    OpenAIRE

    Cosson, Pierre; Zulianello, Laurence; Join-Lambert, Olivier; Faurisson, François; Gebbie, Leigh; Benghezal, Mohammed; Van Delden, Christian; Kocjancic Curty, Lasta; Köhler, Thilo

    2002-01-01

    Pseudomonas aeruginosa is an important opportunistic pathogen that produces a variety of cell-associated and secreted virulence factors. P. aeruginosa infections are difficult to treat effectively because of the rapid emergence of antibiotic-resistant strains. In this study, we analyzed whether the amoeba Dictyostelium discoideum can be used as a simple model system to analyze the virulence of P. aeruginosa strains. The virulent wild-type strain PAO1 was shown to inhibit growth of D. discoide...

  19. Views of wireless network systems.

    Energy Technology Data Exchange (ETDEWEB)

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  20. Mapping biological systems to network systems

    CERN Document Server

    Rathore, Heena

    2016-01-01

    The book presents the challenges inherent in the paradigm shift of network systems from static to highly dynamic distributed systems – it proposes solutions that the symbiotic nature of biological systems can provide into altering networking systems to adapt to these changes. The author discuss how biological systems – which have the inherent capabilities of evolving, self-organizing, self-repairing and flourishing with time – are inspiring researchers to take opportunities from the biology domain and map them with the problems faced in network domain. The book revolves around the central idea of bio-inspired systems -- it begins by exploring why biology and computer network research are such a natural match. This is followed by presenting a broad overview of biologically inspired research in network systems -- it is classified by the biological field that inspired each topic and by the area of networking in which that topic lies. Each case elucidates how biological concepts have been most successfully ...

  1. Limitation of degree information for analyzing the interaction evolution in online social networks

    Science.gov (United States)

    Shang, Ke-Ke; Yan, Wei-Sheng; Xu, Xiao-Ke

    2014-04-01

    Previously many studies on online social networks simply analyze the static topology in which the friend relationship once established, then the links and nodes will not disappear, but this kind of static topology may not accurately reflect temporal interactions on online social services. In this study, we define four types of users and interactions in the interaction (dynamic) network. We found that active, disappeared, new and super nodes (users) have obviously different strength distribution properties and this result also can be revealed by the degree characteristics of the unweighted interaction and friendship (static) networks. However, the active, disappeared, new and super links (interactions) only can be reflected by the strength distribution in the weighted interaction network. This result indicates the limitation of the static topology data on analyzing social network evolutions. In addition, our study uncovers the approximately stable statistics for the dynamic social network in which there are a large variation for users and interaction intensity. Our findings not only verify the correctness of our definitions, but also helped to study the customer churn and evaluate the commercial value of valuable customers in online social networks.

  2. Comparing Models GRM, Refraction Tomography and Neural Network to Analyze Shallow Landslide

    Directory of Open Access Journals (Sweden)

    Armstrong F. Sompotan

    2011-11-01

    Full Text Available Detailed investigations of landslides are essential to understand fundamental landslide mechanisms. Seismic refraction method has been proven as a useful geophysical tool for investigating shallow landslides. The objective of this study is to introduce a new workflow using neural network in analyzing seismic refraction data and to compare the result with some methods; that are general reciprocal method (GRM and refraction tomography. The GRM is effective when the velocity structure is relatively simple and refractors are gently dipping. Refraction tomography is capable of modeling the complex velocity structures of landslides. Neural network is found to be more potential in application especially in time consuming and complicated numerical methods. Neural network seem to have the ability to establish a relationship between an input and output space for mapping seismic velocity. Therefore, we made a preliminary attempt to evaluate the applicability of neural network to determine velocity and elevation of subsurface synthetic models corresponding to arrival times. The training and testing process of the neural network is successfully accomplished using the synthetic data. Furthermore, we evaluated the neural network using observed data. The result of the evaluation indicates that the neural network can compute velocity and elevation corresponding to arrival times. The similarity of those models shows the success of neural network as a new alternative in seismic refraction data interpretation.

  3. Risks in Networked Computer Systems

    OpenAIRE

    Klingsheim, André N.

    2008-01-01

    Networked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A broad range of systems is discussed in this thesis: Norwegian online banking systems, the Norwegian Automated Teller Machine (ATM) system during the 90's, mobile phones, web applications, and wireless networks. One paper also comments on legal risks to bank cust...

  4. Using an agent-based model to analyze the dynamic communication network of the immune response

    Directory of Open Access Journals (Sweden)

    Doolittle John

    2011-01-01

    Full Text Available Abstract Background The immune system behaves like a complex, dynamic network with interacting elements including leukocytes, cytokines, and chemokines. While the immune system is broadly distributed, leukocytes must communicate effectively to respond to a pathological challenge. The Basic Immune Simulator 2010 contains agents representing leukocytes and tissue cells, signals representing cytokines, chemokines, and pathogens, and virtual spaces representing organ tissue, lymphoid tissue, and blood. Agents interact dynamically in the compartments in response to infection of the virtual tissue. Agent behavior is imposed by logical rules derived from the scientific literature. The model captured the agent-to-agent contact history, and from this the network topology and the interactions resulting in successful versus failed viral clearance were identified. This model served to integrate existing knowledge and allowed us to examine the immune response from a novel perspective directed at exploiting complex dynamics, ultimately for the design of therapeutic interventions. Results Analyzing the evolution of agent-agent interactions at incremental time points from identical initial conditions revealed novel features of immune communication associated with successful and failed outcomes. There were fewer contacts between agents for simulations ending in viral elimination (win versus persistent infection (loss, due to the removal of infected agents. However, early cellular interactions preceded successful clearance of infection. Specifically, more Dendritic Agent interactions with TCell and BCell Agents, and more BCell Agent interactions with TCell Agents early in the simulation were associated with the immune win outcome. The Dendritic Agents greatly influenced the outcome, confirming them as hub agents of the immune network. In addition, unexpectedly high frequencies of Dendritic Agent-self interactions occurred in the lymphoid compartment late in the

  5. [Network structures in biological systems].

    Science.gov (United States)

    Oleskin, A V

    2013-01-01

    Network structures (networks) that have been extensively studied in the humanities are characterized by cohesion, a lack of a central control unit, and predominantly fractal properties. They are contrasted with structures that contain a single centre (hierarchies) as well as with those whose elements predominantly compete with one another (market-type structures). As far as biological systems are concerned, their network structures can be subdivided into a number of types involving different organizational mechanisms. Network organization is characteristic of various structural levels of biological systems ranging from single cells to integrated societies. These networks can be classified into two main subgroups: (i) flat (leaderless) network structures typical of systems that are composed of uniform elements and represent modular organisms or at least possess manifest integral properties and (ii) three-dimensional, partly hierarchical structures characterized by significant individual and/or intergroup (intercaste) differences between their elements. All network structures include an element that performs structural, protective, and communication-promoting functions. By analogy to cell structures, this element is denoted as the matrix of a network structure. The matrix includes a material and an immaterial component. The material component comprises various structures that belong to the whole structure and not to any of its elements per se. The immaterial (ideal) component of the matrix includes social norms and rules regulating network elements' behavior. These behavioral rules can be described in terms of algorithms. Algorithmization enables modeling the behavior of various network structures, particularly of neuron networks and their artificial analogs.

  6. Deterministic System Identification Using RBF Networks

    Directory of Open Access Journals (Sweden)

    Joilson Batista de Almeida Rego

    2014-01-01

    Full Text Available This paper presents an artificial intelligence application using a nonconventional mathematical tool: the radial basis function (RBF networks, aiming to identify the current plant of an induction motor or other nonlinear systems. Here, the objective is to present the RBF response to different nonlinear systems and analyze the obtained results. A RBF network is trained and simulated in order to obtain the dynamical solution with basin of attraction and equilibrium point for known and unknown system and establish a relationship between these dynamical systems and the RBF response. On the basis of several examples, the results indicating the effectiveness of this approach are demonstrated.

  7. AnalyzeThis: An Analysis Workflow-Aware Storage System

    Energy Technology Data Exchange (ETDEWEB)

    Sim, Hyogi [ORNL; Kim, Youngjae [ORNL; Vazhkudai, Sudharshan S [ORNL; Tiwari, Devesh [ORNL; Anwar, Ali [Virginia Tech, Blacksburg, VA; Butt, Ali R [Virginia Tech, Blacksburg, VA; Ramakrishnan, Lavanya [Lawrence Berkeley National Laboratory (LBNL)

    2015-01-01

    The need for novel data analysis is urgent in the face of a data deluge from modern applications. Traditional approaches to data analysis incur significant data movement costs, moving data back and forth between the storage system and the processor. Emerging Active Flash devices enable processing on the flash, where the data already resides. An array of such Active Flash devices allows us to revisit how analysis workflows interact with storage systems. By seamlessly blending together the flash storage and data analysis, we create an analysis workflow-aware storage system, AnalyzeThis. Our guiding principle is that analysis-awareness be deeply ingrained in each and every layer of the storage, elevating data analyses as first-class citizens, and transforming AnalyzeThis into a potent analytics-aware appliance. We implement the AnalyzeThis storage system atop an emulation platform of the Active Flash array. Our results indicate that AnalyzeThis is viable, expediting workflow execution and minimizing data movement.

  8. Ambulatory bruxism recording system with sleep-stage analyzing function.

    Science.gov (United States)

    Mizumori, Takahiro; Inano, Shinji; Sumiya, Masakazu; Kobayashi, Yasuyoshi; Watamoto, Takao; Yatani, Hirofumi

    2009-07-01

    The aim of this study was to develop an ambulatory bruxism recording system capable of sleep-stage analysis. A portable EMG system was used to record masseter muscle activity. An EMG sensor was attached onto the masseter muscle belly at either side. EMG data were stored on a notebook type personal computer. A sound level meter was used to assess the sound level of bruxism. Sound level (dB) readings were taken every second and recorded on the same computer. A prototype of sleep sensor, a wristwatch-style biological signal sensor-recorder device, recorded and stored pulse wave, acceleration and temperature on a memory card. All stored data were transferred to a personal computer and analyzed. The whole system was transportable within a protective case and weighed approximately 5kg. Raw EMG signals were processed to derive integrated EMG data. TOSHIBA Sleep Analysis Program classified sleep-stages as awake, shallow sleep, deep sleep and REM based on the activity of the autonomic nervous system that was estimated from the fluctuations of pulse intervals. An EMG, sound level and sleep-stage analysis program was developed to analyze all data simultaneously. Using this program, the masseter muscle activity, sound level and sleep-stage could be quantified and correlated. We developed an ambulatory bruxism recording system that analyzes sleep-stage. We expect that this system will enable us to measure sleep bruxism activity in each sleep-stage on an electromyographical and auditory basis at the subject's home.

  9. Language Networks as Complex Systems

    Science.gov (United States)

    Lee, Max Kueiming; Ou, Sheue-Jen

    2008-01-01

    Starting in the late eighties, with a growing discontent with analytical methods in science and the growing power of computers, researchers began to study complex systems such as living organisms, evolution of genes, biological systems, brain neural networks, epidemics, ecology, economy, social networks, etc. In the early nineties, the research…

  10. Financial Network Systemic Risk Contributions

    NARCIS (Netherlands)

    Hautsch, N.; Schaumburg, J.; Schienle, M.

    2015-01-01

    We propose the realized systemic risk beta as a measure of financial companies' contribution to systemic risk, given network interdependence between firms' tail risk exposures. Conditional on statistically pre-identified network spillover effects and market and balance sheet information, we define

  11. Total Differential Errors in One-Port Network Analyzer Measurements with Application to Antenna Impedance

    Directory of Open Access Journals (Sweden)

    P. Zimourtopoulos

    2007-06-01

    Full Text Available The objective was to study uncertainty in antenna input impedance resulting from full one-port Vector Network Analyzer (VNA measurements. The VNA process equation in the reflection coefficient ρ of a load, its measurement m and three errors Es, determinable from three standard loads and their measurements, was considered. Differentials were selected to represent measurement inaccuracies and load uncertainties (Differential Errors. The differential operator was applied on the process equation and the total differential error dρ for any unknown load (Device Under Test DUT was expressed in terms of dEs and dm, without any simplification. Consequently, the differential error of input impedance Z -or any other physical quantity differentiably dependent on ρ- is expressible. Furthermore, to express precisely a comparison relation between complex differential errors, the geometric Differential Error Region and its Differential Error Intervals were defined. Practical results are presented for an indoor UHF ground-plane antenna in contrast with a common 50 Ω DC resistor inside an aluminum box. These two built, unshielded and shielded, DUTs were tested against frequency under different system configurations and measurement considerations. Intermediate results for Es and dEs characterize the measurement system itself. A number of calculations and illustrations demonstrate the application of the method.

  12. When the Web meets the cell: using personalized PageRank for analyzing protein interaction networks.

    Science.gov (United States)

    Iván, Gábor; Grolmusz, Vince

    2011-02-01

    Enormous and constantly increasing quantity of biological information is represented in metabolic and in protein interaction network databases. Most of these data are freely accessible through large public depositories. The robust analysis of these resources needs novel technologies, being developed today. Here we demonstrate a technique, originating from the PageRank computation for the World Wide Web, for analyzing large interaction networks. The method is fast, scalable and robust, and its capabilities are demonstrated on metabolic network data of the tuberculosis bacterium and the proteomics analysis of the blood of melanoma patients. The Perl script for computing the personalized PageRank in protein networks is available for non-profit research applications (together with sample input files) at the address: http://uratim.com/pp.zip.

  13. [Dynamic Pulse Signal Processing and Analyzing in Mobile System].

    Science.gov (United States)

    Chou, Yongxin; Zhang, Aihua; Ou, Jiqing; Qi, Yusheng

    2015-09-01

    In order to derive dynamic pulse rate variability (DPRV) signal from dynamic pulse signal in real time, a method for extracting DPRV signal was proposed and a portable mobile monitoring system was designed. The system consists of a front end for collecting and wireless sending pulse signal and a mobile terminal. The proposed method is employed to extract DPRV from dynamic pulse signal in mobile terminal, and the DPRV signal is analyzed both in the time domain and the frequency domain and also with non-linear method in real time. The results show that the proposed method can accurately derive DPRV signal in real time, the system can be used for processing and analyzing DPRV signal in real time.

  14. Analyzing fixed points of intracellular regulation networks with interrelated feedback topology

    Directory of Open Access Journals (Sweden)

    Radde Nicole

    2012-06-01

    Full Text Available Abstract Background Modeling the dynamics of intracellular regulation networks by systems of ordinary differential equations has become a standard method in systems biology, and it has been shown that the behavior of these networks is often tightly connected to the network topology. We have recently introduced the circuit-breaking algorithm, a method that uses the network topology to construct a one-dimensional circuit-characteristic of the system. It was shown that this characteristic can be used for an efficient calculation of the system’s fixed points. Results Here we extend previous work and show several connections between the circuit-characteristic and the stability of fixed points. In particular, we derive a sufficient condition on the characteristic for a fixed point to be unstable for certain graph structures and demonstrate that the characteristic does not contain the information to decide whether a fixed point is asymptotically stable. All statements are illustrated on biological network models. Conclusions Single feedback circuits and their role for complex dynamic behavior of biological networks have extensively been investigated, but a transfer of most of these concepts to more complex topologies is difficult. In this context, our algorithm is a powerful new approach for the analysis of regulation networks that goes beyond single isolated feedback circuits.

  15. Networking systems design and development

    CERN Document Server

    Chao, Lee

    2009-01-01

    Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professional

  16. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  17. Pseudomonas aeruginosa virulence analyzed in a Dictyostelium discoideum host system.

    Science.gov (United States)

    Cosson, Pierre; Zulianello, Laurence; Join-Lambert, Olivier; Faurisson, François; Gebbie, Leigh; Benghezal, Mohammed; Van Delden, Christian; Curty, Lasta Kocjancic; Köhler, Thilo

    2002-06-01

    Pseudomonas aeruginosa is an important opportunistic pathogen that produces a variety of cell-associated and secreted virulence factors. P. aeruginosa infections are difficult to treat effectively because of the rapid emergence of antibiotic-resistant strains. In this study, we analyzed whether the amoeba Dictyostelium discoideum can be used as a simple model system to analyze the virulence of P. aeruginosa strains. The virulent wild-type strain PAO1 was shown to inhibit growth of D. discoideum. Isogenic mutants deficient in the las quorum-sensing system were almost as inhibitory as the wild type, while rhl quorum-sensing mutants permitted growth of Dictyostelium cells. Therefore, in this model system, factors controlled by the rhl quorum-sensing system were found to play a central role. Among these, rhamnolipids secreted by the wild-type strain PAO1 could induce fast lysis of D. discoideum cells. By using this simple model system, we predicted that certain antibiotic-resistant mutants of P. aeruginosa should show reduced virulence. This result was confirmed in a rat model of acute pneumonia. Thus, D. discoideum could be used as a simple nonmammalian host system to assess pathogenicity of P. aeruginosa.

  18. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  19. Social Network Analysis as a tool to analyze interaction of Batsmen and Bowlers in Cricket

    CERN Document Server

    Mukherjee, Satyam

    2012-01-01

    This paper describes the far reaching applications of network methods for understanding interaction within members of sport teams. Although a popular sport in the erstwhile English colonies, cricket has not received much attention from scientific community even though there is no dearth of statistics. This paper presents a network based approach to analyze the interaction of batsmen and bowlers in International cricket matches. First we consider the network of interaction between bowlers and batsmen. If two batsmen faced the same bowler they are connected by an unweighted link. Similarly if two bowlers bowled to the same batsman, they are connected. In this way a network of batsmen and bowlers is generated. We determine the exact values of clustering coefficient, average degree, average shortest path length of the networks and compare them with the Erd\\text{\\"{o}}s-R\\text{\\'{e}}nyi model and the configuration model. We also study an alternate version of the network in which two batsmen are connected if they a...

  20. Random matrix theory for analyzing the brain functional network in attention deficit hyperactivity disorder

    Science.gov (United States)

    Wang, Rong; Wang, Li; Yang, Yong; Li, Jiajia; Wu, Ying; Lin, Pan

    2016-11-01

    Attention deficit hyperactivity disorder (ADHD) is the most common childhood neuropsychiatric disorder and affects approximately 6 -7 % of children worldwide. Here, we investigate the statistical properties of undirected and directed brain functional networks in ADHD patients based on random matrix theory (RMT), in which the undirected functional connectivity is constructed based on correlation coefficient and the directed functional connectivity is measured based on cross-correlation coefficient and mutual information. We first analyze the functional connectivity and the eigenvalues of the brain functional network. We find that ADHD patients have increased undirected functional connectivity, reflecting a higher degree of linear dependence between regions, and increased directed functional connectivity, indicating stronger causality and more transmission of information among brain regions. More importantly, we explore the randomness of the undirected and directed functional networks using RMT. We find that for ADHD patients, the undirected functional network is more orderly than that for normal subjects, which indicates an abnormal increase in undirected functional connectivity. In addition, we find that the directed functional networks are more random, which reveals greater disorder in causality and more chaotic information flow among brain regions in ADHD patients. Our results not only further confirm the efficacy of RMT in characterizing the intrinsic properties of brain functional networks but also provide insights into the possibilities RMT offers for improving clinical diagnoses and treatment evaluations for ADHD patients.

  1. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  2. Performance of Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Yingwei Zhang

    2013-01-01

    Full Text Available Data packet dropout is a special kind of time delay problem. In this paper, predictive controllers for networked control systems (NCSs with dual-network are designed by model predictive control method. The contributions are as follows. (1 The predictive control problem of the dual-network is considered. (2 The predictive performance of the dual-network is evaluated. (3 Compared to the popular networked control systems, the optimal controller of the new NCSs with data packets dropout is designed, which can minimize infinite performance index at each sampling time and guarantee the closed-loop system stability. Finally, the simulation results show the feasibility and effectiveness of the controllers designed.

  3. INGAS: Iranian Noble Gas Analyzing System for radioxenon measurement

    Science.gov (United States)

    Doost-Mohammadi, V.; Afarideh, H.; Etaati, G. R.; Safari, M. J.; Rouhi, H.

    2016-03-01

    In this article, Iranian Noble Gas Analyzing System (INGAS) will be introduced. This system is based on beta-gamma coincidence technique and consists of a well-type NaI(Tl) as gamma or X radiation detector and a cylindrical plastic scintillator to detect beta or conversion electron. Standard NIM modules were utilized to detect coincidence events of detectors. Both the beta and gamma detectors were appropriately calibrated. The efficiency curve of gamma detector for volume geometry was obtained by comparing the results of gamma point sources measurements and simulations of GATE V7.0 Monte Carlo code. The performance of detection system was checked by injection of 222Rn and 131mXe gaseous source in the detection cell. The minimum detectable activity of the system for 133Xe is 1.240±0.024 mBq for 24 h measurement time.

  4. Creating and analyzing pathway and protein interaction compendia for modelling signal transduction networks

    Directory of Open Access Journals (Sweden)

    Kirouac Daniel C

    2012-05-01

    Full Text Available Abstract Background Understanding the information-processing capabilities of signal transduction networks, how those networks are disrupted in disease, and rationally designing therapies to manipulate diseased states require systematic and accurate reconstruction of network topology. Data on networks central to human physiology, such as the inflammatory signalling networks analyzed here, are found in a multiplicity of on-line resources of pathway and interactome databases (Cancer CellMap, GeneGo, KEGG, NCI-Pathway Interactome Database (NCI-PID, PANTHER, Reactome, I2D, and STRING. We sought to determine whether these databases contain overlapping information and whether they can be used to construct high reliability prior knowledge networks for subsequent modeling of experimental data. Results We have assembled an ensemble network from multiple on-line sources representing a significant portion of all machine-readable and reconcilable human knowledge on proteins and protein interactions involved in inflammation. This ensemble network has many features expected of complex signalling networks assembled from high-throughput data: a power law distribution of both node degree and edge annotations, and topological features of a “bow tie” architecture in which diverse pathways converge on a highly conserved set of enzymatic cascades focused around PI3K/AKT, MAPK/ERK, JAK/STAT, NFκB, and apoptotic signaling. Individual pathways exhibit “fuzzy” modularity that is statistically significant but still involving a majority of “cross-talk” interactions. However, we find that the most widely used pathway databases are highly inconsistent with respect to the actual constituents and interactions in this network. Using a set of growth factor signalling networks as examples (epidermal growth factor, transforming growth factor-beta, tumor necrosis factor, and wingless, we find a multiplicity of network topologies in which receptors couple to downstream

  5. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  6. Analyzing topological characteristics of neuronal functional networks in the rat brain

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Hu [School of Computer Science and Communication Engineering, Jiangsu University, Jiangsu 212003 (China); School of Computer Science, Fudan University, Shanghai 200433 (China); Yang, Shengtao [Institutes of Brain Science, Fudan University, Shanghai 200433 (China); Song, Yuqing [School of Computer Science and Communication Engineering, Jiangsu University, Jiangsu 212003 (China); Wei, Hui [School of Computer Science, Fudan University, Shanghai 200433 (China)

    2014-08-28

    In this study, we recorded spike trains from brain cortical neurons of several behavioral rats in vivo by using multi-electrode recordings. An NFN was constructed in each trial, obtaining a total of 150 NFNs in this study. The topological characteristics of NFNs were analyzed by using the two most important characteristics of complex networks, namely, small-world structure and community structure. We found that the small-world properties exist in different NFNs constructed in this study. Modular function Q was used to determine the existence of community structure in NFNs, through which we found that community-structure characteristics, which are related to recorded spike train data sets, are more evident in the Y-maze task than in the DM-GM task. Our results can also be used to analyze further the relationship between small-world characteristics and the cognitive behavioral responses of rats. - Highlights: • We constructed the neuronal function networks based on the recorded neurons. • We analyzed the two main complex network characteristics, namely, small-world structure and community structure. • NFNs which were constructed based on the recorded neurons in this study exhibit small-world properties. • Some NFNs have community structure characteristics.

  7. Analyzing psychotherapy process as intersubjective sensemaking: an approach based on discourse analysis and neural networks.

    Science.gov (United States)

    Nitti, Mariangela; Ciavolino, Enrico; Salvatore, Sergio; Gennaro, Alessandro

    2010-09-01

    The authors propose a method for analyzing the psychotherapy process: discourse flow analysis (DFA). DFA is a technique representing the verbal interaction between therapist and patient as a discourse network, aimed at measuring the therapist-patient discourse ability to generate new meanings through time. DFA assumes that the main function of psychotherapy is to produce semiotic novelty. DFA is applied to the verbatim transcript of the psychotherapy. It defines the main meanings active within the therapeutic discourse by means of the combined use of text analysis and statistical techniques. Subsequently, it represents the dynamic interconnections among these meanings in terms of a "discursive network." The dynamic and structural indexes of the discursive network have been shown to provide a valid representation of the patient-therapist communicative flow as well as an estimation of its clinical quality. Finally, a neural network is designed specifically to identify patterns of functioning of the discursive network and to verify the clinical validity of these patterns in terms of their association with specific phases of the psychotherapy process. An application of the DFA to a case of psychotherapy is provided to illustrate the method and the kinds of results it produces.

  8. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    Science.gov (United States)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  9. Livelihood diversification in tropical coastal communities: a network-based approach to analyzing 'livelihood landscapes'.

    Science.gov (United States)

    Cinner, Joshua E; Bodin, Orjan

    2010-08-11

    Diverse livelihood portfolios are frequently viewed as a critical component of household economies in developing countries. Within the context of natural resources governance in particular, the capacity of individual households to engage in multiple occupations has been shown to influence important issues such as whether fishers would exit a declining fishery, how people react to policy, the types of resource management systems that may be applicable, and other decisions about natural resource use. This paper uses network analysis to provide a novel methodological framework for detailed systemic analysis of household livelihood portfolios. Paying particular attention to the role of natural resource-based occupations such as fisheries, we use network analyses to map occupations and their interrelationships- what we refer to as 'livelihood landscapes'. This network approach allows for the visualization of complex information about dependence on natural resources that can be aggregated at different scales. We then examine how the role of natural resource-based occupations changes along spectra of socioeconomic development and population density in 27 communities in 5 western Indian Ocean countries. Network statistics, including in- and out-degree centrality, the density of the network, and the level of network centralization are compared along a multivariate index of community-level socioeconomic development and a gradient of human population density. The combination of network analyses suggests an increase in household-level specialization with development for most occupational sectors, including fishing and farming, but that at the community-level, economies remained diversified. The novel modeling approach introduced here provides for various types of livelihood portfolio analyses at different scales of social aggregation. Our livelihood landscapes approach provides insights into communities' dependencies and usages of natural resources, and shows how patterns of

  10. Multilevel Complex Networks and Systems

    Science.gov (United States)

    Caldarelli, Guido

    2014-03-01

    Network theory has been a powerful tool to model isolated complex systems. However, the classical approach does not take into account the interactions often present among different systems. Hence, the scientific community is nowadays concentrating the efforts on the foundations of new mathematical tools for understanding what happens when multiple networks interact. The case of economic and financial networks represents a paramount example of multilevel networks. In the case of trade, trade among countries the different levels can be described by the different granularity of the trading relations. Indeed, we have now data from the scale of consumers to that of the country level. In the case of financial institutions, we have a variety of levels at the same scale. For example one bank can appear in the interbank networks, ownership network and cds networks in which the same institution can take place. In both cases the systemically important vertices need to be determined by different procedures of centrality definition and community detection. In this talk I will present some specific cases of study related to these topics and present the regularities found. Acknowledged support from EU FET Project ``Multiplex'' 317532.

  11. A network centrality measure framework for analyzing urban traffic flow: A case study of Wuhan, China

    Science.gov (United States)

    Zhao, Shuangming; Zhao, Pengxiang; Cui, Yunfan

    2017-07-01

    In this paper, we propose an improved network centrality measure framework that takes into account both the topological characteristics and the geometric properties of a road network in order to analyze urban traffic flow in relation to different modes: intersection, road, and community, which correspond to point mode, line mode, and area mode respectively. Degree, betweenness, and PageRank centralities are selected as the analysis measures, and GPS-enabled taxi trajectory data is used to evaluate urban traffic flow. The results show that the mean value of the correlation coefficients between the modified degree, the betweenness, and the PageRank centralities and the traffic flow in all periods are higher than the mean value of the correlation coefficients between the conventional degree, the betweenness, the PageRank centralities and the traffic flow at different modes; this indicates that the modified measurements, for analyzing traffic flow, are superior to conventional centrality measurements. This study helps to shed light into the understanding of urban traffic flow in relation to different modes from the perspective of complex networks.

  12. A New Training Method for Analyzable Structured Neural Network and Application of Daily Peak Load Forecasting

    Science.gov (United States)

    Iizaka, Tatsuya; Matsui, Tetsuro; Fukuyama, Yoshikazu

    This paper presents a daily peak load forecasting method using an analyzable structured neural network (ASNN) in order to explain forecasting reasons. In this paper, we propose a new training method for ASNN in order to explain forecasting reason more properly than the conventional training method. ASNN consists of two types of hidden units. One type of hidden units has connecting weights between the hidden units and only one group of related input units. Another one has connecting weights between the hidden units and all input units. The former type of hidden units allows to explain forecasting reasons. The latter type of hidden units ensures the forecasting performance. The proposed training method make the former type of hidden units train only independent relations between the input factors and output, and make the latter type of hidden units train only complicated interactions between input factors. The effectiveness of the proposed neural network is shown using actual daily peak load. ASNN trained by the proposed method can explain forecasting reasons more properly than ASNN trained by the conventional method. Moreover, the proposed neural network can forecast daily peak load more accurately than conventional neural network trained by the back propagation algorithm.

  13. Identifying and analyzing the most important factors in universities scientific output using neural network

    Directory of Open Access Journals (Sweden)

    Sajjad Mohammadian

    2016-12-01

    Full Text Available For achieving to ideal research system is necessary to have policy and plan. The main aims of this research are knowledge extracted from the existing data gathered by the country research system. This Knowledge is prerequisite for science and technology policy. Population of the present descriptive research includes Universities of the Ministry of Science, Research & Technology. Data is extracted from database of monitoring of science and technology system. Classification algorithms Multilayer Preceptor neural network and neural network-based radius are used for data analysis. This research results showed that among the 15 indicators studied in this research, full-time faculty members, the number of theses, research funding and number of scholarships have more importance than other indicators. Among the four factors studied, the human resource factor is in the first place and has most importance in the scholarly productions. The education factor, financial factor and Structural factor is in the second to fourth rate.

  14. Analyzing the dynamics of emotional scene sequence using recurrent neuro-fuzzy network.

    Science.gov (United States)

    Zhang, Qing; Lee, Minho

    2013-02-01

    In this paper, we propose a new framework to analyze the temporal dynamics of the emotional stimuli. For this framework, both electroencephalography signal and visual information are of great importance. The fusion of visual information with brain signals allows us to capture the users' emotional state. Thus we adopt previously proposed fuzzy-GIST as emotional feature to summarize the emotional feedback. In order to model the dynamics of the emotional stimuli sequence, we develop a recurrent neuro-fuzzy network for modeling the dynamic events of emotional dimensions including valence and arousal. It can incorporate human expertise by IF-THEN fuzzy rule while recurrent connections allow the fuzzy rules of network to see its own previous output. The results show that such a framework can interact with human subjects and generate arbitrary emotional sequences after learning the dynamics of an emotional sequence with enough number of samples.

  15. A queueing network model to analyze the impact of parallelization of care on patient cycle time.

    Science.gov (United States)

    Jiang, Lixiang; Giachetti, Ronald E

    2008-09-01

    The total time a patient spends in an outpatient facility, called the patient cycle time, is a major contributor to overall patient satisfaction. A frequently recommended strategy to reduce the total time is to perform some activities in parallel thereby shortening patient cycle time. To analyze patient cycle time this paper extends and improves upon existing multi-class open queueing network model (MOQN) so that the patient flow in an urgent care center can be modeled. Results of the model are analyzed using data from an urgent care center contemplating greater parallelization of patient care activities. The results indicate that parallelization can reduce the cycle time for those patient classes which require more than one diagnostic and/ or treatment intervention. However, for many patient classes there would be little if any improvement, indicating the importance of tools to analyze business process reengineering rules. The paper makes contributions by implementing an approximation for fork/join queues in the network and by improving the approximation for multiple server queues in both low traffic and high traffic conditions. We demonstrate the accuracy of the MOQN results through comparisons to simulation results.

  16. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  17. DWARF – a data warehouse system for analyzing protein families

    Science.gov (United States)

    Fischer, Markus; Thai, Quan K; Grieb, Melanie; Pleiss, Jürgen

    2006-01-01

    Background The emerging field of integrative bioinformatics provides the tools to organize and systematically analyze vast amounts of highly diverse biological data and thus allows to gain a novel understanding of complex biological systems. The data warehouse DWARF applies integrative bioinformatics approaches to the analysis of large protein families. Description The data warehouse system DWARF integrates data on sequence, structure, and functional annotation for protein fold families. The underlying relational data model consists of three major sections representing entities related to the protein (biochemical function, source organism, classification to homologous families and superfamilies), the protein sequence (position-specific annotation, mutant information), and the protein structure (secondary structure information, superimposed tertiary structure). Tools for extracting, transforming and loading data from public available resources (ExPDB, GenBank, DSSP) are provided to populate the database. The data can be accessed by an interface for searching and browsing, and by analysis tools that operate on annotation, sequence, or structure. We applied DWARF to the family of α/β-hydrolases to host the Lipase Engineering database. Release 2.3 contains 6138 sequences and 167 experimentally determined protein structures, which are assigned to 37 superfamilies 103 homologous families. Conclusion DWARF has been designed for constructing databases of large structurally related protein families and for evaluating their sequence-structure-function relationships by a systematic analysis of sequence, structure and functional annotation. It has been applied to predict biochemical properties from sequence, and serves as a valuable tool for protein engineering. PMID:17094801

  18. Network analysis of eight industrial symbiosis systems

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Shi, Han; Yu, Xiangyi; Liu, Gengyuan; Su, Meirong; Li, Yating; Chai, Yingying

    2016-06-01

    Industrial symbiosis is the quintessential characteristic of an eco-industrial park. To divide parks into different types, previous studies mostly focused on qualitative judgments, and failed to use metrics to conduct quantitative research on the internal structural or functional characteristics of a park. To analyze a park's structural attributes, a range of metrics from network analysis have been applied, but few researchers have compared two or more symbioses using multiple metrics. In this study, we used two metrics (density and network degree centralization) to compare the degrees of completeness and dependence of eight diverse but representative industrial symbiosis networks. Through the combination of the two metrics, we divided the networks into three types: weak completeness, and two forms of strong completeness, namely "anchor tenant" mutualism and "equality-oriented" mutualism. The results showed that the networks with a weak degree of completeness were sparse and had few connections among nodes; for "anchor tenant" mutualism, the degree of completeness was relatively high, but the affiliated members were too dependent on core members; and the members in "equality-oriented" mutualism had equal roles, with diverse and flexible symbiotic paths. These results revealed some of the systems' internal structure and how different structures influenced the exchanges of materials, energy, and knowledge among members of a system, thereby providing insights into threats that may destabilize the network. Based on this analysis, we provide examples of the advantages and effectiveness of recent improvement projects in a typical Chinese eco-industrial park (Shandong Lubei).

  19. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  20. Plant systems biology: network matters.

    Science.gov (United States)

    Lucas, Mikaël; Laplaze, Laurent; Bennett, Malcolm J

    2011-04-01

    Systems biology is all about networks. A recent trend has been to associate systems biology exclusively with the study of gene regulatory or protein-interaction networks. However, systems biology approaches can be applied at many other scales, from the subatomic to the ecosystem scales. In this review, we describe studies at the sub-cellular, tissue, whole plant and crop scales and highlight how these studies can be related to systems biology. We discuss the properties of system approaches at each scale as well as their current limits, and pinpoint in each case advances unique to the considered scale but representing potential for the other scales. We conclude by examining plant models bridging different scales and considering the future prospects of plant systems biology. © 2011 Blackwell Publishing Ltd.

  1. Networks, linkages, and migration systems.

    Science.gov (United States)

    Fawcett, J T

    1989-01-01

    Recent theoretical interest in migration systems calls attention to the functions of diverse linkages between countries in stimulating, directing,and maintaining international flows of people. This article proposes a conceptual framework for the non-people linkages in international migration systems and discusses the implications for population movement of the 4 categories and 3 types of linkages that define the network. The 4 categories include 1) state to state relations, 2) mass culture connections, 3) family and personal networks, and 4) migrant agency activities. The 3 types of linkages are 1) tangible linkages, 2) regulatory linkages, and 3) relational linkages.

  2. Network operating system focus technology

    Science.gov (United States)

    1985-01-01

    An activity structured to provide specific design requirements and specifications for the Space Station Data Management System (DMS) Network Operating System (NOS) is outlined. Examples are given of the types of supporting studies and implementation tasks presently underway to realize a DMS test bed capability to develop hands-on understanding of NOS requirements as driven by actual subsystem test beds participating in the overall Johnson Space Center test bed program. Classical operating system elements and principal NOS functions are listed.

  3. Analyzing the effect of introducing a kurtosis parameter in Gaussian Bayesian networks

    Energy Technology Data Exchange (ETDEWEB)

    Main, P. [Dpto. Estadistica e I.O., Fac. Ciencias Matematicas, Univ. Complutense de Madrid, 28040 Madrid (Spain)], E-mail: pmain@mat.ucm.es; Navarro, H. [Dpto. de Estadistica, I.O. y Calc. Numerico, Fac. Ciencias, UNED, 28040 Madrid (Spain)

    2009-05-15

    Gaussian Bayesian networks are graphical models that represent the dependence structure of a multivariate normal random variable with a directed acyclic graph (DAG). In Gaussian Bayesian networks the output is usually the conditional distribution of some unknown variables of interest given a set of evidential nodes whose values are known. The problem of uncertainty about the assumption of normality is very common in applications. Thus a sensitivity analysis of the non-normality effect in our conclusions could be necessary. The aspect of non-normality to be considered is the tail behavior. In this line, the multivariate exponential power distribution is a family depending on a kurtosis parameter that goes from a leptokurtic to a platykurtic distribution with the normal as a mesokurtic distribution. Therefore a more general model can be considered using the multivariate exponential power distribution to describe the joint distribution of a Bayesian network, with a kurtosis parameter reflecting deviations from the normal distribution. The sensitivity of the conclusions to this perturbation is analyzed using the Kullback-Leibler divergence measure that provides an interesting formula to evaluate the effect.

  4. Evaluation of axial pile bearing capacity based on pile driving analyzer (PDA) test using Neural Network

    Science.gov (United States)

    Maizir, H.; Suryanita, R.

    2018-01-01

    A few decades, many methods have been developed to predict and evaluate the bearing capacity of driven piles. The problem of the predicting and assessing the bearing capacity of the pile is very complicated and not yet established, different soil testing and evaluation produce a widely different solution. However, the most important thing is to determine methods used to predict and evaluate the bearing capacity of the pile to the required degree of accuracy and consistency value. Accurate prediction and evaluation of axial bearing capacity depend on some variables, such as the type of soil, diameter, and length of pile, etc. The aims of the study of Artificial Neural Networks (ANNs) are utilized to obtain more accurate and consistent axial bearing capacity of a driven pile. ANNs can be described as mapping an input to the target output data. The method using the ANN model developed to predict and evaluate the axial bearing capacity of the pile based on the pile driving analyzer (PDA) test data for more than 200 selected data. The results of the predictions obtained by the ANN model and the PDA test were then compared. This research as the neural network models give a right prediction and evaluation of the axial bearing capacity of piles using neural networks.

  5. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  6. Livelihood diversification in tropical coastal communities: a network-based approach to analyzing 'livelihood landscapes'.

    Directory of Open Access Journals (Sweden)

    Joshua E Cinner

    Full Text Available BACKGROUND: Diverse livelihood portfolios are frequently viewed as a critical component of household economies in developing countries. Within the context of natural resources governance in particular, the capacity of individual households to engage in multiple occupations has been shown to influence important issues such as whether fishers would exit a declining fishery, how people react to policy, the types of resource management systems that may be applicable, and other decisions about natural resource use. METHODOLOGY/PRINCIPAL FINDINGS: This paper uses network analysis to provide a novel methodological framework for detailed systemic analysis of household livelihood portfolios. Paying particular attention to the role of natural resource-based occupations such as fisheries, we use network analyses to map occupations and their interrelationships- what we refer to as 'livelihood landscapes'. This network approach allows for the visualization of complex information about dependence on natural resources that can be aggregated at different scales. We then examine how the role of natural resource-based occupations changes along spectra of socioeconomic development and population density in 27 communities in 5 western Indian Ocean countries. Network statistics, including in- and out-degree centrality, the density of the network, and the level of network centralization are compared along a multivariate index of community-level socioeconomic development and a gradient of human population density. The combination of network analyses suggests an increase in household-level specialization with development for most occupational sectors, including fishing and farming, but that at the community-level, economies remained diversified. CONCLUSIONS/SIGNIFICANCE: The novel modeling approach introduced here provides for various types of livelihood portfolio analyses at different scales of social aggregation. Our livelihood landscapes approach provides insights

  7. Methods of Analyzing Companies’ Performance in Accounting using Expert Systems

    Directory of Open Access Journals (Sweden)

    Veronica Grosu

    2008-01-01

    Full Text Available The company’s performance reflects its capacity of generating future cash-flows, by using existent resources, and the efficiency level in using new resources.The capacity of generating future cash-flows assumes that the company would have to book revenues of its activity, and the use of the existent resources needs a detailed overview of the expenses of the period. The revenues and expenses are elements strictly tied to the evaluation process of the company’s performance. This paper seeks to emphasize the efficiency level in using resources dependent on the profit (when the revenues are higher than the expenses, or on the loss (when the expenses are higher than the revenues, their first-step evaluation in the accounting process, so that the next step would evaluate them through a professional specific processing system, in order to lay out the economic result by efficiently binding the two methods.The current paper will analyze only the recognition and evaluation of companies’ revenues, with the help of the two criteria, when the revenues are higher than the expenses and therefore one will carry out an evaluation and analysis of the company’s performance in this particular field.

  8. Networked control of microgrid system of systems

    Science.gov (United States)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  9. Analyzing the Localization of Retail Stores with Complex Systems Tools

    Science.gov (United States)

    Jensen, Pablo

    Measuring the spatial distribution of locations of many entities (trees, atoms, economic activities, ...), and, more precisely, the deviations from purely random configurations, is a powerful method to unravel their underlying interactions. I study here the spatial organization of retail commercial activities. From pure location data, network analysis leads to a community structure that closely follows the commercial classification of the US Department of Labor. The interaction network allows to build a ’quality’ index of optimal location niches for stores, which has been empirically tested.

  10. Architecting Communication Network of Networks for Space System of Systems

    Science.gov (United States)

    Bhasin, Kul B.; Hayden, Jeffrey L.

    2008-01-01

    The National Aeronautics and Space Administration (NASA) and the Department of Defense (DoD) are planning Space System of Systems (SoS) to address the new challenges of space exploration, defense, communications, navigation, Earth observation, and science. In addition, these complex systems must provide interoperability, enhanced reliability, common interfaces, dynamic operations, and autonomy in system management. Both NASA and the DoD have chosen to meet the new demands with high data rate communication systems and space Internet technologies that bring Internet Protocols (IP), routers, servers, software, and interfaces to space networks to enable as much autonomous operation of those networks as possible. These technologies reduce the cost of operations and, with higher bandwidths, support the expected voice, video, and data needed to coordinate activities at each stage of an exploration mission. In this paper, we discuss, in a generic fashion, how the architectural approaches and processes are being developed and used for defining a hypothetical communication and navigation networks infrastructure to support lunar exploration. Examples are given of the products generated by the architecture development process.

  11. Network centrality of metro systems.

    Directory of Open Access Journals (Sweden)

    Sybil Derrible

    Full Text Available Whilst being hailed as the remedy to the world's ills, cities will need to adapt in the 21(st century. In particular, the role of public transport is likely to increase significantly, and new methods and technics to better plan transit systems are in dire need. This paper examines one fundamental aspect of transit: network centrality. By applying the notion of betweenness centrality to 28 worldwide metro systems, the main goal of this paper is to study the emergence of global trends in the evolution of centrality with network size and examine several individual systems in more detail. Betweenness was notably found to consistently become more evenly distributed with size (i.e. no "winner takes all" unlike other complex network properties. Two distinct regimes were also observed that are representative of their structure. Moreover, the share of betweenness was found to decrease in a power law with size (with exponent 1 for the average node, but the share of most central nodes decreases much slower than least central nodes (0.87 vs. 2.48. Finally the betweenness of individual stations in several systems were examined, which can be useful to locate stations where passengers can be redistributed to relieve pressure from overcrowded stations. Overall, this study offers significant insights that can help planners in their task to design the systems of tomorrow, and similar undertakings can easily be imagined to other urban infrastructure systems (e.g., electricity grid, water/wastewater system, etc. to develop more sustainable cities.

  12. Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Naixue Xiong

    2014-12-01

    Full Text Available Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs. The quality of service (QoS of services composition applications (SCAs are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique—vector universal generating function (VUGF—which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  13. Analyzing comprehensive QoS with security constraints for services composition applications in wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Wu, Zhao; Huang, Yannong; Xu, Degang

    2014-12-01

    Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs). The quality of service (QoS) of services composition applications (SCAs) are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF) shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique-vector universal generating function (VUGF)-which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  14. The LILARTI neural network system

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D. Jr.; Schell, F.M.; Dodd, C.V.

    1992-10-01

    The material of this Technical Memorandum is intended to provide the reader with conceptual and technical background information on the LILARTI neural network system of detail sufficient to confer an understanding of the LILARTI method as it is presently allied and to facilitate application of the method to problems beyond the scope of this document. Of particular importance in this regard are the descriptive sections and the Appendices which include operating instructions, partial listings of program output and data files, and network construction information.

  15. ATHENA (Advanced Thermal Hydraulic Energy Network Analyzer) simulation of a loss of coolant accident in a space reactor

    Energy Technology Data Exchange (ETDEWEB)

    Roth, P.A.; Shumway, R.W.

    1988-01-01

    The Advanced Thermal Hydraulic Energy Network Analyzer (ATHENA) code was used to simulate a loss-of-coolant accident (LOCA) in a conceptual space reactor design. ATHENA provides the capability of simulating the thermal-hydraulic behavior of the wide variety of systems which are being considered for use in space reactors. Flow loops containing any one of several available working fluids may interact through thermal connections with other loops containing the same or a different working fluid. The code can be used to model special systems such as: heat pipes, point reactor kinetics, plant control systems, turbines, valves, and pumps. This work demonstrates the application of the thermal radiation model which has been recently incorporated into ATHENA and verifies the need for supplemental reactor cooling to prevent reactor fuel damage in the event of a LOCA.

  16. Analyzing the Potential of Full Duplex in 5G Ultra-Dense Small Cell Networks

    DEFF Research Database (Denmark)

    Gatnau, Marta; Berardinelli, Gilberto; Mahmood, Nurul Huda

    2016-01-01

    Full duplex technology has become an attractive solution for future 5th Generation (5G) systems for accommodating the exponentially growing mobile traffic demand. Full duplex allows a node to transmit and receive simultaneously in the same frequency band, thus, theoretically, doubling the system......-interference cancellation are demonstrated using our own developed test bed. Secondly, a detailed evaluation of full duplex communication in 5G ultra-dense small cell networks via system level simulations is provided. The results are presented in terms of throughput and delay. Two types of full duplex are studied: when...... in the self-interference cancellation technology. However, there are other limitations in achieving the theoretical full duplex gain: residual self-interference, traffic constraints and inter-cell and intra-cell interference. The contribution of this article is twofold. Firstly, achievable levels of self...

  17. Analyzing long-term correlated stochastic processes by means of recurrence networks: potentials and pitfalls.

    Science.gov (United States)

    Zou, Yong; Donner, Reik V; Kurths, Jürgen

    2015-02-01

    Long-range correlated processes are ubiquitous, ranging from climate variables to financial time series. One paradigmatic example for such processes is fractional Brownian motion (fBm). In this work, we highlight the potentials and conceptual as well as practical limitations when applying the recently proposed recurrence network (RN) approach to fBm and related stochastic processes. In particular, we demonstrate that the results of a previous application of RN analysis to fBm [Liu et al. Phys. Rev. E 89, 032814 (2014)] are mainly due to an inappropriate treatment disregarding the intrinsic nonstationarity of such processes. Complementarily, we analyze some RN properties of the closely related stationary fractional Gaussian noise (fGn) processes and find that the resulting network properties are well-defined and behave as one would expect from basic conceptual considerations. Our results demonstrate that RN analysis can indeed provide meaningful results for stationary stochastic processes, given a proper selection of its intrinsic methodological parameters, whereas it is prone to fail to uniquely retrieve RN properties for nonstationary stochastic processes like fBm.

  18. A network analysis of cofactor-protein interactions for analyzing associations between human nutrition and diseases.

    Science.gov (United States)

    Scott-Boyer, Marie Pier; Lacroix, Sébastien; Scotti, Marco; Morine, Melissa J; Kaput, Jim; Priami, Corrado

    2016-01-18

    The involvement of vitamins and other micronutrients in intermediary metabolism was elucidated in the mid 1900's at the level of individual biochemical reactions. Biochemical pathways remain the foundational knowledgebase for understanding how micronutrient adequacy modulates health in all life stages. Current daily recommended intakes were usually established on the basis of the association of a single nutrient to a single, most sensitive adverse effect and thus neglect interdependent and pleiotropic effects of micronutrients on biological systems. Hence, the understanding of the impact of overt or sub-clinical nutrient deficiencies on biological processes remains incomplete. Developing a more complete view of the role of micronutrients and their metabolic products in protein-mediated reactions is of importance. We thus integrated and represented cofactor-protein interaction data from multiple and diverse sources into a multi-layer network representation that links cofactors, cofactor-interacting proteins, biological processes, and diseases. Network representation of this information is a key feature of the present analysis and enables the integration of data from individual biochemical reactions and protein-protein interactions into a systems view, which may guide strategies for targeted nutritional interventions aimed at improving health and preventing diseases.

  19. Analyzing animal behavior via classifying each video frame using convolutional neural networks

    Science.gov (United States)

    Stern, Ulrich; He, Ruo; Yang, Chung-Hui

    2015-01-01

    High-throughput analysis of animal behavior requires software to analyze videos. Such software analyzes each frame individually, detecting animals’ body parts. But the image analysis rarely attempts to recognize “behavioral states”—e.g., actions or facial expressions—directly from the image instead of using the detected body parts. Here, we show that convolutional neural networks (CNNs)—a machine learning approach that recently became the leading technique for object recognition, human pose estimation, and human action recognition—were able to recognize directly from images whether Drosophila were “on” (standing or walking) or “off” (not in physical contact with) egg-laying substrates for each frame of our videos. We used multiple nets and image transformations to optimize accuracy for our classification task, achieving a surprisingly low error rate of just 0.072%. Classifying one of our 8 h videos took less than 3 h using a fast GPU. The approach enabled uncovering a novel egg-laying-induced behavior modification in Drosophila. Furthermore, it should be readily applicable to other behavior analysis tasks. PMID:26394695

  20. Purdue Plane Structures Analyzer II : a computerized wood engineering system

    Science.gov (United States)

    S. K. Suddarth; R. W. Wolfe

    1984-01-01

    The Purdue Plane Structures Analyzer (PPSA) is a computer program developed specifically for the analysis of wood structures. It uses recognized analysis procedures, in conjunction with recommendations of the 1982 National Design Specification for Wood Construction, to determine stresses and deflections of wood trusses and frames. The program offers several options for...

  1. Comparison of Control Approaches in Genetic Regulatory Networks by Using Stochastic Master Equation Models, Probabilistic Boolean Network Models and Differential Equation Models and Estimated Error Analyzes

    Science.gov (United States)

    Caglar, Mehmet Umut; Pal, Ranadip

    2011-03-01

    Central dogma of molecular biology states that ``information cannot be transferred back from protein to either protein or nucleic acid''. However, this assumption is not exactly correct in most of the cases. There are a lot of feedback loops and interactions between different levels of systems. These types of interactions are hard to analyze due to the lack of cell level data and probabilistic - nonlinear nature of interactions. Several models widely used to analyze and simulate these types of nonlinear interactions. Stochastic Master Equation (SME) models give probabilistic nature of the interactions in a detailed manner, with a high calculation cost. On the other hand Probabilistic Boolean Network (PBN) models give a coarse scale picture of the stochastic processes, with a less calculation cost. Differential Equation (DE) models give the time evolution of mean values of processes in a highly cost effective way. The understanding of the relations between the predictions of these models is important to understand the reliability of the simulations of genetic regulatory networks. In this work the success of the mapping between SME, PBN and DE models is analyzed and the accuracy and affectivity of the control policies generated by using PBN and DE models is compared.

  2. Beyond the Player: A User-Centered Approach to Analyzing Digital Games and Players Using Actor-Network Theory

    Science.gov (United States)

    Hung, Aaron Chia Yuan

    2016-01-01

    The paper uses actor-network theory (ANT) to analyze the sociotechnical networks of three groups of adolescents who played online games in different physical and social contexts. These include: an internet café, which allowed the players to be co-present; a personal laptop, which gave the player more control over how he played; and at home through…

  3. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  4. ATHENA (Advanced Thermal-Hydraulic Energy Network Analyzer) transient analysis of a fusion engineering test reactor

    Energy Technology Data Exchange (ETDEWEB)

    Wareing, T.A.

    1988-02-01

    Two potential undercooling transients are of concern in the design of TIBER-II (Tokamak Ignition/Burn Experimental Reactor), namely loss of coolant and loss of flow accidents. The major area of concern for TIBER-II is the inboard shield, where, due to tungsten material, the decay heat is extremely high. The purpose of this study was to analyze these transients using the thermal-hydraulic code ATHENA (Advanced Thermal-Hydraulic Energy Network Analyzer). The most comprehensive portion of this project involved creating a simple, yet complete, ATHENA model representative of TIBER-II. The completed model represents the case when the plasma is off and contains the inboard shield, the outboard shield, the divertor shields, and the primary loop. The primary loop contains the piping, pump, pressurizer, and heat exchanger. The heat exchanger is at the same elevation as the reactor, the least favorable to establishing natural circulation. The only transient analyzed so far, however, is a loss of flow accident. Results from the loss of flow analysis show that there is sufficient natural circulation in the inboard, outboard, and lower divertor shield to remove the decay heat, assuming that the secondary side flow is at full capacity. Although the upper divertor shield does not have sufficient natural circulation, cooling is provided due to vaporization and re-flood oscillations. However, one must recognize that there may be some local hot sport where the flow geometry inhibits cooling in a LOFA; the ATHENA model would not detect any localized problem. 9 refs., 18 figs., 4 tabs.

  5. Facsimile Network System in RCP

    Science.gov (United States)

    Muramatsu, Kazuya

    Recruit Computer Print Corp. has compiled Weekly Housing Magazine by use of its own CTS (Computerized Type Setting) resulting in the real estate database as byproduct. Based on the database it has made the network linking with sponsors, real estate companies. It has transmitted lists for data cleaning directly from computer enabling to save manpower and reduce time in the compilation process. The author describes the objectives, details, functions and promise of the system.

  6. Network Centrality of Metro Systems

    Science.gov (United States)

    Derrible, Sybil

    2012-01-01

    Whilst being hailed as the remedy to the world’s ills, cities will need to adapt in the 21st century. In particular, the role of public transport is likely to increase significantly, and new methods and technics to better plan transit systems are in dire need. This paper examines one fundamental aspect of transit: network centrality. By applying the notion of betweenness centrality to 28 worldwide metro systems, the main goal of this paper is to study the emergence of global trends in the evolution of centrality with network size and examine several individual systems in more detail. Betweenness was notably found to consistently become more evenly distributed with size (i.e. no “winner takes all”) unlike other complex network properties. Two distinct regimes were also observed that are representative of their structure. Moreover, the share of betweenness was found to decrease in a power law with size (with exponent 1 for the average node), but the share of most central nodes decreases much slower than least central nodes (0.87 vs. 2.48). Finally the betweenness of individual stations in several systems were examined, which can be useful to locate stations where passengers can be redistributed to relieve pressure from overcrowded stations. Overall, this study offers significant insights that can help planners in their task to design the systems of tomorrow, and similar undertakings can easily be imagined to other urban infrastructure systems (e.g., electricity grid, water/wastewater system, etc.) to develop more sustainable cities. PMID:22792373

  7. Available Resources for Reconfigurable Systems in 5G Networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Vegas Olmos, Juan José

    2017-01-01

    In this paper, the concept of a Radio-over-Fiber based Centralized Radio Access Network is explained and analyzed, in order to identify a set of resources within the network that can be used as a base in the design of reconfigurable systems. This analysis is then used to design a different reconf...

  8. Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System

    Directory of Open Access Journals (Sweden)

    A. A. Salama

    2015-03-01

    Full Text Available In this paper, we present a review of different recommender system algorithms that are utilized in social networks based e-Learning systems. Future research will include our proposed our e-Learning system that utilizes Recommender System and Social Network. Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. The fundamental concepts of neutrosophic set, introduced by Smarandache in [21, 22, 23] and Salama et al. in [24-66].The purpose of this paper is to utilize a neutrosophic set to analyze social networks data conducted through learning activities.

  9. Modeling and Analyzing Real-Time Multiprocessor Systems

    NARCIS (Netherlands)

    Wiggers, M.H.; Thiele, Lothar; Lee, Edward A.; Schlieker, Simon; Bekooij, Marco Jan Gerrit

    2010-01-01

    Researchers have proposed approaches to verify that real-time multiprocessor systems meet their timeliness constraints. These approaches make assumptions on the model of computation, the load placed on the multiprocessor system, and the faults that can arise. This heterogeneous set of assumptions

  10. Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sarmad Rashed

    2017-02-01

    Full Text Available Sensor nodes in a Wireless Sensor Network (WSN can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings. In such kinds of networks, datacollectionbecomesoneofthemajorissues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usage—especially Unmanned Aerial Vehicles (UAVs—is the most convenient approach to covering the area and accessing each sensor node in such a large-scale WSN. However, the operation of the UAV depends on some parameters, such as endurance time, altitude, speed, radio type in use, and the path. In this paper, we explore various UAV mobility patterns that follow different paths to sweep the operation area in order to seek the best area coverage with the maximum number of covered nodes in the least amount of time needed by the mobile sink. We also introduce a new metric to formulate the tradeoff between maximizing the covered nodes and minimizing the operation time when choosing the appropriate mobility pattern. A realistic simulation environment is used in order to compare and evaluate the performance of the system. We present the performance results for the explored UAV mobility patterns. The results are very useful to present the tradeoff between maximizing the covered nodes and minimizing the operation time to choose the appropriate mobility pattern.

  11. Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks.

    Science.gov (United States)

    Rashed, Sarmad; Soyturk, Mujdat

    2017-02-20

    Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, datacollectionbecomesoneofthemajorissues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usage-especially Unmanned Aerial Vehicles (UAVs)-is the most convenient approach to covering the area and accessing each sensor node in such a large-scale WSN. However, the operation of the UAV depends on some parameters, such as endurance time, altitude, speed, radio type in use, and the path. In this paper, we explore various UAV mobility patterns that follow different paths to sweep the operation area in order to seek the best area coverage with the maximum number of covered nodes in the least amount of time needed by the mobile sink. We also introduce a new metric to formulate the tradeoff between maximizing the covered nodes and minimizing the operation time when choosing the appropriate mobility pattern. A realistic simulation environment is used in order to compare and evaluate the performance of the system. We present the performance results for the explored UAV mobility patterns. The results are very useful to present the tradeoff between maximizing the covered nodes and minimizing the operation time to choose the appropriate mobility pattern.

  12. Analyzing the Effects of UAV Mobility Patterns on Data Collection in Wireless Sensor Networks

    Science.gov (United States)

    Rashed, Sarmad; Soyturk, Mujdat

    2017-01-01

    Sensor nodes in a Wireless Sensor Network (WSN) can be dispersed over a remote sensing area (e.g., the regions that are hardly accessed by human beings). In such kinds of networks, data collection becomes one of the major issues. Getting connected to each sensor node and retrieving the information in time introduces new challenges. Mobile sink usage—especially Unmanned Aerial Vehicles (UAVs)—is the most convenient approach to covering the area and accessing each sensor node in such a large-scale WSN. However, the operation of the UAV depends on some parameters, such as endurance time, altitude, speed, radio type in use, and the path. In this paper, we explore various UAV mobility patterns that follow different paths to sweep the operation area in order to seek the best area coverage with the maximum number of covered nodes in the least amount of time needed by the mobile sink. We also introduce a new metric to formulate the tradeoff between maximizing the covered nodes and minimizing the operation time when choosing the appropriate mobility pattern. A realistic simulation environment is used in order to compare and evaluate the performance of the system. We present the performance results for the explored UAV mobility patterns. The results are very useful to present the tradeoff between maximizing the covered nodes and minimizing the operation time to choose the appropriate mobility pattern. PMID:28230727

  13. On Analyzing LDPC Codes over Multiantenna MC-CDMA System

    Directory of Open Access Journals (Sweden)

    S. Suresh Kumar

    2014-01-01

    Full Text Available Multiantenna multicarrier code-division multiple access (MC-CDMA technique has been attracting much attention for designing future broadband wireless systems. In addition, low-density parity-check (LDPC code, a promising near-optimal error correction code, is also being widely considered in next generation communication systems. In this paper, we propose a simple method to construct a regular quasicyclic low-density parity-check (QC-LDPC code to improve the transmission performance over the precoded MC-CDMA system with limited feedback. Simulation results show that the coding gain of the proposed QC-LDPC codes is larger than that of the Reed-Solomon codes, and the performance of the multiantenna MC-CDMA system can be greatly improved by these QC-LDPC codes when the data rate is high.

  14. Green buildings in Singapore; Analyzing a frontrunner's sectoral innovation system

    National Research Council Canada - National Science Library

    Siva, Vidushini; Hoppe, T; Jain, Mansi

    2017-01-01

    .... This paper addresses the question: what are the benefits and limitations of Singapore's sectoral innovation system in spurring an energy transition in the building sector, in particular by up-scaling the use of green building technology...

  15. Mathematical techniques for analyzing concurrent and probabilistic systems

    CERN Document Server

    Rutten, J J M M; Panangaden, Prakash; Panangaden, Prakash; Breugel, Franck van

    2004-01-01

    The book consists of two sets of lecture notes devoted to slightly different methods of analysis of concurrent and probabilistic computational systems. The first set of lectures develops a calculus of streams (a generalization of the set of natural numbers) based on the coinduction principle coming from the theory of coalgebras. It is now well understood that the interplay between algebra (for describing structure) and coalgebra (for describing dynamics) is crucial for understanding concurrent systems. There is a striking analogy between streams and formula calculus reminiscent to those appearing in quantum calculus. These lecture notes will appeal to anyone working in concurrency theory but also to algebraists and logicians. The other set of lecture notes focuses on methods for automatically verifying probabilistic systems using techniques of model checking. The unique aspect of these lectures is the coverage of both theory and practice. The authors have been responsible for one of the most successful experi...

  16. Analyzing Real-Time Systems: Theory and Tools

    DEFF Research Database (Denmark)

    Hune, Thomas Seidelin

    actions take place, but also the timing of the actions. The formal reasoning presented here is based on (extensions of) the model of timed automata and tools supporting this model, mainly UPPAAL. Real-time systems are often part of safety critical systems e.g. control systems for planes, trains...... of the automaton. We show that calculating the minimum cost of reaching a location in the automaton, the minimum-cost reachability problem, is decidable for both classes. Since a number of optimization problems, e.g. scheduling problems in a natural way, can be modeled using cost extended timed automata, we can...... now solve these problems using extensions of timed model checkers. The state-space of the simpler class, uniformly priced timed automata (UPTA), which is a subclass of linearly priced timed automata (LPTA), can effectively be represented using a slightly modified version of the well known difference...

  17. Radar cross-section measurements of ice particles using vector network analyzer

    Directory of Open Access Journals (Sweden)

    Jinhu Wang

    2016-09-01

    Full Text Available We carried out radar cross-section (RSC measurements of ice particles in a microwave anechoic chamber at Nanjing University of Information Science and Technology. We used microwave similarity theory to enlarge the size of particle from the micrometer to millimeter scale and to reduce the testing frequency from 94 GHz to 10 GHz. The microwave similarity theory was validated using the method of moments for single metal sphere, single dielectric sphere, and spherical and non-spherical dielectric particle swarms. The differences between the retrieved and theoretical results at 94 GHz were 0.016117%, 0.0023029%, 0.027627%, and 0.0046053%, respectively. We proposed a device that can measure the RCS of ice particles in the chamber based on the S21 parameter obtained from vector network analyzer. On the basis of the measured S21 parameter of the calibration material (metal plates and their corresponding theoretical RCS values, the RCS values of a spherical Teflon particle swarm and cuboid candle particle swarm was retrieved at 10 GHz. In this case, the differences between the retrieved and theoretical results were 12.72% and 24.49% for the Teflon particle swarm and cuboid candle swarm, respectively.

  18. Using Bayesian networks to analyze occupational stress caused by work demands: preventing stress through social support.

    Science.gov (United States)

    García-Herrero, Susana; Mariscal, M A; Gutiérrez, J M; Ritzel, Dale O

    2013-08-01

    Occupational stress is a major health hazard and a serious challenge to the effective operation of any company and represents a major problem for both individuals and organizations. Previous researches have shown that high demands (e.g. workload, emotional) combined with low resources (e.g. support, control, rewards) are associated with adverse health (e.g. psychological, physical) and organizational impacts (e.g. reduced job satisfaction, sickness absence). The objective of the present work is to create a model to analyze how social support reduces the occupational stress caused by work demands. This study used existing Spanish national data on working conditions collected by the Spanish Ministry of Labour and Immigration in 2007, where 11,054 workers were interviewed by questionnaire. A probabilistic model was built using Bayesian networks to explain the relationships between work demands and occupational stress. The model also explains how social support contributes positively to reducing stress levels. The variables studied were intellectually demanding work, overwork, workday, stress, and social support. The results show the importance of social support and of receiving help from supervisors and co-workers in preventing occupational stress. The study provides a new methodology that explains and quantifies the effects of intellectually demanding work, overwork, and workday in occupational stress. Also, the study quantifies the importance of social support to reduce occupational stress. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity

    CERN Document Server

    Liu, Dale

    2009-01-01

    Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current

  20. Systems and methods for analyzing liquids under vacuum

    Science.gov (United States)

    Yu, Xiao-Ying; Yang, Li; Cowin, James P.; Iedema, Martin J.; Zhu, Zihua

    2013-10-15

    Systems and methods for supporting a liquid against a vacuum pressure in a chamber can enable analysis of the liquid surface using vacuum-based chemical analysis instruments. No electrical or fluid connections are required to pass through the chamber walls. The systems can include a reservoir, a pump, and a liquid flow path. The reservoir contains a liquid-phase sample. The pump drives flow of the sample from the reservoir, through the liquid flow path, and back to the reservoir. The flow of the sample is not substantially driven by a differential between pressures inside and outside of the liquid flow path. An aperture in the liquid flow path exposes a stable portion of the liquid-phase sample to the vacuum pressure within the chamber. The radius, or size, of the aperture is less than or equal to a critical value required to support a meniscus of the liquid-phase sample by surface tension.

  1. Agent-based Modeling Methodology for Analyzing Weapons Systems

    Science.gov (United States)

    2015-03-26

    1998) published similarities between ABM and the more traditional equation based methods of simulation and developed criteria for choosing one...analysis method of the effects of a new weapon on tactics and combat decision making by modeling flexible agent behaviors in a mission level combat...adaptive system (Bullock, McIntyre, & Hill, 2000). There are several statistical methods available for conducting analysis of simulation models (Law

  2. Endogenous network of firms and systemic risk

    Science.gov (United States)

    Ma, Qianting; He, Jianmin; Li, Shouwei

    2018-02-01

    We construct an endogenous network characterized by commercial credit relationships connecting the upstream and downstream firms. Simulation results indicate that the endogenous network model displays a scale-free property which exists in real-world firm systems. In terms of the network structure, with the expansion of the scale of network nodes, the systemic risk increases significantly, while the heterogeneities of network nodes have no effect on systemic risk. As for firm micro-behaviors, including the selection range of trading partners, actual output, labor requirement, price of intermediate products and employee salaries, increase of all these parameters will lead to higher systemic risk.

  3. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  4. COLLABORATIVE PROBLEM SOLVING USING PUBLIC SOCIAL NETWORK MEDIA: ANALYZING STUDENT INTERACTION AND ITS IMPACT TO LEARNING PROCESS

    OpenAIRE

    Melvin Ballera; Ismail Ateya Lukandu; Abdalla Radwan

    2013-01-01

    This paper examines the use of social network media at three aspects in African and Libyan perspective. Firstly, to use social network media as an open network learning environment that provide service for interaction necessary for learners to support socialization and collaboration during problem solving. Secondly, to use social media as a tool to support blended learning in e-learning system and encourage non-native English students to express their ideas and fill the gap of communication p...

  5. Hydrogeophysical methods for analyzing aquifer storage and recovery systems.

    Science.gov (United States)

    Minsley, Burke J; Ajo-Franklin, Jonathan; Mukhopadhyay, Amitabha; Morgan, Frank Dale

    2011-01-01

    Hydrogeophysical methods are presented that support the siting and monitoring of aquifer storage and recovery (ASR) systems. These methods are presented as numerical simulations in the context of a proposed ASR experiment in Kuwait, although the techniques are applicable to numerous ASR projects. Bulk geophysical properties are calculated directly from ASR flow and solute transport simulations using standard petrophysical relationships and are used to simulate the dynamic geophysical response to ASR. This strategy provides a quantitative framework for determining site-specific geophysical methods and data acquisition geometries that can provide the most useful information about the ASR implementation. An axisymmetric, coupled fluid flow and solute transport model simulates injection, storage, and withdrawal of fresh water (salinity ∼500 ppm) into the Dammam aquifer, a tertiary carbonate formation with native salinity approximately 6000 ppm. Sensitivity of the flow simulations to the correlation length of aquifer heterogeneity, aquifer dispersivity, and hydraulic permeability of the confining layer are investigated. The geophysical response using electrical resistivity, time-domain electromagnetic (TEM), and seismic methods is computed at regular intervals during the ASR simulation to investigate the sensitivity of these different techniques to changes in subsurface properties. For the electrical and electromagnetic methods, fluid electric conductivity is derived from the modeled salinity and is combined with an assumed porosity model to compute a bulk electrical resistivity structure. The seismic response is computed from the porosity model and changes in effective stress due to fluid pressure variations during injection/recovery, while changes in fluid properties are introduced through Gassmann fluid substitution. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  6. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  7. System and Network Security Acronyms and Abbreviations

    Science.gov (United States)

    2009-09-01

    Systems Agency DLL dynamic link library DMA direct memory access DMZ demilitarized zone DN distinguished name DN domain name DNP Distributed...NetBIOS Network Basic Input/Output System NetBT NetBIOS over TCP/IP NFAT network forensic analysis tool NFC near field communication NFS network file...Software Reference Library NSS Network Security Services NSTB National SCADA Test Bed NSTISSC National Security Telecommunications and Information

  8. Analyzing the relationship between social networking addiction, interaction anxiousness and levels of loneliness of pre-service teachers

    OpenAIRE

    Hasan Özgür

    2013-01-01

    In this research, it was aimed to analyze the social networking addiction of pre-service teachers in terms of various variables and evaluate the relationship between social networking addiction and loneliness and interaction anxiousness. The research was designed according to the relational screening model. The study sample included 349 pre-service teachers studying at Trakya University Faculty of Education in 2012-2013 academic year fall term. The data were obtained using Facebook Addiction ...

  9. Who do you know? Developing and Analyzing Entrepreneur Networks: An Analysis of the Tech Entrepreneurial Environment of Six African Cities

    Science.gov (United States)

    2015-01-01

    administered to almost 300 entrepreneurs in 6 African economic capitals. The survey captured the roles in the local ecosystem that the entrepreneurs ...local entrepreneurs . The methodology described in “‘Who do you know?’ A Methodology to Develop Entrepreneurial Networks: The Tech Ecosystem of Six...Technical Report 15-007 “Who do you know?” Developing and Analyzing Entrepreneur Networks: An Analysis of the Tech Entrepreneurial

  10. [Using the Tabu-search-algorithm-based Bayesian network to analyze the risk factors of coronary heart diseases].

    Science.gov (United States)

    Wei, Z; Zhang, X L; Rao, H X; Wang, H F; Wang, X; Qiu, L X

    2016-06-01

    Under the available data gathered from a coronary study questionnaires with 10 792 cases, this article constructs a Bayesian network model based on the tabu search algorithm and calculates the conditional probability of each node, using the Maximum-likelihood. Pros and cons of the Bayesian network model are evaluated to compare against the logistic regression model in the analysis of coronary factors. Applicability of this network model in clinical study is also investigated. Results show that Bayesian network model can reveal the complex correlations among influencing factors on the coronary and the relationship with coronary heart diseases. Bayesian network model seems promising and more practical than the logistic regression model in analyzing the influencing factors of coronary heart disease.

  11. Social network analysis and network connectedness analysis for industrial symbiotic systems: model development and case study

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Chen, Bin; Yang, Naijin

    2013-06-01

    An important and practical pattern of industrial symbiosis is rapidly developing: eco-industrial parks. In this study, we used social network analysis to study the network connectedness (i.e., the proportion of the theoretical number of connections that had been achieved) and related attributes of these hybrid ecological and industrial symbiotic systems. This approach provided insights into details of the network's interior and analyzed the overall degree of connectedness and the relationships among the nodes within the network. We then characterized the structural attributes of the network and subnetwork nodes at two levels (core and periphery), thereby providing insights into the operational problems within each eco-industrial park. We chose ten typical ecoindustrial parks in China and around the world and compared the degree of network connectedness of these systems that resulted from exchanges of products, byproducts, and wastes. By analyzing the density and nodal degree, we determined the relative power and status of the nodes in these networks, as well as other structural attributes such as the core-periphery structure and the degree of sub-network connectedness. The results reveal the operational problems created by the structure of the industrial networks and provide a basis for improving the degree of completeness, thereby increasing their potential for sustainable development and enriching the methods available for the study of industrial symbiosis.

  12. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  13. A conceptual framework for analyzing sustainability strategies in industrial supply networks from an innovation perspective.

    NARCIS (Netherlands)

    van Bommel, H.W.M.; van Bommel, Harrie W.M.

    2011-01-01

    This article proposes a new conceptual framework concerning the implementation of sustainability in supply networks from an innovation perspective. Based upon a recent qualitative literature review in environmental, social/ethical and logistics/operations management journals, this article summarizes

  14. Weighted Complex Network Analysis of Shanghai Rail Transit System

    Directory of Open Access Journals (Sweden)

    Yingying Xing

    2016-01-01

    Full Text Available With increasing passenger flows and construction scale, Shanghai rail transit system (RTS has entered a new era of networking operation. In addition, the structure and properties of the RTS network have great implications for urban traffic planning, design, and management. Thus, it is necessary to acquire their network properties and impacts. In this paper, the Shanghai RTS, as well as passenger flows, will be investigated by using complex network theory. Both the topological and dynamic properties of the RTS network are analyzed and the largest connected cluster is introduced to assess the reliability and robustness of the RTS network. Simulation results show that the distribution of nodes strength exhibits a power-law behavior and Shanghai RTS network shows a strong weighted rich-club effect. This study also indicates that the intentional attacks are more detrimental to the RTS network than to the random weighted network, but the random attacks can cause slightly more damage to the random weighted network than to the RTS network. Our results provide a richer view of complex weighted networks in real world and possibilities of risk analysis and policy decisions for the RTS operation department.

  15. Simulation Tools and Techniques for Analyzing the Impacts of Photovoltaic System Integration

    Science.gov (United States)

    Hariri, Ali

    approach: this is a theoretical mathematical approach that demonstrated the understanding of the fundamentals of electric power system operation. It provides an easy way to estimate the maximum amount of PV power that can be injected at each node in the network. This approach has been tested and validated. 2. Stochastic simulation software approach: this approach provides a comprehensive simulation software that can be used in order to identify the PV hosting limit. The software performs a large number of stochastic simulation while varying the PV system size and location. The collected data is then analyzed for violations in the voltage levels, voltage fluctuations and reverse power flow. (Abstract shortened by ProQuest.).

  16. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  17. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  18. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  19. Human metabolic network: reconstruction, simulation, and applications in systems biology.

    Science.gov (United States)

    Wu, Ming; Chan, Christina

    2012-03-02

    Metabolism is crucial to cell growth and proliferation. Deficiency or alterations in metabolic functions are known to be involved in many human diseases. Therefore, understanding the human metabolic system is important for the study and treatment of complex diseases. Current reconstructions of the global human metabolic network provide a computational platform to integrate genome-scale information on metabolism. The platform enables a systematic study of the regulation and is applicable to a wide variety of cases, wherein one could rely on in silico perturbations to predict novel targets, interpret systemic effects, and identify alterations in the metabolic states to better understand the genotype-phenotype relationships. In this review, we describe the reconstruction of the human metabolic network, introduce the constraint based modeling approach to analyze metabolic networks, and discuss systems biology applications to study human physiology and pathology. We highlight the challenges and opportunities in network reconstruction and systems modeling of the human metabolic system.

  20. Model-based control of networked systems

    CERN Document Server

    Garcia, Eloy; Montestruque, Luis A

    2014-01-01

    This monograph introduces a class of networked control systems (NCS) called model-based networked control systems (MB-NCS) and presents various architectures and control strategies designed to improve the performance of NCS. The overall performance of NCS considers the appropriate use of network resources, particularly network bandwidth, in conjunction with the desired response of the system being controlled.   The book begins with a detailed description of the basic MB-NCS architecture that provides stability conditions in terms of state feedback updates . It also covers typical problems in NCS such as network delays, network scheduling, and data quantization, as well as more general control problems such as output feedback control, nonlinear systems stabilization, and tracking control.   Key features and topics include: Time-triggered and event-triggered feedback updates Stabilization of uncertain systems subject to time delays, quantization, and extended absence of feedback Optimal control analysis and ...

  1. Analyzing SystemC Designs: SystemC Analysis Approaches for Varying Applications

    Directory of Open Access Journals (Sweden)

    Jannis Stoppe

    2015-05-01

    Full Text Available The complexity of hardware designs is still increasing according to Moore’s law. With embedded systems being more and more intertwined and working together not only with each other, but also with their environments as cyber physical systems (CPSs, more streamlined development workflows are employed to handle the increasing complexity during a system’s design phase. SystemC is a C++ library for the design of hardware/software systems, enabling the designer to quickly prototype, e.g., a distributed CPS without having to decide about particular implementation details (such as whether to implement a feature in hardware or in software early in the design process. Thereby, this approach reduces the initial implementation’s complexity by offering an abstract layer with which to build a working prototype. However, as SystemC is based on C++, analyzing designs becomes a difficult task due to the complex language features that are available to the designer. Several fundamentally different approaches for analyzing SystemC designs have been suggested. This work illustrates several different SystemC analysis approaches, including their specific advantages and shortcomings, allowing designers to pick the right tools to assist them with a specific problem during the design of a system using SystemC.

  2. Theoretical Neuroanatomy:Analyzing the Structure, Dynamics,and Function of Neuronal Networks

    Science.gov (United States)

    Seth, Anil K.; Edelman, Gerald M.

    The mammalian brain is an extraordinary object: its networks give rise to our conscious experiences as well as to the generation of adaptive behavior for the organism within its environment. Progress in understanding the structure, dynamics and function of the brain faces many challenges. Biological neural networks change over time, their detailed structure is difficult to elucidate, and they are highly heterogeneous both in their neuronal units and synaptic connections. In facing these challenges, graph-theoretic and information-theoretic approaches have yielded a number of useful insights and promise many more.

  3. Logistic growth for the Nuzi cuneiform tablets: Analyzing family networks in ancient Mesopotamia

    Science.gov (United States)

    Ueda, Sumie; Makino, Kumi; Itoh, Yoshiaki; Tsuchiya, Takashi

    2015-03-01

    We reconstruct the published year of each cuneiform tablet of the Nuzi society in ancient Mesopotamia. The tablets are on land transaction, marriage, loan, slavery contracts, etc. The number of tablets seems to increase by logistic growth. It may show the dynamics of concentration of lands or other properties into few powerful families in a period of about sixty years and most of them are in about thirty years. We reconstruct family trees and social networks of Nuzi and estimate the published years of cuneiform tablets consistently with the trees and networks, formulating least squares problems with linear inequality constraints.

  4. Analyzing Social Media Networks with NodeXL Insights from a Connected World

    CERN Document Server

    Hansen, Derek; Smith, Marc A

    2010-01-01

    Businesses, entrepreneurs, individuals, and government agencies alike are looking to social network analysis (SNA) tools for insight into trends, connections, and fluctuations in social media. Microsoft's NodeXL is a free, open-source SNA plug-in for use with Excel. It provides instant graphical representation of relationships of complex networked data. But it goes further than other SNA tools -- NodeXL was developed by a multidisciplinary team of experts that bring together information studies, computer science, sociology, human-computer interaction, and over 20 years of visual analytic theor

  5. Decision support systems and methods for complex networks

    Science.gov (United States)

    Huang, Zhenyu [Richland, WA; Wong, Pak Chung [Richland, WA; Ma, Jian [Richland, WA; Mackey, Patrick S [Richland, WA; Chen, Yousu [Richland, WA; Schneider, Kevin P [Seattle, WA

    2012-02-28

    Methods and systems for automated decision support in analyzing operation data from a complex network. Embodiments of the present invention utilize these algorithms and techniques not only to characterize the past and present condition of a complex network, but also to predict future conditions to help operators anticipate deteriorating and/or problem situations. In particular, embodiments of the present invention characterize network conditions from operation data using a state estimator. Contingency scenarios can then be generated based on those network conditions. For at least a portion of all of the contingency scenarios, risk indices are determined that describe the potential impact of each of those scenarios. Contingency scenarios with risk indices are presented visually as graphical representations in the context of a visual representation of the complex network. Analysis of the historical risk indices based on the graphical representations can then provide trends that allow for prediction of future network conditions.

  6. Network theory and its applications in economic systems

    Science.gov (United States)

    Huang, Xuqing

    This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the

  7. Beyond the Myth of Nationality: Analyzing Networks within the European Commission

    NARCIS (Netherlands)

    S. Suvarierol (Semin)

    2009-01-01

    textabstractThe current literature on the European Commission refers to the influence of nationality in the functioning of the Commission and in particular to the reliance on networks based on nationality, failing to give much evidence apart from anecdotes. This empirical study takes a systematic

  8. Analyzing the impact of relay station characteristics on uplink performance in cellular network

    NARCIS (Netherlands)

    Dimitrova, D.C.; van den Berg, Hans Leo; Heijenk, Geert

    2009-01-01

    Uplink users in cellular networks, such as UMTS/ HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as a promising approach towards extending cell coverage. This paper focuses on the role of packet scheduling in cellular

  9. Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks

    Science.gov (United States)

    2006-12-01

    Community Structure in Very Large Networks, Physical Review E70, 066111 (2004) [25] M. Newman. A Measure of Betweenness Centrality based on Random...Fayz Ahmed, M. Alshehi, Hamza alghamdi and Ahmed alghamdi UA Flight 93: Zaid Jarrah, Ahmed alhaznawi, Saeed Alghmdi and Ahmed alnami Structural

  10. Analyzing Networked Learning Practices in HigherEducation and Continuing Professional Development

    DEFF Research Database (Denmark)

    Dirckinck-Holmfeld, Lone

    Deliverable 28.5.4 reports on the preparation of the book "Analysing Networked Learning Practices in Higher Education and Continuing Professional Development", which consists of an Introduction, case studies and a concluding section, which presents the theoretical work and empirical work conducted...

  11. Social network analysis as a method for analyzing interaction in collaborative online learning environments

    Directory of Open Access Journals (Sweden)

    Patricia Rice Doran

    2011-12-01

    Full Text Available Social network analysis software such as NodeXL has been used to describe participation and interaction in numerous social networks, but it has not yet been widely used to examine dynamics in online classes, where participation is frequently required rather than optional and participation patterns may be impacted by the requirements of the class, the instructor’s activities, or participants’ intrinsic engagement with the subject matter. Such social network analysis, which examines the dynamics and interactions among groups of participants in a social network or learning group, can be valuable in programs focused on teaching collaborative and communicative skills, including teacher preparation programs. Applied to these programs, social network analysis can provide information about instructional practices likely to facilitate student interaction and collaboration across diverse student populations. This exploratory study used NodeXL to visualize students’ participation in an online course, with the goal of identifying (1 ways in which NodeXL could be used to describe patterns in participant interaction within an instructional setting and (2 identifying specific patterns in participant interaction among students in this particular course. In this sample, general education teachers demonstrated higher measures of connection and interaction with other participants than did those from specialist (ESOL or special education backgrounds, and tended to interact more frequently with all participants than the majority of participants from specialist backgrounds. We recommend further research to delineate specific applications of NodeXL within an instructional context, particularly to identify potential patterns in student participation based on variables such as gender, background, cultural and linguistic heritage, prior training and education, and prior experience so that instructors can ensure their practice helps to facilitate student interaction

  12. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  13. Robust receding horizon control for networked and distributed nonlinear systems

    CERN Document Server

    Li, Huiping

    2017-01-01

    This book offers a comprehensive, easy-to-understand overview of receding-horizon control for nonlinear networks. It presents novel general strategies that can simultaneously handle general nonlinear dynamics, system constraints, and disturbances arising in networked and large-scale systems and which can be widely applied. These receding-horizon-control-based strategies can achieve sub-optimal control performance while ensuring closed-loop stability: a feature attractive to engineers. The authors address the problems of networked and distributed control step-by-step, gradually increasing the level of challenge presented. The book first introduces the state-feedback control problems of nonlinear networked systems and then studies output feedback control problems. For large-scale nonlinear systems, disturbance is considered first, then communication delay separately, and lastly the simultaneous combination of delays and disturbances. Each chapter of this easy-to-follow book not only proposes and analyzes novel ...

  14. Network management systems for active distribution networks. A feasibility study

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, D.A.

    2004-07-01

    A technical feasibility study on network management systems for active distribution networks is reported. The study investigated the potential for modifying a Distribution Network Operator (DNO) Supervisory Control and Data Acquisition System (SCADA) to give some degree of active management. Government incentives have encouraged more and more embedded generation being connected to the UK distribution networks and further acceleration of the process should support the 2010 target for a reduction in emissions of carbon dioxide. The report lists the objectives of the study and summarises what has been achieved; it also discusses limitations, reliability and resilience of existing SCADA. Safety and operational communications are discussed under staff safety and operational safety. Recommendations that could facilitate active management through SCADA are listed, together with suggestions for further study. The work was carried out as part of the DTI New and Renewable Energy Programme managed by Future Energy Solutions.

  15. Network systems and groupware for public facilities; Network system to groupware

    Energy Technology Data Exchange (ETDEWEB)

    Torimaru, K.; Kubo, S. [Fuji Electric Co. Ltd., Tokyo (Japan); Takeda, K. [Osaki Computer Engineering Co. Ltd., Tokyo (Japan)

    1999-12-10

    This paper outlines solutions for network systems and groupware for the infrastructure of information systems in public facilities. With regard to network systems, Fuji Electric's network solutions including requirements of public facilities and application examples are described. With regard to groupware, the status of groupware used for raising efficiency in public facilities and groupware packages marketed by Fuji Electric. (author)

  16. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS Contact the UAB-SCIMS UAB Spinal Cord Injury Model System Newly Injured Health Daily Living Consumer ... Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network ...

  17. Computer networks ISE a systems approach

    CERN Document Server

    Peterson, Larry L

    2007-01-01

    Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p

  18. TROVE: A User-friendly Tool for Visualizing and Analyzing Cancer Hallmarks in Signaling Networks.

    Science.gov (United States)

    Chua, Huey Eng; Bhowmick, Sourav S; Zheng, Jie

    2017-09-22

    Cancer hallmarks, a concept that seeks to explain the complexity of cancer initiation and development, provide a new perspective of studying cancer signaling which could lead to a greater understanding of this complex disease. However, to the best of our knowledge, there is currently a lack of tools that support such hallmark-based study of the cancer signaling network, thereby impeding the gain of knowledge in this area. We present TROVE, a user-friendly software that facilitates hallmark annotation, visualization and analysis in cancer signaling networks. In particular, TROVE facilitates hallmark analysis specific to particular cancer types. Available under the Eclipse Public License from: https://sites.google.com/site/cosbyntu/softwares/trove and https://github.com/trove2017/Trove. hechua@ntu.edu.sg or assourav@ntu.edu.sg.

  19. Development of a Spatial Decision Support System for Analyzing Changes in Hydro-meteorological Risk

    Science.gov (United States)

    van Westen, Cees

    2013-04-01

    In the framework of the EU FP7 Marie Curie ITN Network "CHANGES: Changing Hydro-meteorological Risks, as Analyzed by a New Generation of European Scientists (http://www.changes-itn.eu)", a spatial decision support system is under development with the aim to analyze the effect of risk reduction planning alternatives on reducing the risk now and in the future, and support decision makers in selecting the best alternatives. The SDSS is one of the main outputs of the CHANGES network, which will develop an advanced understanding of how global changes, related to environmental and climate change as well as socio-economical change, may affect the temporal and spatial patterns of hydro-meteorological hazards and associated risks in Europe; how these changes can be assessed, modeled, and incorporated in sustainable risk management strategies, focusing on spatial planning, emergency preparedness and risk communication. The CHANGES network consists of 11 full partners and 6 associate partners of which 5 private companies, representing 10 European countries. The CHANGES network has hired 12 Early Stage Researchers (ESRs) and is currently hiring 3-6 researchers more for the implementation of the SDSS. The Spatial Decision Support System will be composed of a number of integrated components. The Risk Assessment component allows to carry out spatial risk analysis, with different degrees of complexity, ranging from simple exposure (overlay of hazard and assets maps) to quantitative analysis (using different hazard types, temporal scenarios and vulnerability curves) resulting into risk curves. The platform does not include a component to calculate hazard maps, and existing hazard maps are used as input data for the risk component. The second component of the SDSS is a risk reduction planning component, which forms the core of the platform. This component includes the definition of risk reduction alternatives (related to disaster response planning, risk reduction measures and

  20. Logistic Growth for the Nuzi Cuneiform Tablets: Analyzing Family Networks in Ancient Mesopotamia

    OpenAIRE

    Ueda, Sumie; Makino, Kumi; Itoh, Yoshiaki; Tsuchiya, Takashi

    2013-01-01

    We reconstruct the year of publication of each cuneiform tablet of the Nuzi society in ancient Mesopotamia. The tablets, are on land transaction, marriage, loan, slavery contracts etc. The number of tablets seem to increase by logistic growth until saturation. It may show the dynamics of concentration of lands or other properties into few powerful families in a period of about twenty years. We reconstruct family trees and social networks of Nuzi and estimate the publication years of cuneiform...

  1. Analyzing collaboration networks and developmental patterns of nano-enabled drug delivery (NEDD for brain cancer

    Directory of Open Access Journals (Sweden)

    Ying Huang

    2015-07-01

    Full Text Available The rapid development of new and emerging science & technologies (NESTs brings unprecedented challenges, but also opportunities. In this paper, we use bibliometric and social network analyses, at country, institution, and individual levels, to explore the patterns of scientific networking for a key nano area – nano-enabled drug delivery (NEDD. NEDD has successfully been used clinically to modulate drug release and to target particular diseased tissues. The data for this research come from a global compilation of research publication information on NEDD directed at brain cancer. We derive a family of indicators that address multiple facets of research collaboration and knowledge transfer patterns. Results show that: (1 international cooperation is increasing, but networking characteristics change over time; (2 highly productive institutions also lead in influence, as measured by citation to their work, with American institutes leading; (3 research collaboration is dominated by local relationships, with interesting information available from authorship patterns that go well beyond journal impact factors. Results offer useful technical intelligence to help researchers identify potential collaborators and to help inform R&D management and science & innovation policy for such nanotechnologies.

  2. A neural network based model to analyze rice parboiling process with small dataset.

    Science.gov (United States)

    Behroozi-Khazaei, Nasser; Nasirahmadi, Abozar

    2017-07-01

    In this study, milling recovery, head rice yield, degree of milling and whiteness were utilized to characterize the milling quality of Tarom parboiled rice variety. The parboiled rice was prepared with three soaking temperatures and steaming times. Then the samples were dried to three levels of final moisture contents [8, 10 and 12% (w.b)]. Modeling of process and validating of the results with small dataset are always challenging. So, the aim of this study was to develop models based on the milling quality data in parboiling process by means of multivariate regression and artificial neural network. In order to validate the neural network model with a little dataset, K-fold cross validation method was applied. The ANN structure with one hidden layer and Tansig transfer function by 18 neurons in the hidden layer was selected as the best model in this study. The results indicated that the neural network could model the parboiling process with higher degree of accuracy. This method was a promising procedure to create accuracy and can be used as a reliable model to select the best parameters for the parboiling process with little experiment dataset.

  3. ARTIFICIAL NEURAL-NETWORK PREDICTIONS OF URINARY CALCULUS COMPOSITIONS ANALYZED WITH INFRARED-SPECTROSCOPY

    NARCIS (Netherlands)

    VOLMER, M; WOLTHERS, BG; METTING, HJ; DEHAAN, THY; COENEGRACHT, PMJ; VANDERSLIK, W

    Infrared (IR) spectroscopy is used to analyze urinary calculus (renal stone) constituents. However, interpretation of IR spectra for quantifying urinary calculus constituents in mixtures is difficult, requiring expert knowledge by trained technicians. In our laboratory IR spectra of unknown calculi

  4. Systemic risk on different interbank network topologies

    Science.gov (United States)

    Lenzu, Simone; Tedeschi, Gabriele

    2012-09-01

    In this paper we develop an interbank market with heterogeneous financial institutions that enter into lending agreements on different network structures. Credit relationships (links) evolve endogenously via a fitness mechanism based on agents' performance. By changing the agent's trust on its neighbor's performance, interbank linkages self-organize themselves into very different network architectures, ranging from random to scale-free topologies. We study which network architecture can make the financial system more resilient to random attacks and how systemic risk spreads over the network. To perturb the system, we generate a random attack via a liquidity shock. The hit bank is not automatically eliminated, but its failure is endogenously driven by its incapacity to raise liquidity in the interbank network. Our analysis shows that a random financial network can be more resilient than a scale free one in case of agents' heterogeneity.

  5. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    -based IS. There are several reasons for this: (a) Networked IS are large and complex systems; (b) in most cases, one has to deal with a number of existing - probably heterogenous - technical hardware and software platforms and link them together in a network; (c) differences in organizational culture, work......In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... communication between geographically dispersed organizational units. Examples include logistics systems, airline booking systems, and CSCW systems. We assume that the design and implementation of networked IS is significantly more difficult and risky than the development of traditional "stand-alone" computer...

  6. ATTENTIONAL NETWORKS AND SELECTIVE VISUAL SYSTEM

    National Research Council Canada - National Science Library

    ALEJANDRO CASTILLO MORENO; ANGÉLICA PATERNINA MARÍN

    2006-01-01

    ... system.From this last point of view, we will emphasize on the attentional networks theory of Posner, thatproposes different systems to explain diverse aspects of attention, but they are related to each...

  7. Neural network based system for equipment surveillance

    Science.gov (United States)

    Vilim, R.B.; Gross, K.C.; Wegerich, S.W.

    1998-04-28

    A method and system are disclosed for performing surveillance of transient signals of an industrial device to ascertain the operating state. The method and system involves the steps of reading into a memory training data, determining neural network weighting values until achieving target outputs close to the neural network output. If the target outputs are inadequate, wavelet parameters are determined to yield neural network outputs close to the desired set of target outputs and then providing signals characteristic of an industrial process and comparing the neural network output to the industrial process signals to evaluate the operating state of the industrial process. 33 figs.

  8. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2006-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  9. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2002-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  10. The mathematics of networks of linear systems

    CERN Document Server

    Fuhrmann, Paul A

    2015-01-01

    This book provides the mathematical foundations of networks of linear control systems, developed from an algebraic systems theory perspective. This includes a thorough treatment of questions of controllability, observability, realization theory, as well as feedback control and observer theory. The potential of networks for linear systems in controlling large-scale networks of interconnected dynamical systems could provide insight into a diversity of scientific and technological disciplines. The scope of the book is quite extensive, ranging from introductory material to advanced topics of current research, making it a suitable reference for graduate students and researchers in the field of networks of linear systems. Part I can be used as the basis for a first course in algebraic system theory, while Part II serves for a second, advanced, course on linear systems. Finally, Part III, which is largely independent of the previous parts, is ideally suited for advanced research seminars aimed at preparing graduate ...

  11. A Hybrid DGTD-MNA Scheme for Analyzing Complex Electromagnetic Systems

    KAUST Repository

    Li, Peng

    2015-01-07

    A hybrid electromagnetics (EM)-circuit simulator for analyzing complex systems consisting of EM devices loaded with nonlinear multi-port lumped circuits is described. The proposed scheme splits the computational domain into two subsystems: EM and circuit subsystems, where field interactions are modeled using Maxwell and Kirchhoff equations, respectively. Maxwell equations are discretized using a discontinuous Galerkin time domain (DGTD) scheme while Kirchhoff equations are discretized using a modified nodal analysis (MNA)-based scheme. The coupling between the EM and circuit subsystems is realized at the lumped ports, where related EM fields and circuit voltages and currents are allowed to “interact’’ via numerical flux. To account for nonlinear lumped circuit elements, the standard Newton-Raphson method is applied at every time step. Additionally, a local time-stepping scheme is developed to improve the efficiency of the hybrid solver. Numerical examples consisting of EM systems loaded with single and multiport linear/nonlinear circuit networks are presented to demonstrate the accuracy, efficiency, and applicability of the proposed solver.

  12. Double-hop networks using VSATs for the Intelsat system

    Science.gov (United States)

    Mizuno, Toshio; Nohara, Mitsuo; Watanabe, Fumio; Takeuchi, Yoshio; Honda, Teruhiko

    The double-hop VSAT (very small aperture terminal) network was studied with emphasis on its feasibility and networking in the Intelsat system. The results of channel-capacity estimation indicate that reasonable channel capacity and availability objectives equal to those for Super IBS (Intelsat business services) are attainable through the use of the uplink and downlink power control incorporated in the outbound link with BPSK/SCPC (binary-phase shift keying/single channel per carrier) transmission. Possible network architectures for various beam configurations were devised, and the accessibility of individual network architectures was analyzed in terms of blocking probability and call setup time. Based on the results of architecture study, an example implementation of VSAT system is shown. Furthermore, experimental results on the developed VSAT system are discussed. The experiment showed that the transmit power control for the outbound SCPC carrier is conducive to meeting stringent performance objectives stipulated for international digital transmissions.

  13. Network Physiology: How Organ Systems Dynamically Interact.

    Directory of Open Access Journals (Sweden)

    Ronny P Bartsch

    Full Text Available We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS, we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  14. Network Physiology: How Organ Systems Dynamically Interact.

    Science.gov (United States)

    Bartsch, Ronny P; Liu, Kang K L; Bashan, Amir; Ivanov, Plamen Ch

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  15. Advances in Automation and Throughput of the Mars Organic Analyzer Microchip Capillary Electrophoresis System

    Science.gov (United States)

    Haldeman, B. J.; Skelley, A. M.; Scherer, J. R.; Jayarajah, C.; Mathies, R. A.

    2005-12-01

    samples, we estimate that one microchip would be able to analyze hundreds of samples during a rover mission. The radial scanning optical system uses a stepper motor to servo the 400 nm diode laser excited confocal optical system to the desired electrophoresis channel and to collect and detect the fluorescence signal. Latching solenoids actuate a network of 32 microfabricated PDMS valves and pumps that control the microfluidic operations. A liquid cooling system maintains the entire chip at ~10 °C for optimal chiral separations. Electronic elements of the instrument are addressed by an integrated digital multiplexing chip so that the operation of the optical system, detection system, and electrophoretic voltages are controlled by a single data acquisition card. The limit of detection (LOD) of the McMOA instrument was found to be within 2x of the single channel instrument (LOD = 0.1 nM of T659, a fluorescent dye with similar fluorescent properties to fluorescamine). The sensitivity and performance of each channel was characterized by separating an amino acid standard; the peak heights and resolutions in the individual channels varied by less than 15%. Separations of biogenic amines in complex samples such as wine, sublimed bacteria, and a Miller-Urey experiment will be presented. Fluidic designs to enable the autonomous operation of the McMOA instrument and redundant microfluidic addressing of the various channels with bus structures are under development. 1. Skelley, A. M. et al. (2005) Proc. Natl. Acad. Sci. U.S.A. 102, 1041-1046. 2. Skelley, A. M. et al. (2005), AGU abstract submitted.

  16. Modeling and Analyzing the Interaction between Network Rumors and Authoritative Information

    Directory of Open Access Journals (Sweden)

    Lingling Xia

    2015-01-01

    Full Text Available In this paper, we propose a novel two-stage rumor spreading Susceptible-Infected-Authoritative-Removed (SIAR model for complex homogeneous and heterogeneous networks. The interaction Markov chains (IMC mean-field equations based on the SIAR model are derived to describe the dynamic interaction between the rumors and authoritative information. We use a Monte Carlo simulation method to characterize the dynamics of the Susceptible-Infected-Removed (SIR and SIAR models, showing that the SIAR model with consideration of authoritative information gives a more realistic description of propagation features of rumors than the SIR model. The simulation results demonstrate that the critical threshold λc of the SIAR model has the tiniest increase than the threshold of SIR model. The sooner the authoritative information is introduced, the less negative impact the rumors will bring. We also get the result that heterogeneous networks are more prone to the spreading of rumors. Additionally, the inhibition of rumor spreading, as one of the characteristics of the new SIAR model itself, is instructive for later studies on the rumor spreading models and the controlling strategies.

  17. Analyzing the Impact of Storage Shortage on Data Availability in Decentralized Online Social Networks

    Directory of Open Access Journals (Sweden)

    Songling Fu

    2014-01-01

    Full Text Available Maintaining data availability is one of the biggest challenges in decentralized online social networks (DOSNs. The existing work often assumes that the friends of a user can always contribute to the sufficient storage capacity to store all data. However, this assumption is not always true in today’s online social networks (OSNs due to the fact that nowadays the users often use the smart mobile devices to access the OSNs. The limitation of the storage capacity in mobile devices may jeopardize the data availability. Therefore, it is desired to know the relation between the storage capacity contributed by the OSN users and the level of data availability that the OSNs can achieve. This paper addresses this issue. In this paper, the data availability model over storage capacity is established. Further, a novel method is proposed to predict the data availability on the fly. Extensive simulation experiments have been conducted to evaluate the effectiveness of the data availability model and the on-the-fly prediction.

  18. Analyzing the impact of storage shortage on data availability in decentralized online social networks.

    Science.gov (United States)

    Fu, Songling; He, Ligang; Liao, Xiangke; Li, Kenli; Huang, Chenlin

    2014-01-01

    Maintaining data availability is one of the biggest challenges in decentralized online social networks (DOSNs). The existing work often assumes that the friends of a user can always contribute to the sufficient storage capacity to store all data. However, this assumption is not always true in today's online social networks (OSNs) due to the fact that nowadays the users often use the smart mobile devices to access the OSNs. The limitation of the storage capacity in mobile devices may jeopardize the data availability. Therefore, it is desired to know the relation between the storage capacity contributed by the OSN users and the level of data availability that the OSNs can achieve. This paper addresses this issue. In this paper, the data availability model over storage capacity is established. Further, a novel method is proposed to predict the data availability on the fly. Extensive simulation experiments have been conducted to evaluate the effectiveness of the data availability model and the on-the-fly prediction.

  19. Differential network entropy reveals cancer system hallmarks

    Science.gov (United States)

    West, James; Bianconi, Ginestra; Severini, Simone; Teschendorff, Andrew E.

    2012-01-01

    The cellular phenotype is described by a complex network of molecular interactions. Elucidating network properties that distinguish disease from the healthy cellular state is therefore of critical importance for gaining systems-level insights into disease mechanisms and ultimately for developing improved therapies. By integrating gene expression data with a protein interaction network we here demonstrate that cancer cells are characterised by an increase in network entropy. In addition, we formally demonstrate that gene expression differences between normal and cancer tissue are anticorrelated with local network entropy changes, thus providing a systemic link between gene expression changes at the nodes and their local correlation patterns. In particular, we find that genes which drive cell-proliferation in cancer cells and which often encode oncogenes are associated with reductions in network entropy. These findings may have potential implications for identifying novel drug targets. PMID:23150773

  20. Analyzing the network readiness of countries of the world from 2009 ...

    African Journals Online (AJOL)

    Information Technology (IT) is now globally recognized as a very strong tool for economic development and is being used by many countries to spur economic growth and to create jobs. In an attempt to objectively measure the progress of Africa in IT development over the last decade, this paper critically analyzes the Global ...

  1. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  2. BiNoM 2.0, a Cytoscape plugin for accessing and analyzing pathways using standard systems biology formats.

    Science.gov (United States)

    Bonnet, Eric; Calzone, Laurence; Rovera, Daniel; Stoll, Gautier; Barillot, Emmanuel; Zinovyev, Andrei

    2013-03-01

    Public repositories of biological pathways and networks have greatly expanded in recent years. Such databases contain many pathways that facilitate the analysis of high-throughput experimental work and the formulation of new biological hypotheses to be tested, a fundamental principle of the systems biology approach. However, large-scale molecular maps are not always easy to mine and interpret. We have developed BiNoM (Biological Network Manager), a Cytoscape plugin, which provides functions for the import-export of some standard systems biology file formats (import from CellDesigner, BioPAX Level 3 and CSML; export to SBML, CellDesigner and BioPAX Level 3), and a set of algorithms to analyze and reduce the complexity of biological networks. BiNoM can be used to import and analyze files created with the CellDesigner software. BiNoM provides a set of functions allowing to import BioPAX files, but also to search and edit their content. As such, BiNoM is able to efficiently manage large BioPAX files such as whole pathway databases (e.g. Reactome). BiNoM also implements a collection of powerful graph-based functions and algorithms such as path analysis, decomposition by involvement of an entity or cyclic decomposition, subnetworks clustering and decomposition of a large network in modules. Here, we provide an in-depth overview of the BiNoM functions, and we also detail novel aspects such as the support of the BioPAX Level 3 format and the implementation of a new algorithm for the quantification of pathways for influence networks. At last, we illustrate some of the BiNoM functions on a detailed biological case study of a network representing the G1/S transition of the cell cycle, a crucial cellular process disturbed in most human tumors.

  3. Green Buildings in Singapore; Analyzing a Frontrunner’s Sectoral Innovation System

    Directory of Open Access Journals (Sweden)

    Vidushini Siva

    2017-05-01

    Full Text Available The building sector in Singapore consumes up to half of the nation’s total energy. The government has therefore been urging the transformation of the industry by targeting 80% of all buildings to be green-certified by 2030. Thus far, Singapore has done relatively well, and is widely viewed as frontrunner in this respect. This paper addresses the question: what are the benefits and limitations of Singapore’s sectoral innovation system in spurring an energy transition in the building sector, in particular by up-scaling the use of green building technology? The Sectoral Innovation Systems (SIS theoretical framework was used to analyze the Singapore case. Four SIS components were assessed: technological regime, market demand, actor interactions and networks, and institutional framework. The benefits of Singapore’s sectoral innovation system identified in the analysis basically concern aspects of all of the four elements of SIS. Particular success factors concerned the launching of an integrated strategy to support green building innovations (i.e., the Green Mark policy scheme, implementing support policies, and setting up test beds. Furthermore, a masterplan to engage and educate end-users was implemented, knowledge exchange platforms were set up, regulations on the use of efficient equipment in buildings were issued, and standards and a certification system were adopted. The results also shed light on key barriers, namely, the reluctance of building users to change their habits, ineffective stakeholder collaboration, and green buildings innovation support coming from the government only. Measures in place have been moderately effective.

  4. Process query systems for network security monitoring

    Science.gov (United States)

    Berk, Vincent; Fox, Naomi

    2005-05-01

    In this paper we present the architecture of our network security monitoring infrastructure based on a Process Query System (PQS). PQS offers a new and powerful way of efficiently processing data streams, based on process descriptions that are submitted as queries. In this case the data streams are familiar network sensors, such as Snort, Netfilter, and Tripwire. The process queries describe the dynamics of network attacks and failures, such as worms, multistage attacks, and router failures. Using PQS the task of monitoring enterprise class networks is simplified, offering a priority-based GUI to the security administrator that clearly outlines events that require immediate attention. The PQS-Net system is deployed on an unsecured production network; the system has successfully detected many diverse attacks and failures.

  5. High-speed, intra-system networks

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, Heather M [Los Alamos National Laboratory; Graham, Paul S [Los Alamos National Laboratory; Manuzzato, Andrea [Los Alamos National Laboratory; Fairbanks, Tom [Los Alamos National Laboratory; Dallmann, Nicholas [Los Alamos National Laboratory; Desgeorges, Rose [Los Alamos National Laboratory

    2010-06-28

    Recently, engineers have been studying on-payload networks for fast communication paths. Using intra-system networks as a means to connect devices together allows for a flexible payload design that does not rely on dedicated communication paths between devices. In this manner, the data flow architecture of the system can be dynamically reconfigured to allow data routes to be optimized for the application or configured to route around devices that are temporarily or permanently unavailable. To use intra-system networks, devices will need network controllers and switches. These devices are likely to be affected by single-event effects, which could affect data communication. In this paper we will present radiation data and performance analysis for using a Broadcom network controller in a neutron environment.

  6. Developing aircraft photonic networks for airplane systems

    DEFF Research Database (Denmark)

    White, Henry J.; Brownjohn, Nick; Baptista, João

    2013-01-01

    Achieving affordable high speed fiber optic communication networks for airplane systems has proved to be challenging. In this paper we describe a summary of the EU Framework 7 project DAPHNE (Developing Aircraft Photonic Networks). DAPHNE aimed to exploit photonic technology from terrestrial comm...

  7. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  8. The Networking of Interactive Bibliographic Retrieval Systems.

    Science.gov (United States)

    Marcus, Richard S.; Reintjes, J. Francis

    Research in networking of heterogeneous interactive bibliographic retrieval systems is being conducted which centers on the concept of a virtual retrieval system. Such a virtual system would be created through a translating computer interface that would provide access to the different retrieval systems and data bases in a uniform and convenient…

  9. Software ecosystems analyzing and managing business networks in the software industry

    CERN Document Server

    Jansen, S; Cusumano, MA

    2013-01-01

    This book describes the state-of-the-art of software ecosystems. It constitutes a fundamental step towards an empirically based, nuanced understanding of the implications for management, governance, and control of software ecosystems. This is the first book of its kind dedicated to this emerging field and offers guidelines on how to analyze software ecosystems; methods for managing and growing; methods on transitioning from a closed software organization to an open one; and instruments for dealing with open source, licensing issues, product management and app stores. It is unique in bringing t

  10. An Experiment to Analyze Performance of Virtual Private Network Approach to Information Exchange between Health Facilities

    Directory of Open Access Journals (Sweden)

    Siphael BETUEL

    2017-06-01

    Full Text Available In developing countries, Tanzania in particular, studies and reports have depicted that there is a strong desire and need for seamless information exchange across health care providing facilities. A limited study conducted in few public and private hospitals has also revealed the same. On the other hand, the eHealth community has failed to effectively take advantage of the advances in technologies to make that desire come true. One potential technology is Virtual Private Network (VPN for which it has been noticed that there is a misconception and lack of innovative initiatives that slow down its uptake in eHealth. This article presents a technical assessment of the VPN technology in Tanzanian context. Primarily, the assessment focused on practicability of the best VPN practices and the perceived user experience performance when VPN is in use. It was observed that the response time dropped significantly as expected. The increase in response time and computer memory utilization is due to security mechanisms that are involved in VPN, the stronger security is used the more performance decreases. However, the increase in response time and computer memory utilization is very small in such a way that users will not be able to notice.

  11. Optimal Sensor Networks Scheduling in Identification of Distributed Parameter Systems

    CERN Document Server

    Patan, Maciej

    2012-01-01

    Sensor networks have recently come into prominence because they hold the potential to revolutionize a wide spectrum of both civilian and military applications. An ingenious characteristic of sensor networks is the distributed nature of data acquisition. Therefore they seem to be ideally prepared for the task of monitoring processes with spatio-temporal dynamics which constitute one of most general and important classes of systems in modelling of the real-world phenomena. It is clear that careful deployment and activation of sensor nodes are critical for collecting the most valuable information from the observed environment. Optimal Sensor Network Scheduling in Identification of Distributed Parameter Systems discusses the characteristic features of the sensor scheduling problem, analyzes classical and recent approaches, and proposes a wide range of original solutions, especially dedicated for networks with mobile and scanning nodes. Both researchers and practitioners will find the case studies, the proposed al...

  12. Socio-Entropy System Approach for Analyzing of Social Forestry Management in Indonesia

    Directory of Open Access Journals (Sweden)

    Ismalia Afriani Hasbullah

    2016-08-01

    Full Text Available Socio-entropy system approach (SESA as used as a comprehensive tool to identify any kind of social shortcoming that might have constrained achievement of government policy on social-forestry. The study objectives were to observe all critical factors on the program implementation of social forestry and to analyze any intervening variables relevant to socio-psychological, socio-ecological, socio-economic, and socio-cultural shortcomings (being called here as socio-entropies that would have been most crucial to the required policy modification. Samples were taken by purposive sampling and intensively interviewed using questionnaire. Data was analysed using structural equation modeling. The study found out that the socio-psychological entropy which apparently needs to comprehend basically relates to 3-intervening variables of self-esteem, individual compassion, and non-formal education. Likewise from the socio-ecological stand point, what need to be controled better were the spirit of owning more land plots, and the geo-morphological position of owned land plots. Meanwhile socio-economic entropy seemed to appear as consequences of people efforts in gaining more income due to hedonistic temptation and lack of knowledge about the type of environmentally sound livelihoods. Finally, the crucial factors of socio-cultural entropy were the faded away adat-law, weakening social norms, and absence of inter-ethnic but more closed, and traditional networking.

  13. Network Basic Language Translation System: Security Infrastructure

    National Research Council Canada - National Science Library

    Mittrick, Mark R

    2007-01-01

    .... The Network Basic Language Translation System (NetBLTS) was proposed and accepted as part of the U.S. Army Research Laboratory's offering of initiatives within the Horizontal Fusion portfolio in 2003...

  14. On Study of Construction of New Generation Intelligent Communication Network for Distribution System

    Science.gov (United States)

    Wu, Dan; Zhang, Xueyan

    2017-09-01

    many new technological means are integrated in the new network of smart electricity distribution including electric power technology, control technology and information technology, and in this area, people carry out profound research to the construction of communication network and power distribution network. This paper analyzes specific structures of the communication network for distribution system, discusses the development trend of it, explores its technical system in depth, and finally proposes some concrete constructive strategies, hoping to be a valuable reference for related research persons.

  15. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  16. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  17. Network science, nonlinear science and infrastructure systems

    CERN Document Server

    2007-01-01

    Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. .

  18. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  19. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  20. WIRELESS SENSOR NETWORK BASED CONVEYOR SURVEILLANCE SYSTEM

    OpenAIRE

    Attila Trohák; Máté Kolozsi-Tóth; Péter Rádi

    2011-01-01

    In the paper we will introduce an intelligent conveyor surveillance system. We started a research project to design and develop a conveyor surveillance system based on wireless sensor network and GPRS communication. Our system is able to measure temperature on fixed and moving, rotating surfaces and able to detect smoke. We would like to introduce the developed devices and give an application example.

  1. E-commerce System Security Assessment based on Bayesian Network Algorithm Research

    OpenAIRE

    Ting Li; Xin Li

    2013-01-01

    Evaluation of e-commerce network security is based on assessment method Bayesian networks, and it first defines the vulnerability status of e-commerce system evaluation index and the vulnerability of the state model of e-commerce systems, and after the principle of the Bayesian network reliability of e-commerce system and the criticality of the vulnerabilities were analyzed, experiments show that the change method is a good evaluation of the security of e-commerce systems.

  2. On synthesis and optimization of steam system networks. 1. Sustained boiler efficiency

    CSIR Research Space (South Africa)

    Majozi, T

    2010-08-01

    Full Text Available The traditional steam system comprises a steam boiler and the associated heat exchanger network (HEN). Most research published in literature tends to address both the elements of the steam system as separate entities instead of analyzing...

  3. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    It has for a long time been a challenge to built secure networking systems. One way to counter this problem is to provide developers of software applications for networking systems with easy-to-use tools that can check security properties before the applications ever reach the marked. These tools...... will both help raise the general level of awareness of the problems and prevent the most basic flaws from occurring. This thesis contributes to the development of such tools. Networking systems typically try to attain secure communication by applying standard cryptographic techniques. In this thesis...... attacks, and attacks launched by insiders. Finally, the perspectives for the application of the analysis techniques are discussed, thereby, coming a small step closer to providing developers with easy- to-use tools for validating the security of networking applications....

  4. [Renewal of NIHS computer network system].

    Science.gov (United States)

    Segawa, Katsunori; Nakano, Tatsuya; Saito, Yoshiro

    2012-01-01

    Updated version of National Institute of Health Sciences Computer Network System (NIHS-NET) is described. In order to reduce its electric power consumption, the main server system was newly built using the virtual machine technology. The service that each machine provided in the previous network system should be maintained as much as possible. Thus, the individual server was constructed for each service, because a virtual server often show decrement in its performance as compared with a physical server. As a result, though the number of virtual servers was increased and the network communication became complicated among the servers, the conventional service was able to be maintained, and security level was able to be rather improved, along with saving electrical powers. The updated NIHS-NET bears multiple security countermeasures. To maximal use of these measures, awareness for the network security by all users is expected.

  5. Design and Realization of Network Teaching System

    Directory of Open Access Journals (Sweden)

    Ji Shan Shan

    2016-01-01

    Full Text Available Since 21 century, with the wide spread in family and public, network has been applied in many new fields, and the application in classes is of no exception. In traditional education, teachers give lessons to students face to face. Hence, the teaching quality depends largely on the quality and initiative of the individual teacher. However, the serious disadvantages of this mode are that teachers completely dominate the classroom and may ignore the subjective cognition role of the students, which may be bad for the growth of creativity and the innovative thinking ability. Obviously, traditional education mode cannot meet the requirements of the this new era which leads to the booming developing tendency of the network. As a new teaching measure, scientifically combining modern information technology and teaching practice, network teaching not only changes the traditional education by the means and form, but even also gives new meanings to teaching concept, process, method as well as teacher-student role and other deep levels. With the help of network teaching system, on-line classroom learning, relevant information systematization, standardization and automation, this system provides students with an efficient online learning method with high quality. This also helps to solve the disadvantages of the traditional teaching mode and promote the teaching methods to a new stage. It improves the network teaching platform, enriches the network teaching resources, and establishes a network teaching system, so as to improve information quality of teachers and students and assist in improving teaching quality of schools.

  6. Multi-platform laser communication networking optical antenna system design

    Science.gov (United States)

    Zhang, Tao

    2016-10-01

    In this paper, a new conclusion based on rotating parabolic model and a different scheme of laser communication networking antenna system has been put forward in the paper. Based on rotating parabolic antenna, a new theory of the optical properties have been deduced, which can realize larger dynamic, duplex, networking communications among multiple platforms in 360° azimuth and pitch range. Meanwhile, depending on the operation mode of the system, multiple mathematical optimization models have been established. Tracking communication range, emission energy efficiency and receiving energy efficiency have been analyzed and optimized. Relationship among opening up and low apertures, the lens unit aperture, focal length of lens unit as well as rotating parabolic focal length have been analyzed. Tracking pitching range and emission energy utilization has carried on the theoretical derivation and optimization and networking platform link between energy receiver and transmitter has been analyzed. Taking some parameters of this new system into calculation, optimized results can be utilized with MATLAB software for its application and system of communication engineering. The rotating parabolic internal can form a hollow structure, which is utilized for miniaturization, light-weighted design and realize duplex communication in a wide range and distance. Circular orbit guidance is the modern way used in dynamic tracking system. The new theory and optical antenna system has widespread applications value as well.

  7. Spatial Models and Networks of Living Systems

    DEFF Research Database (Denmark)

    Juul, Jeppe Søgaard

    When studying the dynamics of living systems, insight can often be gained by developing a mathematical model that can predict future behaviour of the system or help classify system characteristics. However, in living cells, organisms, and especially groups of interacting individuals, a large number....... Such systems are known to be stabilized by spatial structure. Finally, I analyse data from a large mobile phone network and show that people who are topologically close in the network have similar communication patterns. This main part of the thesis is based on six different articles, which I have co...

  8. Reconfigurable radio systems network architectures and standards

    CERN Document Server

    Iacobucci, Maria Stella

    2013-01-01

    This timely book provides a standards-based view of the development, evolution, techniques and potential future scenarios for the deployment of reconfigurable radio systems.  After an introduction to radiomobile and radio systems deployed in the access network, the book describes cognitive radio concepts and capabilities, which are the basis for reconfigurable radio systems.  The self-organizing network features introduced in 3GPP standards are discussed and IEEE 802.22, the first standard based on cognitive radio, is described. Then the ETSI reconfigurable radio systems functional ar

  9. Measurement of Dielectric Properties at 75 - 325 GHz using a Vector Network Analyzer and Full Wave Simulator

    Directory of Open Access Journals (Sweden)

    S.Khanal

    2012-06-01

    Full Text Available This paper presents a fast and easy to use method to determine permittivity and loss tangent in the frequency range of 75 to 325 GHz. To obtain the permittivity and the loss tangent of the test material, the reflection and transmission S-parameters of a waveguide section filled with the test material are measured using a vector network analyzer and then compared with the simulated plots from a full wave simulator (HFSS, or alternatively the measurement results are used in mathematical formulas. The results are coherent over multiple waveguide bands.

  10. A network-based dynamical ranking system

    CERN Document Server

    Motegi, Shun

    2012-01-01

    Ranking players or teams in sports is of practical interests. From the viewpoint of networks, a ranking system is equivalent a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score (i.e., strength) of a player, for example, depends on time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. Our ranking system, also interpreted as a centrality measure for directed temporal networks, has two parameters. One parameter represents the exponential decay rate of the past score, and the other parameter controls the effect of indirect wins on the score. We derive a set of linear online update equ...

  11. Systemic risk and heterogeneous leverage in banking networks

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Saltoğlu, Burak; Sever, Can

    2016-11-01

    This study probes systemic risk implications of leverage heterogeneity in banking networks. We show that the presence of heterogeneous leverages drastically changes the systemic effects of defaults and the nature of the contagion in interbank markets. Using financial leverage data from the US banking system, through simulations, we analyze the systemic significance of different types of borrowers, the evolution of the network, the consequences of interbank market size and the impact of market segmentation. Our study is related to the recent Basel III regulations on systemic risk and the treatment of the Global Systemically Important Banks (GSIBs). We also assess the extent to which the recent capital surcharges on GSIBs may curb financial fragility. We show the effectiveness of surcharge policy for the most-levered banks vis-a-vis uniform capital injection.

  12. IndElec: A Software for Analyzing Party Systems and Electoral Systems

    Directory of Open Access Journals (Sweden)

    Francisco Ocaña

    2011-08-01

    Full Text Available IndElec is a software addressed to compute a wide range of indices from electoral data, which are intended to analyze both party systems and electoral systems in political studies. Further, IndElec can calculate such indices from electoral data at several levels of aggregation, even when the acronyms of some political parties change across districts. As the amount of information provided by IndElec may be considerable, this software also aids the user in the analysis of electoral data through three capabilities. First, IndElec automatically elaborates preliminary descriptive statistical reports of computed indices. Second, IndElec saves the computed information into text files in data matrix format, which can be directly loaded by any statistical software to facilitate more sophisticated statistical studies. Third, IndElec provides results in several file formats (text, CSV, HTML, R to facilitate their visualization and management by using a wide range of application softwares (word processors, spreadsheets, web browsers, etc.. Finally, a graphical user interface is provided for IndElec to manage calculation processes, but no visualization facility is available in this environment. In fact, both the inputs and outputs for IndElec are arranged in files with the aforementioned formats.

  13. Study on the complex network characteristics of urban road system based on GIS

    Science.gov (United States)

    Gao, Zhonghua; Chen, Zhenjie; Liu, Yongxue; Huang, Kang

    2007-06-01

    Urban road system is the basic bone of urban transportation and one of the most important factors that influent and controls the urban configuration. In this paper, an approach of modeling, analyzing and optimizing urban road system is described based on complex network theory and GIS technology. The urban road system is studied on three focuses: building the urban road network, modeling the computational procedures based on urban road networks and analyzing the urban road system of Changzhou City as the study case. The conclusion is that the urban road network is a scale-free network with small-world characteristic, and there is still space for development of the whole network as a small-world network, also the key road crosses should be kept expedite.

  14. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  15. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  16. Analyzing hidden populations online: topic, emotion, and social network of HIV-related users in the largest Chinese online community.

    Science.gov (United States)

    Liu, Chuchu; Lu, Xin

    2018-01-05

    Traditional survey methods are limited in the study of hidden populations due to the hard to access properties, including lack of a sampling frame, sensitivity issue, reporting error, small sample size, etc. The rapid increase of online communities, of which members interact with others via the Internet, have generated large amounts of data, offering new opportunities for understanding hidden populations with unprecedented sample sizes and richness of information. In this study, we try to understand the multidimensional characteristics of a hidden population by analyzing the massive data generated in the online community. By elaborately designing crawlers, we retrieved a complete dataset from the "HIV bar," the largest bar related to HIV on the Baidu Tieba platform, for all records from January 2005 to August 2016. Through natural language processing and social network analysis, we explored the psychology, behavior and demand of online HIV population and examined the network community structure. In HIV communities, the average topic similarity among members is positively correlated to network efficiency (r = 0.70, p online services for HIV/AIDS consultation and diagnosis be improved to avoid privacy concerns and social discrimination in China.

  17. Livelihood Diversification in Tropical Coastal Communities: A Network-Based Approach to Analyzing ‘Livelihood Landscapes’

    Science.gov (United States)

    Cinner, Joshua E.; Bodin, Örjan

    2010-01-01

    Background Diverse livelihood portfolios are frequently viewed as a critical component of household economies in developing countries. Within the context of natural resources governance in particular, the capacity of individual households to engage in multiple occupations has been shown to influence important issues such as whether fishers would exit a declining fishery, how people react to policy, the types of resource management systems that may be applicable, and other decisions about natural resource use. Methodology/Principal Findings This paper uses network analysis to provide a novel methodological framework for detailed systemic analysis of household livelihood portfolios. Paying particular attention to the role of natural resource-based occupations such as fisheries, we use network analyses to map occupations and their interrelationships- what we refer to as ‘livelihood landscapes’. This network approach allows for the visualization of complex information about dependence on natural resources that can be aggregated at different scales. We then examine how the role of natural resource-based occupations changes along spectra of socioeconomic development and population density in 27 communities in 5 western Indian Ocean countries. Network statistics, including in- and out-degree centrality, the density of the network, and the level of network centralization are compared along a multivariate index of community-level socioeconomic development and a gradient of human population density. The combination of network analyses suggests an increase in household-level specialization with development for most occupational sectors, including fishing and farming, but that at the community-level, economies remained diversified. Conclusions/Significance The novel modeling approach introduced here provides for various types of livelihood portfolio analyses at different scales of social aggregation. Our livelihood landscapes approach provides insights into communities

  18. Understanding Supply Networks from Complex Adaptive Systems

    Directory of Open Access Journals (Sweden)

    Jamur Johnas Marchi

    2014-10-01

    Full Text Available This theoretical paper is based on complex adaptive systems (CAS that integrate dynamic and holistic elements, aiming to discuss supply networks as complex systems and their dynamic and co-evolutionary processes. The CAS approach can give clues to understand the dynamic nature and co-evolution of supply networks because it consists of an approach that incorporates systems and complexity. This paper’s overall contribution is to reinforce the theoretical discussion of studies that have addressed supply chain issues, such as CAS.

  19. Methodological levels of abductive logic and its application in analyzing knowledge classification systems

    Directory of Open Access Journals (Sweden)

    Mohammad Khandan

    2015-05-01

    Originality/Value: Introduces methodological levels of abductive logic and provides LIS professionals with a new and alternative way for analyzing knowledge classification systems as interpretative and semantic social constructions.

  20. Rational positive systems for reaction networks

    NARCIS (Netherlands)

    J.H. van Schuppen (Jan)

    2003-01-01

    textabstractThe purpose of the lecture associated with this paper is to present problems, concepts, and theorems of control and system theory for a subclass of the rational positive systems of which examples have been published as models of biochemical cell reaction networks. The recent advances in

  1. Designing Networked Adaptive Interactive Hybrid Systems

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. In these systems humans and intelligent machines will, in close interaction, be able to reach their goals under

  2. Evaluating neural networks and artificial intelligence systems

    Science.gov (United States)

    Alberts, David S.

    1994-02-01

    Systems have no intrinsic value in and of themselves, but rather derive value from the contributions they make to the missions, decisions, and tasks they are intended to support. The estimation of the cost-effectiveness of systems is a prerequisite for rational planning, budgeting, and investment documents. Neural network and expert system applications, although similar in their incorporation of a significant amount of decision-making capability, differ from each other in ways that affect the manner in which they can be evaluated. Both these types of systems are, by definition, evolutionary systems, which also impacts their evaluation. This paper discusses key aspects of neural network and expert system applications and their impact on the evaluation process. A practical approach or methodology for evaluating a certain class of expert systems that are particularly difficult to measure using traditional evaluation approaches is presented.

  3. Pinning control of complex networked systems synchronization, consensus and flocking of networked systems via pinning

    CERN Document Server

    Su, Housheng

    2013-01-01

    Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering.   Housheng Su is an Associate Professor at the Department of Contro...

  4. EPMOSt: An Energy-Efficient Passive Monitoring System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Fernando P. Garcia

    2014-06-01

    Full Text Available Monitoring systems are important for debugging and analyzing Wireless Sensor Networks (WSN. In passive monitoring, a monitoring network needs to be deployed in addition to the network to be monitored, named the target network. The monitoring network captures and analyzes packets transmitted by the target network. An energy-efficient passive monitoring system is necessary when we need to monitor a WSN in a real scenario because the lifetime of the monitoring network is extended and, consequently, the target network benefits from the monitoring for a longer time. In this work, we have identified, analyzed and compared the main passive monitoring systems proposed for WSN. During our research, we did not identify any passive monitoring system for WSN that aims to reduce the energy consumption of the monitoring network. Therefore, we propose an Energy-efficient Passive MOnitoring SysTem for WSN named EPMOSt that provides monitoring information using a Simple Network Management Protocol (SNMP agent. Thus, any management tool that supports the SNMP protocol can be integrated with this monitoring system. Experiments with real sensors were performed in several scenarios. The results obtained show the energy efficiency of the proposed monitoring system and the viability of using it to monitor WSN in real scenarios.

  5. EPMOSt: an energy-efficient passive monitoring system for wireless sensor networks.

    Science.gov (United States)

    Garcia, Fernando P; Andrade, Rossana M C; Oliveira, Carina T; de Souza, José Neuman

    2014-06-19

    Monitoring systems are important for debugging and analyzing Wireless Sensor Networks (WSN). In passive monitoring, a monitoring network needs to be deployed in addition to the network to be monitored, named the target network. The monitoring network captures and analyzes packets transmitted by the target network. An energy-efficient passive monitoring system is necessary when we need to monitor a WSN in a real scenario because the lifetime of the monitoring network is extended and, consequently, the target network benefits from the monitoring for a longer time. In this work, we have identified, analyzed and compared the main passive monitoring systems proposed for WSN. During our research, we did not identify any passive monitoring system for WSN that aims to reduce the energy consumption of the monitoring network. Therefore, we propose an Energy-efficient Passive MOnitoring SysTem for WSN named EPMOSt that provides monitoring information using a Simple Network Management Protocol (SNMP) agent. Thus, any management tool that supports the SNMP protocol can be integrated with this monitoring system. Experiments with real sensors were performed in several scenarios. The results obtained show the energy efficiency of the proposed monitoring system and the viability of using it to monitor WSN in real scenarios.

  6. Dynamical systems on networks a tutorial

    CERN Document Server

    Porter, Mason A

    2016-01-01

    This volume is a tutorial for the study of dynamical systems on networks. It discusses both methodology and models, including spreading models for social and biological contagions. The authors focus especially on “simple” situations that are analytically tractable, because they are insightful and provide useful springboards for the study of more complicated scenarios. This tutorial, which also includes key pointers to the literature, should be helpful for junior and senior undergraduate students, graduate students, and researchers from mathematics, physics, and engineering who seek to study dynamical systems on networks but who may not have prior experience with graph theory or networks. Mason A. Porter is Professor of Nonlinear and Complex Systems at the Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, UK. He is also a member of the CABDyN Complexity Centre and a Tutorial Fellow of Somerville College. James P. Gleeson is Professor of Industrial and Appli...

  7. A parallelism viewpoint to analyze performance bottlenecks of parallelism-intensive software systems

    OpenAIRE

    Muhammad, Naeem; Boucké, Nelis; Berbers, Yolande

    2010-01-01

    The use of parallelism enhances the performance of a software system. However, its excessive use can degrade the system performance. In this paper we propose a parallelism viewpoint to optimize the use of parallelism by eliminating unnecessarily used parallelism in legacy systems. The parallelism viewpoint describes parallelism of the system in order to analyze multiple overheads associated with its threads. We use the proposed viewpoint to find parallelism specific performance overheads of a...

  8. Operation of International Monitoring System Network

    Science.gov (United States)

    Nikolova, Svetlana; Araujo, Fernando; Aktas, Kadircan; Malakhova, Marina; Otsuka, Riyo; Han, Dongmei; Assef, Thierry; Nava, Elisabetta; Mickevicius, Sigitas; Agrebi, Abdelouaheb

    2015-04-01

    The IMS is a globally distributed network of monitoring facilities using sensors from four technologies: seismic, hydroacoustic, infrasound and radionuclide. It is designed to detect the seismic and acoustic waves produced by nuclear test explosions and the subsequently released radioactive isotopes. Monitoring stations transmit their data to the IDC in Vienna, Austria, over a global private network known as the GCI. Since 2013, the data availability (DA) requirements for IMS stations account for quality of the data, meaning that in calculation of data availability data should be exclude if: - there is no input from sensor (SHI technology); - the signal consists of constant values (SHI technology); Even more strict are requirements for the DA of the radionuclide (particulate and noble gas) stations - received data have to be analyzed, reviewed and categorized by IDC analysts. In order to satisfy the strict data and network availability requirements of the IMS Network, the operation of the facilities and the GCI are managed by IDC Operations. Operations has following main functions: - to ensure proper operation and functioning of the stations; - to ensure proper operation and functioning of the GCI; - to ensure efficient management of the stations in IDC; - to provide network oversight and incident management. At the core of the IMS Network operations are a series of tools for: monitoring the stations' state of health and data quality, troubleshooting incidents, communicating with internal and external stakeholders, and reporting. The new requirements for data availability increased the importance of the raw data quality monitoring. This task is addressed by development of additional tools for easy and fast identifying problems in data acquisition, regular activities to check compliance of the station parameters with acquired data by scheduled calibration of the seismic network, review of the samples by certified radionuclide laboratories. The DA for the networks of

  9. Strategic Investment in Protection in Networked Systems

    CERN Document Server

    Leduc, Matt V

    2015-01-01

    We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent's failure probability and derive conditions under which equilibrium strategies are monotone in degree (i.e. in how connected an agent is on the network). We show that different kinds of applications (e.g. vaccination, airport security) lead to very different equilibrium patterns of investments in protection, with important welfare and risk implications. Our equilibrium concept is flexible enough to allow for comparative statics in terms of network properties and we show that it is also robust to the introduction of global externalities (e.g. price feedback, congestion).

  10. VSAT networks in the INTELSAT system

    Science.gov (United States)

    Albuquerque, Jose P. A.; Buchsbaum, Luiz M.; Meulman, Christopher B.; Rieger, Frederic; Zhu, Xiaobo

    1993-08-01

    This paper describes how VSAT networks currently operate in the INTELSAT system. Four classes of VSAT networks (data transaction; circuit-switched; data distribution; microterminals) are identified, and it is verified that all of them can operate with INTELSAT satellites. Most VSAT networks in operation on INTELSAT today operate in fractional transponder leases. Fractional transponder capacity estimates are presented for a wide range of scenarios and different INTELSAT satellite series. These estimates clearly show increasing bandwidth utilization efficiencies for newer generations of INTELSAT satellites. Provided that VSAT and hub sizes are appropriately selected, efficiencies are already significant with existing satellites. Two possible ways of increasing the utilization of satellite resources are examined in the paper: demand assignment multiple access (DAMA) and multiple channel-per-carrier (MCPC) techniques. The impact of using DAMA in circuit-switched VSAT networks is quantified.

  11. Social Network Supported Process Recommender System

    Science.gov (United States)

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced. PMID:24672309

  12. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  13. 40 CFR 1065.308 - Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not...

    Science.gov (United States)

    2010-07-01

    ... may use a gas blending or mixing device to blend span gases. A gas blending or mixing device is... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Continuous gas analyzer system-response and updating-recording verification-for gas analyzers not continuously compensated for other gas...

  14. Preliminary AFBITS Network Control System

    Science.gov (United States)

    1975-06-01

    divided into time slots. This provides essentially simultaneous digital data service to a large number of individual subscribers. In a normal...model telephone switch, modern exchanges such as those developed by the Bell System or the independent Telco suppliers give a good indication of

  15. Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies

    NARCIS (Netherlands)

    Callo Arias, Trosky B.; Avgeriou, Paris; America, Pierre; Hassan, AE; Zaidman, A; DiPenta, M

    2008-01-01

    In this paper, we present a dynamic analysis approach to increase the understandability of a large software-intensive system, more particularly to enable the identification of dependencies between its execution entities. This approach analyzes the execution of a software system in a top-down fashion

  16. A System Evaluation Theory Analyzing Value and Results Chain for Institutional Accreditation in Oman

    Science.gov (United States)

    Paquibut, Rene Ymbong

    2017-01-01

    Purpose: This paper aims to apply the system evaluation theory (SET) to analyze the institutional quality standards of Oman Academic Accreditation Authority using the results chain and value chain tools. Design/methodology/approach: In systems thinking, the institutional standards are connected as input, process, output and feedback and leads to…

  17. Evolution of Linux operating system network

    Science.gov (United States)

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  18. Wind Energy System Time-domain (WEST) analyzers using hybrid simulation techniques

    Science.gov (United States)

    Hoffman, J. A.

    1979-01-01

    Two stand-alone analyzers constructed for real time simulation of the complex dynamic characteristics of horizontal-axis wind energy systems are described. Mathematical models for an aeroelastic rotor, including nonlinear aerodynamic and elastic loads, are implemented with high speed digital and analog circuitry. Models for elastic supports, a power train, a control system, and a rotor gimbal system are also included. Limited correlation efforts show good comparisons between results produced by the analyzers and results produced by a large digital simulation. The digital simulation results correlate well with test data.

  19. Observing Arctic Ecology using Networked Infomechanical Systems

    Science.gov (United States)

    Healey, N. C.; Oberbauer, S. F.; Hollister, R. D.; Tweedie, C. E.; Welker, J. M.; Gould, W. A.

    2012-12-01

    Understanding ecological dynamics is important for investigation into the potential impacts of climate change in the Arctic. Established in the early 1990's, the International Tundra Experiment (ITEX) began observational inquiry of plant phenology, plant growth, community composition, and ecosystem properties as part of a greater effort to study changes across the Arctic. Unfortunately, these observations are labor intensive and time consuming, greatly limiting their frequency and spatial coverage. We have expanded the capability of ITEX to analyze ecological phenomenon with improved spatial and temporal resolution through the use of Networked Infomechanical Systems (NIMS) as part of the Arctic Observing Network (AON) program. The systems exhibit customizable infrastructure that supports a high level of versatility in sensor arrays in combination with information technology that allows for adaptable configurations to numerous environmental observation applications. We observe stereo and static time-lapse photography, air and surface temperature, incoming and outgoing long and short wave radiation, net radiation, and hyperspectral reflectance that provides critical information to understanding how vegetation in the Arctic is responding to ambient climate conditions. These measurements are conducted concurrent with ongoing manual measurements using ITEX protocols. Our NIMS travels at a rate of three centimeters per second while suspended on steel cables that are ~1 m from the surface spanning transects ~50 m in length. The transects are located to span soil moisture gradients across a variety of land cover types including dry heath, moist acidic tussock tundra, shrub tundra, wet meadows, dry meadows, and water tracks. We have deployed NIMS at four locations on the North Slope of Alaska, USA associated with 1 km2 ARCSS vegetation study grids including Barrow, Atqasuk, Toolik Lake, and Imnavait Creek. A fifth system has been deployed in Thule, Greenland beginning in

  20. On the Use of an Algebraic Signature Analyzer for Mixed-Signal Systems Testing

    Directory of Open Access Journals (Sweden)

    Vadim Geurkov

    2014-01-01

    Full Text Available We propose an approach to design of an algebraic signature analyzer that can be used for mixed-signal systems testing. The analyzer does not contain carry propagating circuitry, which improves its performance as well as fault tolerance. The common design technique of a signature analyzer for mixed-signal systems is based on the rules of an arithmetic finite field. The application of this technique to the systems with an arbitrary radix is a challenging task and the devices designed possess high hardware complexity. The proposed technique is simple and applicable to systems of any size and radix. The hardware complexity is low. The technique can also be used in arithmetic/algebraic coding and cryptography.

  1. Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks

    Directory of Open Access Journals (Sweden)

    Chi Zhang

    2017-03-01

    Full Text Available Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by pipe blockage. Different pipe blockage scenarios, in which one of the pipes in an urban drainage network is assumed to be blocked individually, are constructed and their impacts on the network are simulated under different storm events. Furthermore, a vulnerability index is defined to measure the vulnerability of the drainage systems before and after the implementation of adaptation measures. The results obtained indicate that the tree systems have a relatively larger proportion of critical hydraulic pipes than the loop systems, thus the vulnerability of tree systems is substantially greater than that of the loop systems. Furthermore, the vulnerability index of tree systems is reduced after they are converted into a loop system with the implementation of adaptation measures. This paper provides an insight into the differences in the vulnerability of tree and loop systems, and provides more evidence for development of adaptation measures (e.g., tanks to reduce urban flooding.

  2. Neural-network-based fuzzy logic decision systems

    Science.gov (United States)

    Kulkarni, Arun D.; Giridhar, G. B.; Coca, Praveen

    1994-10-01

    During the last few years there has been a large and energetic upswing in research efforts aimed at synthesizing fuzzy logic with neural networks. This combination of neural networks and fuzzy logic seems natural because the two approaches generally attack the design of `intelligent' system from quite different angles. Neural networks provide algorithms for learning, classification, and optimization whereas fuzzy logic often deals with issues such as reasoning in a high (semantic or linguistic) level. Consequently the two technologies complement each other. In this paper, we combine neural networks with fuzzy logic techniques. We propose an artificial neural network (ANN) model for a fuzzy logic decision system. The model consists of six layers. The first three layers map the input variables to fuzzy set membership functions. The last three layers implement the decision rules. The model learns the decision rules using a supervised gradient descent procedure. As an illustration we considered two examples. The first example deals with pixel classification in multispectral satellite images. In our second example we used the fuzzy decision system to analyze data from magnetic resonance imaging (MRI) scans for tissue classification.

  3. A graph-based system for network-vulnerability analysis

    Energy Technology Data Exchange (ETDEWEB)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  4. Social networks as embedded complex adaptive systems.

    Science.gov (United States)

    Benham-Hutchins, Marge; Clancy, Thomas R

    2010-09-01

    As systems evolve over time, their natural tendency is to become increasingly more complex. Studies in the field of complex systems have generated new perspectives on management in social organizations such as hospitals. Much of this research appears as a natural extension of the cross-disciplinary field of systems theory. This is the 15th in a series of articles applying complex systems science to the traditional management concepts of planning, organizing, directing, coordinating, and controlling. In this article, the authors discuss healthcare social networks as a hierarchy of embedded complex adaptive systems. The authors further examine the use of social network analysis tools as a means to understand complex communication patterns and reduce medical errors.

  5. Analyzing Risks and Vulnerabilities of Various Computer Systems and Undergoing Exploitation using Embedded Devices

    Science.gov (United States)

    Branch, Drew Alexander

    2014-01-01

    Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated, patched and secured state in a launch control system environment. Attacks on critical systems are becoming more and more relevant and frequent. Nation states are hacking into critical networks that might control electrical power grids or water dams as well as carrying out advanced persistent threat (APTs) attacks on government entities. NASA, as an organization, must protect its self from attacks from all different types of attackers with different motives. Although the International Space Station was created, there is still competition between the different space programs. With that in mind, NASA might get attacked and breached for various reasons such as espionage or sabotage. My project will provide a way for NASA to complete an in house penetration test which includes: asset discovery, vulnerability scans, exploit vulnerabilities and also provide forensic information to harden systems. Completing penetration testing is a part of the compliance requirements of the Federal Information Security Act (FISMA) and NASA NPR 2810.1 and related NASA Handbooks. This project is to demonstrate how in house penetration testing can be conducted that will satisfy all of the compliance requirements of the National Institute of Standards and Technology (NIST), as outlined in FISMA. By the end of this project, I hope to have carried out the tasks stated

  6. The Deep Space Network Advanced Systems Program

    Science.gov (United States)

    Davarian, Faramaz

    2010-01-01

    The deep space network (DSN)--with its three complexes in Goldstone, California, Madrid, Spain, and Canberra, Australia--provides the resources to track and communicate with planetary and deep space missions. Each complex consists of an array of capabilities for tracking probes almost anywhere in the solar system. A number of innovative hardware, software and procedural tools are used for day-to-day operations at DSN complexes as well as at the network control at the Jet Propulsion Laboratory (JPL). Systems and technologies employed by the network include large-aperture antennas (34-m and 70-m), cryogenically cooled receivers, high-power transmitters, stable frequency and timing distribution assemblies, modulation and coding schemes, spacecraft transponders, radiometric tracking techniques, etc. The DSN operates at multiple frequencies, including the 2-GHz band, the 7/8-GHz band, and the 32/34-GHz band.

  7. End loss analyzer system for measurements of plasma flux at the C-2U divertor electrode

    Energy Technology Data Exchange (ETDEWEB)

    Griswold, M. E., E-mail: mgriswold@trialphaenergy.com; Korepanov, S.; Thompson, M. C. [Tri Alpha Energy, P.O. Box 7010, Rancho Santa Margarita, California 92688 (United States)

    2016-11-15

    An end loss analyzer system consisting of electrostatic, gridded retarding-potential analyzers and pyroelectric crystal bolometers was developed to characterize the plasma loss along open field lines to the divertors of C-2U. The system measures the current and energy distribution of escaping ions as well as the total power flux to enable calculation of the energy lost per escaping electron/ion pair. Special care was taken in the construction of the analyzer elements so that they can be directly mounted to the divertor electrode. An attenuation plate at the entrance to the gridded retarding-potential analyzer reduces plasma density by a factor of 60 to prevent space charge limitations inside the device, without sacrificing its angular acceptance of ions. In addition, all of the electronics for the measurement are isolated from ground so that they can float to the bias potential of the electrode, 2 kV below ground.

  8. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  9. Stochastic Optimization for Network-Constrained Power System Scheduling Problem

    Directory of Open Access Journals (Sweden)

    D. F. Teshome

    2015-01-01

    Full Text Available The stochastic nature of demand and wind generation has a considerable effect on solving the scheduling problem of a modern power system. Network constraints such as power flow equations and transmission capacities also need to be considered for a comprehensive approach to model renewable energy integration and analyze generation system flexibility. Firstly, this paper accounts for the stochastic inputs in such a way that the uncertainties are modeled as normally distributed forecast errors. The forecast errors are then superimposed on the outputs of load and wind forecasting tools. Secondly, it efficiently models the network constraints and tests an iterative algorithm and a piecewise linear approximation for representing transmission losses in mixed integer linear programming (MILP. It also integrates load shedding according to priority factors set by the system operator. Moreover, the different interactions among stochastic programming, network constraints, and prioritized load shedding are thoroughly investigated in the paper. The stochastic model is tested on a power system adopted from Jeju Island, South Korea. Results demonstrate the impact of wind speed variability and network constraints on the flexibility of the generation system. Further analysis shows the effect of loss modeling approaches on total cost, accuracy, computational time, and memory requirement.

  10. Advances in network systems architectures, security, and applications

    CERN Document Server

    Awad, Ali; Furtak, Janusz; Legierski, Jarosław

    2017-01-01

    This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems. .

  11. Controllable Buoys and Networked Buoy Systems

    Science.gov (United States)

    Davoodi, Faranak (Inventor); Davoudi, Farhooman (Inventor)

    2017-01-01

    Buoyant sensor networks are described, comprising floating buoys with sensors and energy harvesting capabilities. The buoys can control their buoyancy and motion, and can organize communication in a distributed fashion. Some buoys may have tethered underwater vehicles with a smart spooling system that allows the vehicles to dive deep underwater while remaining in communication and connection with the buoys.

  12. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  13. Social network based dynamic transit service through the OMITS system.

    Science.gov (United States)

    2014-02-01

    The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...

  14. Network and adaptive system of systems modeling and analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R.; Campbell, James E. Dr. (.; .); Anderson, Dennis James; Eddy, John P.

    2007-05-01

    This report documents the results of an LDRD program entitled ''Network and Adaptive System of Systems Modeling and Analysis'' that was conducted during FY 2005 and FY 2006. The purpose of this study was to determine and implement ways to incorporate network communications modeling into existing System of Systems (SoS) modeling capabilities. Current SoS modeling, particularly for the Future Combat Systems (FCS) program, is conducted under the assumption that communication between the various systems is always possible and occurs instantaneously. A more realistic representation of these communications allows for better, more accurate simulation results. The current approach to meeting this objective has been to use existing capabilities to model network hardware reliability and adding capabilities to use that information to model the impact on the sustainment supply chain and operational availability.

  15. A Systems Approach to Analyzing Cyber-Physical Threats in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Almajali, Anas; Rice, Eric; Viswanathan, Arun; Tan, Kymie; Neuman, Clifford

    2016-10-01

    This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary for the design of detection and remediation strategies to address the consequences of such attacks. Using concepts from systems health management and system engineering, this work (a) first identifies metrics that can be used to generate constraints for security features, and (b) lays out an end-to-end integrated methodology using separate network and power simulations to assess system risk. We demonstrate our approach by performing a systems-style analysis of a load-drop attack implemented over the AMI subsystem and targeted at destabilizing the underlying power grid.

  16. Design Criteria For Networked Image Analysis System

    Science.gov (United States)

    Reader, Cliff; Nitteberg, Alan

    1982-01-01

    Image systems design is currently undergoing a metamorphosis from the conventional computing systems of the past into a new generation of special purpose designs. This change is motivated by several factors, notably among which is the increased opportunity for high performance with low cost offered by advances in semiconductor technology. Another key issue is a maturing in understanding of problems and the applicability of digital processing techniques. These factors allow the design of cost-effective systems that are functionally dedicated to specific applications and used in a utilitarian fashion. Following an overview of the above stated issues, the paper presents a top-down approach to the design of networked image analysis systems. The requirements for such a system are presented, with orientation toward the hospital environment. The three main areas are image data base management, viewing of image data and image data processing. This is followed by a survey of the current state of the art, covering image display systems, data base techniques, communications networks and software systems control. The paper concludes with a description of the functional subystems and architectural framework for networked image analysis in a production environment.

  17. A Low Cost Shading Analyzer and Site Evaluator Design to Determine Solar Power System Installation Area

    Directory of Open Access Journals (Sweden)

    Selami Kesler

    2015-01-01

    Full Text Available Shading analyzer systems are necessary for selecting the most suitable installation site to sustain enough solar power. Afterwards, changes in solar data throughout the year must be evaluated along with the identification of obstructions surrounding the installation site in order to analyze shading effects on productivity of the solar power system. In this study, the shading analysis tools are introduced briefly, and a new and different device is developed and explained to analyze shading effect of the environmental obstruction on the site on which the solar power system will be established. Thus, exposure duration of the PV panels to the sunlight can be measured effectively. The device is explained with an application on the installation area selected as a pilot site, Denizli, in Turkey.

  18. The Construction of Higher Education Entrepreneur Services Network System a Research Based on Ecological Systems Theory

    Science.gov (United States)

    Xue, Jingxin

    The article aims to completely, systematically and objectively analyze the current situation of Entrepreneurship Education in China with Ecological Systems Theory. From this perspective, the author discusses the structure, function and its basic features of higher education entrepreneur services network system, and puts forward the opinion that every entrepreneurship organization in higher education institution does not limited to only one platform. Different functional supporting platforms should be combined closed through composite functional organization to form an integrated network system, in which each unit would impels others' development.

  19. Reliability Modeling of Microelectromechanical Systems Using Neural Networks

    Science.gov (United States)

    Perera. J. Sebastian

    2000-01-01

    Microelectromechanical systems (MEMS) are a broad and rapidly expanding field that is currently receiving a great deal of attention because of the potential to significantly improve the ability to sense, analyze, and control a variety of processes, such as heating and ventilation systems, automobiles, medicine, aeronautical flight, military surveillance, weather forecasting, and space exploration. MEMS are very small and are a blend of electrical and mechanical components, with electrical and mechanical systems on one chip. This research establishes reliability estimation and prediction for MEMS devices at the conceptual design phase using neural networks. At the conceptual design phase, before devices are built and tested, traditional methods of quantifying reliability are inadequate because the device is not in existence and cannot be tested to establish the reliability distributions. A novel approach using neural networks is created to predict the overall reliability of a MEMS device based on its components and each component's attributes. The methodology begins with collecting attribute data (fabrication process, physical specifications, operating environment, property characteristics, packaging, etc.) and reliability data for many types of microengines. The data are partitioned into training data (the majority) and validation data (the remainder). A neural network is applied to the training data (both attribute and reliability); the attributes become the system inputs and reliability data (cycles to failure), the system output. After the neural network is trained with sufficient data. the validation data are used to verify the neural networks provided accurate reliability estimates. Now, the reliability of a new proposed MEMS device can be estimated by using the appropriate trained neural networks developed in this work.

  20. Security Concerns and Countermeasures in Network Coding Based Communications Systems

    DEFF Research Database (Denmark)

    Talooki, Vahid; Bassoli, Riccardo; Roetter, Daniel Enrique Lucani

    2015-01-01

    This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety applications in enhancing current traditional networks. In particular, we analyze two...... key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active....... This paper also presents a detailed taxonomy and a timeline of the different NC security mechanisms and schemes reported in the literature. Current proposed security mechanisms and schemes for NC in the literature are classified later. Finally a timeline of these mechanism and schemes is presented....

  1. Locomotive monitoring system using wireless sensor networks

    CSIR Research Space (South Africa)

    Croucamp, PL

    2014-07-01

    Full Text Available Conference on Industrial Informatics (INDIN), 27-30 July 2014 Locomotive monitoring system using wireless sensor networks P. L. Croucamp1, S. Rimer1 and C. Kruger2 1Department of Electrical and Electronic Engineering University of Johannesburg... Johannesburg, South Africa Email: suvendic@uj.ac.za 2Advanced Sensor Networks, Meraka. CSIR Pretoria, South Africa Email: ckruger1@csir.co.za Abstract Theft of cables used for powering a locomotive not only stops the train from functioning but also...

  2. A Knowledge Management System Using Bayesian Networks

    Science.gov (United States)

    Ribino, Patrizia; Oliveri, Antonio; Re, Giuseppe Lo; Gaglio, Salvatore

    In today's world, decision support and knowledge management processes are strategic and interdependent activities in many organizations. The companies' interest on a correct knowledge management is grown, more than interest on the mere knowledge itself. This paper proposes a Knowledge Management System based on Bayesian networks. The system has been tested collecting and using data coming from projects and processes typical of ICT companies, and provides a Document Management System and a Decision Support system to share documents and to plan how to best use firms' knowledge.

  3. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  4. Reaction networks and kinetics of biochemical systems.

    Science.gov (United States)

    Arceo, Carlene Perpetua P; Jose, Editha C; Lao, Angelyn R; Mendoza, Eduardo R

    2017-01-01

    This paper further develops the connection between Chemical Reaction Network Theory (CRNT) and Biochemical Systems Theory (BST) that we recently introduced [1]. We first use algebraic properties of kinetic sets to study the set of complex factorizable kinetics CFK(N) on a CRN, which shares many characteristics with its subset of mass action kinetics. In particular, we extend the Theorem of Feinberg-Horn [9] on the coincidence of the kinetic and stoichiometric subsets of a mass action system to CF kinetics, using the concept of span surjectivity. We also introduce the branching type of a network, which determines the availability of kinetics on it and allows us to characterize the networks for which all kinetics are complex factorizable: A "Kinetics Landscape" provides an overview of kinetics sets, their algebraic properties and containment relationships. We then apply our results and those (of other CRNT researchers) reviewed in [1] to fifteen BST models of complex biological systems and discover novel network and kinetic properties that so far have not been widely studied in CRNT. In our view, these findings show an important benefit of connecting CRNT and BST modeling efforts. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Situational Awareness of Network System Roles (SANSR)

    Energy Technology Data Exchange (ETDEWEB)

    Huffer, Kelly M [ORNL; Reed, Joel W [ORNL

    2017-01-01

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.

  6. Architecture for networked electronic patient record systems.

    Science.gov (United States)

    Takeda, H; Matsumura, Y; Kuwata, S; Nakano, H; Sakamoto, N; Yamamoto, R

    2000-11-01

    There have been two major approaches to the development of networked electronic patient record (EPR) architecture. One uses object-oriented methodologies for constructing the model, which include the GEHR project, Synapses, HL7 RIM and so on. The second approach uses document-oriented methodologies, as applied in examples of HL7 PRA. It is practically beneficial to take the advantages of both approaches and to add solution technologies for network security such as PKI. In recognition of the similarity with electronic commerce, a certificate authority as a trusted third party will be organised for establishing networked EPR system. This paper describes a Japanese functional model that has been developed, and proposes a document-object-oriented architecture, which is-compared with other existing models.

  7. Gas Main Sensor and Communications Network System

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  8. Structural systems identification of genetic regulatory networks.

    Science.gov (United States)

    Xiong, Hao; Choe, Yoonsuck

    2008-02-15

    Reverse engineering of genetic regulatory networks from experimental data is the first step toward the modeling of genetic networks. Linear state-space models, also known as linear dynamical models, have been applied to model genetic networks from gene expression time series data, but existing works have not taken into account available structural information. Without structural constraints, estimated models may contradict biological knowledge and estimation methods may over-fit. In this report, we extended expectation-maximization (EM) algorithms to incorporate prior network structure and to estimate genetic regulatory networks that can track and predict gene expression profiles. We applied our method to synthetic data and to SOS data and showed that our method significantly outperforms the regular EM without structural constraints. The Matlab code is available upon request and the SOS data can be downloaded from http://www.weizmann.ac.il/mcb/UriAlon/Papers/SOSData/, courtesy of Uri Alon. Zak's data is available from his website, http://www.che.udel.edu/systems/people/zak.

  9. Parties under Stress: Using a Linkage Decay Framework to Analyze the Chilean Party System

    OpenAIRE

    Jana Morgan; Carlos Meléndez

    2017-01-01

    Conventional wisdom suggests Chile’s party system is highly institutionalized. However, recent declines in participation and partisanship have begun to raise questions about this veneer of stability. This article assesses the current state of the Chilean party system, analyzing its ability to provide linkage. We specify a theoretical framework for identifying challenges to linkage and constraints on necessary adaptation. We then use this framework to evaluate linkage in the contemporary Chile...

  10. GAS MAIN SENSOR AND COMMUNICATIONS NETWORK SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf

    2004-09-30

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the New York Gas Group (NYGAS), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. In Phase II of this three-phase program, an improved prototype system was built for low-pressure cast-iron and high-pressure steel (including a no-blow installation system) mains and tested in a serial-network configuration in a live network in Long Island with the support of Keyspan Energy, Inc. The experiment was carried out in several open-hole excavations over a multi-day period. The prototype units (3 total) combined sensors capable of monitoring pressure, flow, humidity, temperature and vibration, which were sampled and combined in data-packages in an in-pipe master-repeater-slave configuration in serial or ladder-network arrangements. It was verified that the system was capable of performing all data-sampling, data-storage and collection as expected, yielding interesting results as to flow-dynamics and vibration-detection. Wireless in-pipe communications were shown to be feasible and the system was demonstrated to run off in-ground battery- and above-ground solar power. The remote datalogger access and storage-card features were demonstrated and used to log and post-process system data. Real-time data-display on an updated Phase-I GUI was used for in-field demonstration and troubleshooting.

  11. An Activity Theory Approach to Analyze Barriers to a Virtual Management Information Systems (MIS) Curriculum

    Science.gov (United States)

    Jaradat, Suhair; Qablan, Ahmad; Barham, Areej

    2011-01-01

    This paper explains how the activity theory is used as a framework to analyze the barriers to a virtual Management Information Stream (MIS) Curriculum in Jordanian schools, from both the sociocultural and pedagogical perspectives. Taking the activity system as a unit of analysis, this study documents the processes by which activities shape and are…

  12. Data acquisition and analysis system for the ion microprobe mass analyzer

    Energy Technology Data Exchange (ETDEWEB)

    Darby, D.M.; Cristy, S.S.

    1979-02-01

    A computer was interfaced to an ion microprobe mass analyzer for more rapid data acquisition and analysis. The interface is designed to allow data acquisition, independent of the computer. A large data analysis package was developed and implemented. Performance of the computerized system was evaluated and compared to manual operation.

  13. System markets: Indirect network effects in action, or inaction?

    NARCIS (Netherlands)

    J.L.G. Binken (Jeroen)

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect

  14. Analyzing heterogeneity in the effects of physical activity in children on social network structure and peer selection dynamics.

    Science.gov (United States)

    Henry, Teague; Gesell, Sabina B; Ip, Edward H

    2016-09-01

    Social networks influence children and adolescents' physical activity. The focus of this paper is to examine the differences in the effects of physical activity on friendship selection, with eye to the implications on physical activity interventions for young children. Network interventions to increase physical activity are warranted but have not been conducted. Prior to implementing a network intervention in the field, it is important to understand potential heterogeneities in the effects that activity level have on network structure. In this study, the associations between activity level and cross sectional network structure, and activity level and change in network structure are assessed. We studied a real-world friendship network among 81 children (average age 7.96 years) who lived in low SES neighborhoods, attended public schools, and attended one of two structured aftercare programs, of which one has existed and the other was new. We used the exponential random graph model (ERGMs) and its longitudinal extension to evaluate the association between activity level and various demographic factors in having, forming, and dissolving friendship. Due to heterogeneity between the friendship networks within the aftercare programs, separate analyses were conducted for each network. There was heterogeneity in the effect of physical activity on both cross sectional network structure and the formation and dissolution processes, both across time and between networks. Network analysis could be used to assess the unique structure and dynamics of a social network before an intervention is implemented, so as to optimize the effects of the network intervention for increasing childhood physical activity. Additionally, if peer selection processes are changing within a network, a static network intervention strategy for childhood physical activity could become inefficient as the network evolves.

  15. When Workflow Management Systems and Logging Systems Meet: Analyzing Large-Scale Execution Traces

    Energy Technology Data Exchange (ETDEWEB)

    Gunter, Daniel

    2008-07-31

    This poster shows the benefits of integrating a workflow management system with logging and log mining capabilities. By combing two existing, mature technologies: Pegasus-WMS and Netlogger, we are able to efficiently process execution logs of earthquake science workflows consisting of hundreds of thousands to one million tasks. In particular we show results of processing logs of CyberShake, a workflow application running on the TeraGrid. Client-side tools allow scientists to quickly gather statistics about a workflow run and find out which tasks executed, where they were executed, what was their runtime, etc. These statistics can be used to understand the performance characteristics of a workflow and help tune the execution parameters of the workflow management system. This poster shows the scalability of the system presenting results of uploading task execution records into the system and by showing results of querying the system for overall workflow performance information.

  16. System/360 Computer Assisted Network Scheduling (CANS) System

    Science.gov (United States)

    Brewer, A. C.

    1972-01-01

    Computer assisted scheduling techniques that produce conflict-free and efficient schedules have been developed and implemented to meet needs of the Manned Space Flight Network. CANS system provides effective management of resources in complex scheduling environment. System is automated resource scheduling, controlling, planning, information storage and retrieval tool.

  17. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  18. Conceptualizing and Advancing Research Networking Systems.

    Science.gov (United States)

    Schleyer, Titus; Butler, Brian S; Song, Mei; Spallek, Heiko

    2012-03-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers' need for comprehensive information and potential collaborators' desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user's primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems.

  19. Conceptualizing and Advancing Research Networking Systems

    Science.gov (United States)

    SCHLEYER, TITUS; BUTLER, BRIAN S.; SONG, MEI; SPALLEK, HEIKO

    2013-01-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers’ need for comprehensive information and potential collaborators’ desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user’s primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems. PMID:24376309

  20. Who do you know? Developing and Analyzing Entrepreneur Networks: An Analysis of the Entrepreneurial Environment of Kampala, Uganda

    Science.gov (United States)

    2013-11-04

    entrepreneur’s social network and utilizes the Name Generator approach to develop the social network model. This method maps an ego - centered network and...connection and a back-up power supply. • @TheHub Kampala- @TheHub is located in two renovated Kampala City Council flats on a quiet street and has a

  1. Development of a High Resolution Analyzing Magnet System for Heavy Molecular Ions

    Science.gov (United States)

    Ghazaly, Mohamed O. A. El; Dehnel, Morgan; Defrance, Pierre

    At the King Abdulaziz City for Science and Technology (KACST, Saudi Arabia), a versatile ion-beam injector was constructed to provide the electrostatic storage ring with the required high-quality ion beams. In order to remove the ambiguity over the ion mass due to the exclusive application of electric fields in the set-up, the injector is being equipped with a high resolution mass analyzing magnet. A high resolution Analyzing Magnet System has been designed to provide a singly-charged ion beam of kinetic energy up to 50 keV, mass up to 1500 Amu, and with the mass resolution fixed to Δm/m =1:1500. The system includes specific entrance and exit slits, designed to sustain the required mass resolution. Furthermore, specific focusing and shaping optics have been added upstream and downstream the system, in order to monitor and adapt the shape of the ion beam at the entrance and exit of the system, respectively. The present paper gives an overview on the design of this mass analyzing magnet system together with the upstream/downstream adapting optics.

  2. Systems biology of plant molecular networks: from networks to models

    NARCIS (Netherlands)

    Valentim, F.L.

    2015-01-01

    Developmental processes are controlled by regulatory networks (GRNs), which are tightly coordinated networks of transcription factors (TFs) that activate and repress gene expression within a spatial and temporal context. In Arabidopsis thaliana, the key components and network structures of the GRNs

  3. Analyzing Density Operator in Thermal State for Complicated Time-Dependent Optical Systems

    Directory of Open Access Journals (Sweden)

    Jeong Ryeol Choi

    2014-01-01

    Full Text Available Density operator of oscillatory optical systems with time-dependent parameters is analyzed. In this case, a system is described by a time-dependent Hamiltonian. Invariant operator theory is introduced in order to describe time-varying behavior of the system. Due to the time dependence of parameters, the frequency of oscillation, so-called a modified frequency of the system, is somewhat different from the natural frequency. In general, density operator of a time-dependent optical system is represented in terms of the modified frequency. We showed how to determine density operator of complicated time-dependent optical systems in thermal state. Usually, density operator description of quantum states is more general than the one described in terms of the state vector.

  4. Modeling, Control and Analyze of Multi-Machine Drive Systems using Bond Graph Technique

    Directory of Open Access Journals (Sweden)

    J. Belhadj

    2006-03-01

    Full Text Available In this paper, a system viewpoint method has been investigated to study and analyze complex systems using Bond Graph technique. These systems are multimachine multi-inverter based on Induction Machine (IM, well used in industries like rolling mills, textile, and railway traction. These systems are multi-domains, multi-scales time and present very strong internal and external couplings, with non-linearity characterized by a high model order. The classical study with analytic model is difficult to manipulate and it is limited to some performances. In this study, a “systemic approach” is presented to design these kinds of systems, using an energetic representation based on Bond Graph formalism. Three types of multimachine are studied with their control strategies. The modeling is carried out by Bond Graph and results are discussed to show the performances of this methodology

  5. Weighted complex network analysis of the Beijing subway system: Train and passenger flows

    Science.gov (United States)

    Feng, Jia; Li, Xiamiao; Mao, Baohua; Xu, Qi; Bai, Yun

    2017-05-01

    In recent years, complex network theory has become an important approach to the study of the structure and dynamics of traffic networks. However, because traffic data is difficult to collect, previous studies have usually focused on the physical topology of subway systems, whereas few studies have considered the characteristics of traffic flows through the network. Therefore, in this paper, we present a multi-layer model to analyze traffic flow patterns in subway networks, based on trip data and an operation timetable obtained from the Beijing Subway System. We characterize the patterns in terms of the spatiotemporal flow size distributions of both the train flow network and the passenger flow network. In addition, we describe the essential interactions between these two networks based on statistical analyses. The results of this study suggest that layered models of transportation systems can elucidate fundamental differences between the coexisting traffic flows and can also clarify the mechanism that causes these differences.

  6. A General Bayesian Network Approach to Analyzing Online Game Item Values and Its Influence on Consumer Satisfaction and Purchase Intention

    Science.gov (United States)

    Lee, Kun Chang; Park, Bong-Won

    Many online game users purchase game items with which to play free-to-play games. Because of a lack of research into which there is no specified framework for categorizing the values of game items, this study proposes four types of online game item values based on an analysis of literature regarding online game characteristics. It then proposes to investigate how online game users perceive satisfaction and purchase intention from the proposed four types of online game item values. Though regression analysis has been used frequently to answer this kind of research question, we propose a new approach, a General Bayesian Network (GBN), which can be performed in an understandable way without sacrificing predictive accuracy. Conventional techniques, such as regression analysis, do not provide significant explanation for this kind of problem because they are fixed to a linear structure and are limited in explaining why customers are likely to purchase game items and if they are satisfied with their purchases. In contrast, the proposed GBN provides a flexible underlying structure based on questionnaire survey data and offers robust decision support on this kind of research question by identifying its causal relationships. To illustrate the validity of GBN in solving the research question in this study, 327 valid questionnaires were analyzed using GBN with what-if and goal-seeking approaches. The experimental results were promising and meaningful in comparison with regression analysis results.

  7. Effects of specimen preparation on the electromagnetic property measurements of solid materials with an automatic network analyzer

    Science.gov (United States)

    Long, E. R., Jr.

    1986-01-01

    Effects of specimen preparation on measured values of an acrylic's electomagnetic properties at X-band microwave frequencies, TE sub 1,0 mode, utilizing an automatic network analyzer have been studied. For 1 percent or less error, a gap between the specimen edge and the 0.901-in. wall of the specimen holder was the most significant parameter. The gap had to be less than 0.002 in. The thickness variation and alignment errors in the direction parallel to the 0.901-in. wall were equally second most significant and had to be less than 1 degree. Errors in the measurement f the thickness were third most significant. They had to be less than 3 percent. The following parameters caused errors of 1 percent or less: ratios of specimen-holder thicknesses of more than 15 percent, gaps between the specimen edge and the 0.401-in. wall less than 0.045 in., position errors less than 15 percent, surface roughness, hickness variation in the direction parallel to the 0.401-in. wall less than 35 percent, and specimen alignment in the direction parallel to the 0.401-in. wall mass than 5 degrees.

  8. A graph-based network-vulnerability analysis system

    Energy Technology Data Exchange (ETDEWEB)

    Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

  9. A graph-based network-vulnerability analysis system

    Energy Technology Data Exchange (ETDEWEB)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

  10. Pathways, Networks and Systems Medicine Conferences

    Energy Technology Data Exchange (ETDEWEB)

    Nadeau, Joseph H. [Pacific Northwest Research Institute

    2013-11-25

    The 6th Pathways, Networks and Systems Medicine Conference was held at the Minoa Palace Conference Center, Chania, Crete, Greece (16-21 June 2008). The Organizing Committee was composed of Joe Nadeau (CWRU, Cleveland), Rudi Balling (German Research Centre, Brauschweig), David Galas (Institute for Systems Biology, Seattle), Lee Hood (Institute for Systems Biology, Seattle), Diane Isonaka (Seattle), Fotis Kafatos (Imperial College, London), John Lambris (Univ. Pennsylvania, Philadelphia),Harris Lewin (Univ. of Indiana, Urbana-Champaign), Edison Liu (Genome Institute of Singapore, Singapore), and Shankar Subramaniam (Univ. California, San Diego). A total of 101 individuals from 21 countries participated in the conference: USA (48), Canada (5), France (5), Austria (4), Germany (3), Italy (3), UK (3), Greece (2), New Zealand (2), Singapore (2), Argentina (1), Australia (1), Cuba (1), Denmark (1), Japan (1), Mexico (1), Netherlands (1), Spain (1), Sweden (1), Switzerland (1). With respect to speakers, 29 were established faculty members and 13 were graduate students or postdoctoral fellows. With respect to gender representation, among speakers, 13 were female and 28 were male, and among all participants 43 were female and 58 were male. Program these included the following topics: Cancer Pathways and Networks (Day 1), Metabolic Disease Networks (Day 2), Day 3 ? Organs, Pathways and Stem Cells (Day 3), and Day 4 ? Inflammation, Immunity, Microbes and the Environment (Day 4). Proceedings of the Conference were not published.

  11. The network management expert system prototype for Sun Workstations

    Science.gov (United States)

    Leigh, Albert

    1990-01-01

    Networking has become one of the fastest growing areas in the computer industry. The emergence of distributed workstations make networking more popular because they need to have connectivity between themselves as well as with other computer systems to share information and system resources. Making the networks more efficient and expandable by selecting network services and devices that fit to one's need is vital to achieve reliability and fast throughput. Networks are dynamically changing and growing at a rate that outpaces the available human resources. Therefore, there is a need to multiply the expertise rapidly rather than employing more network managers. In addition, setting up and maintaining networks by following the manuals can be tedious and cumbersome even for an experienced network manager. This prototype expert system was developed to experiment on Sun Workstations to assist system and network managers in selecting and configurating network services.

  12. Molecular Detection of Bladder Cancer by Fluorescence Microsatellite Analysis and an Automated Genetic Analyzing System

    Directory of Open Access Journals (Sweden)

    Sarel Halachmi

    2007-01-01

    Full Text Available To investigate the ability of an automated fluorescent analyzing system to detect microsatellite alterations, in patients with bladder cancer. We investigated 11 with pathology proven bladder Transitional Cell Carcinoma (TCC for microsatellite alterations in blood, urine, and tumor biopsies. DNA was prepared by standard methods from blood, urine and resected tumor specimens, and was used for microsatellite analysis. After the primers were fluorescent labeled, amplification of the DNA was performed with PCR. The PCR products were placed into the automated genetic analyser (ABI Prism 310, Perkin Elmer, USA and were subjected to fluorescent scanning with argon ion laser beams. The fluorescent signal intensity measured by the genetic analyzer measured the product size in terms of base pairs. We found loss of heterozygocity (LOH or microsatellite alterations (a loss or gain of nucleotides, which alter the original normal locus size in all the patients by using fluorescent microsatellite analysis and an automated analyzing system. In each case the genetic changes found in urine samples were identical to those found in the resected tumor sample. The studies demonstrated the ability to detect bladder tumor non-invasively by fluorescent microsatellite analysis of urine samples. Our study supports the worldwide trend for the search of non-invasive methods to detect bladder cancer. We have overcome major obstacles that prevented the clinical use of an experimental system. With our new tested system microsatellite analysis can be done cheaper, faster, easier and with higher scientific accuracy.

  13. Method and system for formation and withdrawal of a sample from a surface to be analyzed

    Science.gov (United States)

    Van Berkel, Gary J.; Kertesz, Vilmos

    2017-10-03

    A method and system for formation and withdrawal of a sample from a surface to be analyzed utilizes a collection instrument having a port through which a liquid solution is conducted onto the surface to be analyzed. The port is positioned adjacent the surface to be analyzed, and the liquid solution is conducted onto the surface through the port so that the liquid solution conducted onto the surface interacts with material comprising the surface. An amount of material is thereafter withdrawn from the surface. Pressure control can be utilized to manipulate the solution balance at the surface to thereby control the withdrawal of the amount of material from the surface. Furthermore, such pressure control can be coordinated with the movement of the surface relative to the port of the collection instrument within the X-Y plane.

  14. Network resource control for grid workflow management systems

    NARCIS (Netherlands)

    Strijkers, R.J.; Cristea, M.; Korkhov, V.; Marchal, D.; Belloum, A.; Laat, C.de; Meijer, R.J.

    2010-01-01

    Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network

  15. Analyzing Systems Integration Best Practices and Assessment in DoD Space Systems Acquisition

    Science.gov (United States)

    2009-12-01

    66 ‗SI‘s Taste of Mango ‘ ........................................................................................... 66 ‗SI...to distinguish between the two domains (i.e., SI and SE). Leaving Systems Engineering as the overarching process includes elements of integration...are extracts that describe the relationship between lessons-learned and TR&A objectives. Technical reviews and audits entail a tremendous amount of

  16. Analyzing systemic risk using non-linear marginal expected shortfall and its minimum spanning tree

    Science.gov (United States)

    Song, Jae Wook; Ko, Bonggyun; Chang, Woojin

    2018-02-01

    The aim of this paper is to propose a new theoretical framework for analyzing the systemic risk using the marginal expected shortfall (MES) and its correlation-based minimum spanning tree (MST). At first, we develop two parametric models of MES with their closed-form solutions based on the Capital Asset Pricing Model. Our models are derived from the non-symmetric quadratic form, which allows them to consolidate the non-linear relationship between the stock and market returns. Secondly, we discover the evidences related to the utility of our models and the possible association in between the non-linear relationship and the emergence of severe systemic risk by considering the US financial system as a benchmark. In this context, the evolution of MES also can be regarded as a reasonable proxy of systemic risk. Lastly, we analyze the structural properties of the systemic risk using the MST based on the computed series of MES. The topology of MST conveys the presence of sectoral clustering and strong co-movements of systemic risk leaded by few hubs during the crisis. Specifically, we discover that the Depositories are the majority sector leading the connections during the Non-Crisis period, whereas the Broker-Dealers are majority during the Crisis period.

  17. A WebGIS-based system for analyzing and visualizing air quality data for Shanghai Municipality

    Science.gov (United States)

    Wang, Manyi; Liu, Chaoshun; Gao, Wei

    2014-10-01

    An online visual analytical system based on Java Web and WebGIS for air quality data for Shanghai Municipality was designed and implemented to quantitatively analyze and qualitatively visualize air quality data. By analyzing the architecture of WebGIS and Java Web, we firstly designed the overall scheme for system architecture, then put forward the software and hardware environment and also determined the main function modules for the system. The visual system was ultimately established with the DIV + CSS layout method combined with JSP, JavaScript, and some other computer programming languages based on the Java programming environment. Moreover, Struts, Spring, and Hibernate frameworks (SSH) were integrated in the system for the purpose of easy maintenance and expansion. To provide mapping service and spatial analysis functions, we selected ArcGIS for Server as the GIS server. We also used Oracle database and ESRI file geodatabase to store spatial data and non-spatial data in order to ensure the data security. In addition, the response data from the Web server are resampled to implement rapid visualization through the browser. The experimental successes indicate that this system can quickly respond to user's requests, and efficiently return the accurate processing results.

  18. Optical fiber telecommunications systems and networks

    CERN Document Server

    Kaminow, Ivan; Willner, Alan E

    2013-01-01

    Optical Fiber Telecommunications VI (A&B) is the sixth in a series that has chronicled the progress in the R&D of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition brings a fresh look to many essential topics, including devices, subsystems, systems and networks. A central theme is the enabling of high-bandwidth communications in a cost-effective manner for the development of customer applications. These volumes are an ideal reference for R&D engineers and managers, optical systems implementers, university researchers and s

  19. Some queuing network models of computer systems

    Science.gov (United States)

    Herndon, E. S.

    1980-01-01

    Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

  20. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  1. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  2. ITHNA.SYS: An Integrated Thermal Hydraulic and Neutronic Analyzer SYStem for NUR research reactor

    Energy Technology Data Exchange (ETDEWEB)

    Mazidi, S., E-mail: samirmazidi@gmail.com [Division Physique et Applications Nucléaires, Centre de Recherche Nucléaire de Draria (CRND), BP 43 Sebala, Draria, Alger (Algeria); Meftah, B., E-mail: b_meftah@yahoo.com [Division Physique et Applications Nucléaires, Centre de Recherche Nucléaire de Draria (CRND), BP 43 Sebala, Draria, Alger (Algeria); Belgaid, M., E-mail: belgaidm@yahoo.com [Faculté de Physique, Université Houari Boumediene, USTHB, BP 31, Bab Ezzouar, Alger (Algeria); Letaim, F., E-mail: fletaim@yahoo.fr [Faculté des Sciences et Technologies, Université d’El-oued, PO Box 789, El-oued (Algeria); Halilou, A., E-mail: hal_rane@yahoo.fr [Division Réacteur NUR, Centre de Recherche Nucléaire de Draria, BP 43 Sebala, Draria, Alger (Algeria)

    2015-08-15

    Highlights: • We develop a neutronic and thermal hydraulic MTR reactor analyzer. • The analyzer allows a rapid determination of the reactor core parameters. • Some NUR reactor parameters have been analyzed. - Abstract: This paper introduces the Integrated Thermal Hydraulic and Neutronic Analyzer SYStem (ITHNA.SYS) that has been developed for the Algerian research reactor NUR. It is used both as an operating aid tool and as a core physics engineering analysis tool. The system embeds three modules of the MTR-PC software package developed by INVAP SE: the cell calculation code WIMSD, the core calculation code CITVAP and the program TERMIC for thermal hydraulic analysis of a material testing reactor (MTR) core in forced convection. ITHNA.SYS operates both in on-line and off-line modes. In the on-line mode, the system is linked, via the computer parallel port, to the data acquisition console of the reactor control room and allows a real time monitoring of major physical and safety parameters of the NUR core. PC-based ITHNA.SYS provides a viable and convenient way of using an accumulated and often complex reactor physics stock of knowledge and frees the user from the intricacy of adequate reactor core modeling. This guaranties an accurate, though rapid, determination of a variety of neutronic and thermal hydraulic parameters of importance for the operation and safety analysis of the NUR research reactor. Instead of the several hours usually required, the processing time for the determination of such parameters is now reduced to few seconds. Validation of the system was performed with respect to experimental measurements and to calculations using reference codes. ITHNA.SYS can be easily adapted to accommodate other kinds of MTR reactors.

  3. Analyzing the Army’s Configuration Management System Applicability to a Commercial Cataloguing System.

    Science.gov (United States)

    1997-03-01

    developing the weapon system. Later reconstruction of this information can be either very costly ( reverse engineering), or even impossible because of...parts that perform the same function. However, the use of performance specifications to buy spare parts would reverse the intent of this program. Since... Logistcs at Michigan State University. The report titled "Global Logistics Best Practices," identified perceptions and characteristics of best

  4. Developing a Model-based Capability to Analyze Requirements for the Climate Observing System

    Science.gov (United States)

    Gelaro, Ronald

    2009-01-01

    Models are foundational for estimating states of the earth's climate system, both as tools to extrapolate information in time and space, and as observation 'operators' used to relate what is analyzed and predicted to what is observed. Expanding the simulation approach further, observing system simulation experiments (OSSEs) are designed to mimic the complete process of analyzing the climate state by replacing real observations with entirely simulated ones determined from a model-based depiction of nature. OSSEs provide a framework to 'fly' simulated satellite instruments through a synthetic atmosphere and investigate the trade-spaces of measurements for various satellite configurations and sampling strategies, and assess their measurement impact on modeling and forecasting capabilities. Such a tool is a crucial but as yet unfulfilled need for future mission selection and design. The components of a state-of-the-art OSSE system are being assembled at the Global Modeling and Assimilation Office (GMAO, Code 610.1) at NASA/GSFC, leveraging on the GMAO's existing modeling and data assimilation infrastructure for numerical weather prediction (NWP). The OSSE framework is based on the GMAO's Goddard Earth Observing System atmospheric general circulation model, version 5 (GEOS-5) and the Gridpoint Statistical Interpolation (GSI) observational analysis scheme, combined with the Goddard Chemistry, Aerosol, Radiation, and Transport (GOCART) model developed by the Atmospheric Chemistry and Dynamics Branch (Code 613.3). This system is an evolving, key component of Goddard's planned development of an Integrated Earth System Analysis (IESA) capability, which will bring together into a single, fully interactive system Goddard's modeling and assimilation efforts in atmosphere, ocean and chemistry and aerosols to provide a comprehensive analysis and prediction system for weather and climate In addition to providing a state-of-the-art capability for assimilating current observation

  5. Network video transmission system based on SOPC

    Science.gov (United States)

    Zhang, Zhengbing; Deng, Huiping; Xia, Zhenhua

    2008-03-01

    Video systems have been widely used in many fields such as conferences, public security, military affairs and medical treatment. With the rapid development of FPGA, SOPC has been paid great attentions in the area of image and video processing in recent years. A network video transmission system based on SOPC is proposed in this paper for the purpose of video acquisition, video encoding and network transmission. The hardware platform utilized to design the system is an SOPC board of model Altera's DE2, which includes an FPGA chip of model EP2C35F672C6, an Ethernet controller and a video I/O interface. An IP core, known as Nios II embedded processor, is used as the CPU of the system. In addition, a hardware module for format conversion of video data, and another module to realize Motion-JPEG have been designed with Verilog HDL. These two modules are attached to the Nios II processor as peripheral equipments through the Avalon bus. Simulation results show that these two modules work as expected. Uclinux including TCP/IP protocol as well as the driver of Ethernet controller is chosen as the embedded operating system and an application program scheme is proposed.

  6. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  7. Properties of grain boundary networks in the NEEM ice core analyzed by combined transmission and reflection optical microscopy

    Science.gov (United States)

    Binder, Tobias; Weikusat, Ilka; Garbe, Christoph; Svensson, Anders; Kipfstuhl, Sepp

    2014-05-01

    Microstructure analysis of ice cores is vital to understand the processes controlling the flow of ice on the microscale. To quantify the microstructural variability (and thus occurring processes) on centimeter, meter and kilometer scale along deep polar ice cores, a large number of sections has to be analyzed. In the last decade, two different methods have been applied: On the one hand, transmission optical microscopy of thin sections between crossed polarizers yields information on the distribution of crystal c-axes. On the other hand, reflection optical microscopy of polished and controlled sublimated section surfaces allows to characterize the high resolution properties of a single grain boundary, e.g. its length, shape or curvature (further developed by [1]). Along the entire NEEM ice core (North-West Greenland, 2537 m length) drilled in 2008-2011 we applied both methods to the same set of vertical sections. The data set comprises series of six consecutive 6 x 9 cm2 sections in steps of 20 m - in total about 800 images. A dedicated method for automatic processing and matching both image types has recently been developed [2]. The high resolution properties of the grain boundary network are analyzed. Furthermore, the automatic assignment of c-axis misorientations to visible sublimation grooves enables us to quantify the degree of similarity between the microstructure revealed by both analysis techniques. The reliability to extract grain boundaries from both image types as well as the appearance of sublimation groove patterns exhibiting low misorientations is investigated. X-ray Laue diffraction measurements (yielding full crystallographic orientation) have validated the sensitivity of the surface sublimation method for sub-grain boundaries [3]. We introduce an approach for automatic extraction of sub-grain structures from sublimation grooves. A systematic analysis of sub-grain boundary densities indicates a possible influence of high impurity contents (amongst

  8. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    Networked control system‿ (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing

  9. ATTENTIONAL NETWORKS AND SELECTIVE VISUAL SYSTEM

    Directory of Open Access Journals (Sweden)

    ALEJANDRO CASTILLO MORENO

    2006-05-01

    Full Text Available In this paper we checked the principal researches and theories to explain the attention system functioning.We are going to start reviewing along time about the concept of attention, from filter theories andresources distributor theories, to the current theories in which attention is conceived as a control system.From this last point of view, we will emphasize on the attentional networks theory of Posner, thatproposes different systems to explain diverse aspects of attention, but they are related to each other. Atlast in this paper, we will mention experimental results that have been important to characterize theselective attentional mechanisms of the human visual system, using the attentional spotlight model forthis aim.

  10. A semiautomatic image analyzing system based on an APPLE II or IIe personal computer.

    Science.gov (United States)

    Oberholzer, M; Kuhn, H; Christen, H; Ettlin, R; Meyer, H; Heitz, P U

    1987-01-01

    A new semiautomatic image analyzing system based on an APPLE II or IIe personal computer is described. The configurations of the hardware and software are extensively explained. The possibilities of applying the system are demonstrated by different examples taken from various projects in biological research and clinical pathology. The system is designed to fulfil the following requirements: (1) stepwise realization as a unit-by-unit system according to individual needs and interests, (2) acquisition and calculation of morphometric parameters, (3) provision of solutions for the greatest possible number of given problems in clinical and experimental pathology, (4) direct connection of the system to host computers for on-line data transfer and evaluation, and (5) optimum cost-benefit ratio by manifold application possibilities for the individual hardware and software elements. The advantages of the unit-by-unit system with personal computers outweigh in many respects the disadvantages (for example, increased file handling and limited capacity) in comparison with the closed automatized image evaluation system, particularly with regard to costs, flexibility and compatibility. The system is being further developed in collaboration with Kontron Bildanalyse GmbH, Eching/Munich, FRG.

  11. Comparative study of gas-analyzing systems designed for continuous monitoring of TPP emissions

    Science.gov (United States)

    Kondrat'eva, O. E.; Roslyakov, P. V.

    2017-06-01

    Determining the composition of combustion products is important in terms of both control of emissions into the atmosphere from thermal power plants and optimization of fuel combustion processes in electric power plants. For this purpose, the concentration of oxygen, carbon monoxide, nitrogen, and sulfur oxides in flue gases is monitored; in case of solid fuel combustion, fly ash concentration is monitored as well. According to the new nature conservation law in Russia, all large TPPs shall be equipped with continuous emission monitoring and measurement systems (CEMMS) into the atmosphere. In order to ensure the continuous monitoring of pollutant emissions, direct round-the-clock measurements are conducted with the use of either domestically produced or imported gas analyzers and analysis systems, the operation of which is based on various physicochemical methods and which can be generally used when introducing CEMMS. Depending on the type and purposes of measurement, various kinds of instruments having different features may be used. This article represents a comparative study of gas-analysis systems for measuring the content of polluting substances in exhaust gases based on various physical and physicochemical analysis methods. It lists basic characteristics of the methods commonly applied in the area of gas analysis. It is proven that, considering the necessity of the long-term, continuous operation of gas analyzers for monitoring and measurement of pollutant emissions into the atmosphere, as well as the requirements for reliability and independence from aggressive components and temperature of the gas flow, it is preferable to use optical gas analyzers for the aforementioned purposes. In order to reduce the costs of equipment comprising a CEMMS at a TPP and optimize the combustion processes, electrochemical and thermomagnetic gas analyzers may also be used.

  12. Utilizing Social Networks in Times of Crisis: Understanding, Exploring and Analyzing Critical Incident Management at Institutions of Higher Education

    Science.gov (United States)

    Asselin, Martha Jo

    2012-01-01

    With the rising number of major crises on college campuses today (Security on Campus Inc., 2009), institutions of higher education can benefit from understanding of how social networks may be used in times of emergency. What is currently known about the usage of social networks is not integral to the current practices of crisis management that are…

  13. Implementing ETC System on Hungarian Motorway Network

    Directory of Open Access Journals (Sweden)

    Katalin Tanczos

    2006-01-01

    Full Text Available Question of transport infrastructure charges - among others- covers calculation and allocation of infrastructure costsreferring different users. Cost allocation forms the basis of settingthe user charges. The reason for the existence of applyingmileage-proportional pricing system is generally accepted, asthe European regulations also discuss this topic seriously. Thismileage-proportional pricing system demands an appropriatetoll collecting system, which meets the requirements of arrangedprinciples. Among these, the most important principlesare equity, effectiveness and efficiency. Electronic Toll Collecting(ETC systems are an appropriate solution to solvingcharging problems in various ways according to the differentkind of systems. In Hungary the current motorway charging systemis not an adequate solution for success of these principlesin the long-term. A new, mileage-proportional pricing system isbeing initiated. This study presents the plans of HungarianETC system for motorway network, focusing on introductoryissues. Among several preparatory steps, examining acceptabilitybarriers of ETC system for the stakeholders of transport isneeded. Their problem perception is to satisfy their- often contrary-demands in equal, fair and effective ways. The policy implementationprocess also plays an important role to generatesufficient conditions to implement this solution. This contributionis to discuss these objectives in applying the ETC system inan acceptable way.

  14. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  15. Application of Method of Variation to Analyze and Predict Human Induced Modifications of Water Resource Systems

    Science.gov (United States)

    Dessu, S. B.; Melesse, A. M.; Mahadev, B.; McClain, M.

    2010-12-01

    Water resource systems have often used gravitational surface and subsurface flows because of their practicality in hydrological modeling and prediction. Activities such as inter/intra-basin water transfer, the use of small pumps and the construction of micro-ponds challenge the tradition of natural rivers as water resource management unit. On the contrary, precipitation is barely affected by topography and plot harvesting in wet regions can be more manageable than diverting from rivers. Therefore, it is indicative to attend to systems where precipitation drives the dynamics while the internal mechanics constitutes spectrum of human activity and decision in a network of plots. The trade-in volume and path of harvested precipitation depends on water balance, energy balance and the kinematics of supply and demand. Method of variation can be used to understand and predict the implication of local excess precipitation harvest and exchange on the natural water system. A system model was developed using the variational form of Euler-Bernoulli’s equation for the Kenyan Mara River basin. Satellite derived digital elevation models, precipitation estimates, and surface properties such as fractional impervious surface area, are used to estimate the available water resource. Four management conditions are imposed in the model: gravitational flow, open water extraction and high water use investment at upstream and downstream respectively. According to the model, the first management maintains the basin status quo while the open source management could induce externality. The high water market at the upstream in the third management offers more than 50% of the basin-wide total revenue to the upper third section of the basin thus may promote more harvesting. The open source and upstream exploitation suggest potential drop of water availability to downstream. The model exposed the latent potential of economic gradient to reconfigure the flow network along the direction where the

  16. A METHOD AND AN APPARATUS FOR ANALYZING A STATE BASED SYSTEM MODEL

    DEFF Research Database (Denmark)

    1999-01-01

    The invention relates to a method of analyzing a state based system model comprising a set of machines (M1, .., Mn), said machines each comprising at least one possible state (pS1Mi, .., pSkMi), each machine being in one of its comprised states at any given time, the dynamic behavior of said...... machines (M1, .., Mn) being defined by predefined transitions between said states of each machine (M1, .., Mn) and dependencies (D) between said machines (M1, .., Mn). One of many important advantages of the invention is that many analyses of real-life state based system models can be performed without...... evaluation of a considerable amount of machines in the system model....

  17. Operation of Vehicles in AGV System and Method for Analyzing the Operation

    Science.gov (United States)

    Hoshino, Takahiro; Tsuboi, Kazuhiro; Yamanaka, Kazuo; Hamamatsu, Yoshio

    It is important to discuss the behavior of traffic at merging sections for the design and realization of an automated guided vehicle system (AGVS). In this study, we deal with a merging section of the AGVS by considering a time limit for the merging of vehicles. Near the merging section, traffic flowing in one direction must form a queue to avoid collisions between vehicles. We propose an improvement in the control strategy proposed in the previous research. However, it is difficult to analyze the mathematical model of the merging section. Analysis can be performed only for the case in which the time limit is one unit. We also propose a method for analyzing the model for an arbitrary time limit using a linear recurrence relation. We quantitatively discuss the influence of the time limit on the average queue length and the detour rate.

  18. The use and significance of a research networking system.

    Science.gov (United States)

    Kahlon, Maninder; Yuan, Leslie; Daigre, John; Meeks, Eric; Nelson, Katie; Piontkowski, Cynthia; Reuter, Katja; Sak, Rachael; Turner, Brian; Weber, Griffin M; Chatterjee, Anirvan

    2014-02-07

    Universities have begun deploying public Internet systems that allow for easy search of their experts, expertise, and intellectual networks. Deployed first in biomedical schools but now being implemented more broadly, the initial motivator of these research networking systems was to enable easier identification of collaborators and enable the development of teams for research. The intent of the study was to provide the first description of the usage of an institutional research "social networking" system or research networking system (RNS). Number of visits, visitor location and type, referral source, depth of visit, search terms, and click paths were derived from 2.5 years of Web analytics data. Feedback from a pop-up survey presented to users over 15 months was summarized. RNSs automatically generate and display profiles and networks of researchers. Within 2.5 years, the RNS at the University of California, San Francisco (UCSF) achieved one-seventh of the monthly visit rate of the main longstanding university website, with an increasing trend. Visitors came from diverse locations beyond the institution. Close to 75% (74.78%, 208,304/278,570) came via a public search engine and 84.0% (210 out of a sample of 250) of these queried an individual's name that took them directly to the relevant profile page. In addition, 20.90% (214 of 1024) visits went beyond the page related to a person of interest to explore related researchers and topics through the novel and networked information provided by the tool. At the end of the period analyzed, more than 2000 visits per month traversed 5 or more links into related people and topics. One-third of visits came from returning visitors who were significantly more likely to continue to explore networked people and topics (P<.001). Responses to an online survey suggest a broad range of benefits of using the RNS in supporting the research and clinical mission. Returning visitors in an ever-increasing pool of visitors to an RNS are

  19. Advanced systems engineering and network planning support

    Science.gov (United States)

    Walters, David H.; Barrett, Larry K.; Boyd, Ronald; Bazaj, Suresh; Mitchell, Lionel; Brosi, Fred

    1990-01-01

    The objective of this task was to take a fresh look at the NASA Space Network Control (SNC) element for the Advanced Tracking and Data Relay Satellite System (ATDRSS) such that it can be made more efficient and responsive to the user by introducing new concepts and technologies appropriate for the 1997 timeframe. In particular, it was desired to investigate the technologies and concepts employed in similar systems that may be applicable to the SNC. The recommendations resulting from this study include resource partitioning, on-line access to subsets of the SN schedule, fluid scheduling, increased use of demand access on the MA service, automating Inter-System Control functions using monitor by exception, increase automation for distributed data management and distributed work management, viewing SN operational control in terms of the OSI Management framework, and the introduction of automated interface management.

  20. Analyzing Architecture Patterns for Enterprise-level, multi-mission Data Systems

    Science.gov (United States)

    Pfister, R.; Burnett, M.

    2008-12-01

    There are a number of agencies and institutions who, as part of their business processes, store and manage large amounts of science-related data resources. These organizations are challenged with collecting, processing, archiving, providing access to, and distributing that data. The Data Systems are tuned to meet their organization's responsibilities and work within the policies and governance mechanisms of those organizations. While serving different kinds of data, and targeting different user communities and supporting different business processes, these systems are all facing similar problems. This paper presents an approach for the analysis of the underlying architectures of these Data Systems. This approach is based on the development of a common way to describe the drivers, influences and characteristics of enterprise-level data systems. With the establishment of a common language for describing this pattern, we propose a survey where information describing these myriad solutions can be captured and analyzed. With this analysis, the community can identify common trends in enterprise-level architectures for science Data Systems, identify the strengths and weaknesses of alternatives, and establish a platform for the analysis of alternative architectures for future Data Systems.

  1. Development of an ion beam analyzing system for the KBSI heavy-ion accelerator

    Energy Technology Data Exchange (ETDEWEB)

    Bahng, Jungbae [Department of Physics, Kyungpook National University, Daegu 41566 (Korea, Republic of); Busan Center, Korea Basic Science Institute, Busan 46241 (Korea, Republic of); Hong, Jonggi; Park, Jin Yong; Kim, Seong Jun; Ok, Jung-Woo; Choi, Seyong; Shin, Chang Seouk; Yoon, Jang-Hee; Won, Mi-Sook; Lee, Byoung-Seob, E-mail: bslee@kbsi.re.kr [Busan Center, Korea Basic Science Institute, Busan 46241 (Korea, Republic of); Kim, Eun-San, E-mail: eskim1@korea.ac.kr [Department of Accelerator Science, Korea University Sejong Campus, Sejong 339-770 (Korea, Republic of)

    2016-02-15

    The Korea Basic Science Institute (KBSI) has been developing a heavy ion accelerator system to accelerate high current, multi-charge state ions produced by a 28 GHz superconducting electron cyclotron ion source. A beam analyzing system as a part of the low energy beam transport apparatus was developed to select charged particles with desirable charge states from the ion beams. The desired species of ion, which is generated and extracted from the ECR ion source including various ion particles, can be selected by 90° dipole electromagnet. Due to the non-symmetrical structure in the coil as well as the non-linear permeability of the yoke material coil, a three dimensional analysis was carried out to confirm the design parameters. In this paper, we present the experimental results obtained as result of an analysis of KBSI accelerator. The effectiveness of beam selection was confirmed during the test of the analyzing system by injecting an ion beam from an ECR ion source.

  2. Simulation model to analyze the scatter radiation effects on breast cancer diagnosis by CAD system

    Science.gov (United States)

    Irita, Ricardo T.; Frere, Annie F.; Fujita, Hiroshi

    2002-05-01

    One of factors that more affect the radiographic image quality is the scatter radiation produced by interaction between the x-ray and the radiographed object. Recently the Computer Aided Diagnosis (CAD) Systems are coming to aid the detection of breast small details. Nevertheless, we not sure how much the scatter radiation decrease the efficiency of this systems. This work presents a model in order to quantify the scatter radiation and find it relation between CAD's results used for the microcalcification detection. We simulated scatter photons that reaches the film and we added it to the mammography image. The new images were processed and the alterations of the CAD's results were analyzed. The information loss to breast composed by 80 percent adipose tissue was 0,0561 per each centimeter increased in the breast's thickness. We calculated these same data considering a proportion variation of adipose tissue and considering the breast composition of 90 percent and 70 percent the loss it would be of 0.0504 and 0.07559 per increased cm, respectively. We can increase the wanted scattered radiation to any image with its own characteristics and analyze the disturbances that it can bring to the visual inspection or the automatic detection (CAD system) efficiently.

  3. Control and Optimization of Network in Networked Control System

    Directory of Open Access Journals (Sweden)

    Wang Zhiwen

    2014-01-01

    Full Text Available In order to avoid quality of performance (QoP degradation resulting from quality of service (QoS, the solution to network congestion from the point of control theory, which marks departure of our results from the existing methods, is proposed in this paper. The congestion and bandwidth are regarded as state and control variables, respectively; then, the linear time-invariant (LTI model between congestion state and bandwidth of network is established. Consequently, linear quadratic method is used to eliminate the network congestion by allocating bandwidth dynamically. At last, numerical simulation results are given to illustrate the effectiveness of this modeling approach.

  4. Different approaches to analyze the dipolar interaction effects on diluted and concentrated granular superparamagnetic systems

    Energy Technology Data Exchange (ETDEWEB)

    Moscoso-Londoño, O., E-mail: omoscoso@ifi.unicamp.br [Instituto de Física ‘Gleb Wataghin’, Universidade Estadual de Campinas (UNICAMP), CEP13083-859 Campinas, São Paulo (Brazil); Tancredi, P. [Laboratorio de Sólidos Amorfos, INTECIN, Facultad de Ingeniería, Universidad de Buenos Aires (UBA), CONICET, C1063ACV Buenos Aires (Argentina); Muraca, D. [Instituto de Física ‘Gleb Wataghin’, Universidade Estadual de Campinas (UNICAMP), CEP13083-859 Campinas, São Paulo (Brazil); Centro de Ciencias Naturais e Humanas, Universidade Federal do ABC (UFABC), Av. Dos Estados, 5001, Santo André, SP (Brazil); Mendoza Zélis, P.; Coral, D.; Fernández van Raap, M.B. [Instituto de Física, Universidad Nacional de La Plata (UNLP), CONICET, CC.67, 1900 La Plata, Buenos Aires (Argentina); Wolff, U.; Neu, V.; Damm, C. [IFW Dresden, Leibniz Institute for Solid State and Materials Research, Dresden, Helmholtzstrasse 20, 01069 Dresden (Germany); Oliveira, C.L.P. de [Instituto de Física, Universidade de São Paulo, São Paulo 05314970 (Brazil); Pirota, K.R. [Instituto de Física ‘Gleb Wataghin’, Universidade Estadual de Campinas (UNICAMP), CEP13083-859 Campinas, São Paulo (Brazil); and others

    2017-04-15

    Controlled magnetic granular materials with different concentrations of magnetite nanoparticles immersed in a non-conducting polymer matrix were synthesized and, their macroscopic magnetic observables analyzed in order to advance towards a better understanding of the magnetic dipolar interactions and its effects on the obtained magnetic parameters. First, by means of X-ray diffraction, transmission electron microscopy, small angle X-ray scattering and X-ray absorption fine structure an accurate study of the structural properties was carried out. Then, the magnetic properties were analyzed by means of different models, including those that consider the magnetic interactions through long-range dipolar forces as: the Interacting Superparamagnetic Model (ISP) and the Vogel-Fulcher law (V-F). In systems with larger nanoparticle concentrations, magnetic results clearly indicate that the role played by the dipolar interactions affects the magnetic properties, giving rise to obtaining magnetic and structural parameters without physical meaning. Magnetic parameters as the effective anisotropic constant, magnetic moment relaxation time and mean blocking temperature, extracted from the application of the ISP model and V-F Law, were used to simulate the zero-field-cooling (ZFC) and field-cooling curves (FC). A comparative analysis of the simulated, fitted and experimental ZFC/FC curves suggests that the current models depict indeed our dilute granular systems. Notwithstanding, for concentrated samples, the ISP model infers that clustered nanoparticles are being interpreted as single entities of larger magnetic moment and volume, effect that is apparently related to a collective and complex magnetic moment dynamics within the cluster. - Highlights: • Nanoparticle architecture into matrices determines the composite magnetic response. • Magnetically diluted or compacted systems are useful to study magnetism at nanoscale. • Particle aggregation into the matrices was examined

  5. Industrial applications of formal methods to model, design and analyze computer systems

    CERN Document Server

    Craigen, Dan

    1995-01-01

    Formal methods are mathematically-based techniques, often supported by reasoning tools, that can offer a rigorous and effective way to model, design and analyze computer systems. The purpose of this study is to evaluate international industrial experience in using formal methods. The cases selected are representative of industrial-grade projects and span a variety of application domains. The study had three main objectives: · To better inform deliberations within industry and government on standards and regulations; · To provide an authoritative record on the practical experience of formal m

  6. Magnetostatics and dynamics of ion irradiatied NiFe/Ta multilayer films studied by vector network analyzer ferromagnetic resonance

    Energy Technology Data Exchange (ETDEWEB)

    Marko, Daniel

    2010-11-25

    In the present work, the implications of ion irradiation on the magnetostatic and dynamic properties of soft magnetic Py/Ta (Py=Permalloy: Ni{sub 80}Fe{sub 20}) single and multilayer films have been investigated with the main objective of finding a way to determine their saturation magnetization. Both polar magneto-optical Kerr effect (MOKE) and vector network analyzer ferromagnetic resonance (VNA-FMR) measurements have proven to be suitable methods to determine {mu}{sub 0}M{sub S}, circumventing the problem of the unknown effective magnetic volume that causes conventional techniques such as SQUID or VSM to fail. Provided there is no perpendicular anisotropy contribution in the samples, the saturation magnetization can be determined even in the case of strong interfacial mixing due to an inherently high number of Py/Ta interfaces and/or ion irradiation with high fluences. Another integral part of this work has been to construct a VNA-FMR spectrometer capable of performing both azimuthal and polar angle-dependent measurements using a magnet strong enough to saturate samples containing iron. Starting from scratch, this comprised numerous steps such as developing a suitable coplanar waveguide design, and writing the control, evaluation, and fitting software. With both increasing ion fluence and number of Py/Ta interfaces, a decrease of saturation magnetization has been observed. In the case of the 10 x Py samples, an immediate decrease of {mu}{sub 0}M{sub S} already sets in at small ion fluences. However, for the 1 x Py and 5 x Py samples, the saturation magnetization remains constant up to a certain ion fluence, but then starts to rapidly decrease. Ne ion irradiation causes a mixing and broadening of the interfaces. Thus, the Py/Ta stacks undergo a transition from being polycrystalline to amorphous at a critical fluence depending on the number of interfaces. The saturation magnetization is found to vanish at a Ta concentration of about 10-15 at.% in the Py layers

  7. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  8. Analyzing the role of social networks in mapping knowledge flows: A case of a pharmaceutical company in India

    Directory of Open Access Journals (Sweden)

    V. Murale

    2014-03-01

    Full Text Available Knowledge Management literature lays emphasis on the fact that a major chunk of knowledge dissemination occurs through the various forms of social networks that exist within the organizations. A social network is a simple structure comprising of set of actors or nodes that may have relationships ties with one another. The social network analysis (SNA will help in mapping and measuring formal and informal relationships to understand what facilitates or impedes the knowledge flows that bind interacting units. This paper aims at studying the knowledge flows that happen through the social networks. It first, provides a conceptual framework and review of literature on the recent research and application of knowledge mapping and SNA, followed by a discussion on application of SNA for mapping knowledge flows in a pharmaceutical firm. In the last part, Knowledge maps are presented to illustrate the actual knowledge flow in firm.

  9. AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Yadav

    2013-09-01

    Full Text Available Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is performed to identify insecure entry points in the network components. To find out vulnerabilities on these points vulnerability assessment is performed. So security checking consists of both activities- network scanning as well as vulnerability assessment. A single tool used for the security checking may not give reliable results. This paper presents a framework for assessing the security of a network using multiple Network Scanning and Vulnerability Assessment tools. The proposed framework is an extension of the framework given by Jun Yoon and Wontae Sim [1] which performs vulnerability scanning only. The framework presented here adds network scanning, alerting and reporting system to their framework. Network scanning and vulnerability tools together complement each other and make it amenable for centralized control and management. The reporting system of framework sends an email to the network administrator which contains detailed report (as attachment of security checking process. Alerting system sends a SMS message as an alert to the network administrator in case of severe threats found in the network. Initial results of the framework are encouraging and further work is in progress.

  10. Voice preprocessing system incorporating a real-time spectrum analyzer with programmable switched-capacitor filters

    Science.gov (United States)

    Knapp, G.

    1984-01-01

    As part of a speaker verification program for BISS (Base Installation Security System), a test system is being designed with a flexible preprocessing system for the evaluation of voice spectrum/verification algorithm related problems. The main part of this report covers the design, construction, and testing of a voice analyzer with 16 integrating real-time frequency channels ranging from 300 Hz to 3 KHz. The bandpass filter response of each channel is programmable by NMOS switched capacitor quad filter arrays. Presently, the accuracy of these units is limited to a moderate precision by the finite steps of programming. However, repeatability of characteristics between filter units and sections seems to be excellent for the implemented fourth-order Butterworth bandpass responses. We obtained a 0.1 dB linearity error of signal detection and measured a signal-to-noise ratio of approximately 70 dB. The proprocessing system discussed includes preemphasis filter design, gain normalizer design, and data acquisition system design as well as test results.

  11. [Development of a computerized three-dimension system for displaying and analyzing mandibular helical axis pathways].

    Science.gov (United States)

    Chen, Li; Zhang, Hao; Feng, Hailan; Zhang, Fengjun

    2014-12-01

    This paper is aimed to develop a computerized three dimensional system for displaying and analyzing mandibular helical axis pathways. Mandibular movements were recorded using a six-degrees-of-freedom ultrasonic jaw movement recording device. The three-dimensional digital models of the midface and the mandible were reconstructed and segmented from CT skull images. The digital models were then transformed to the coordinate system of mandibular motion data by using an optical measuring system. The system was programmed on the base of the Visualization ToolKit and Open Scene Graphics Library. According to the motion data, transformation matrices were calculated to simulate mandibular movements. Meanwhile, mandibular helical axis pathways were calculated and displayed three dimensionally by means of an eigenvalues method. The following parameters of mandibular helical axis were calculated: the rotation around instantaneous helical axis, the translation along it, its spatial orientation, its position and distance relative to any special reference point. These parameters could be exported to describe comprehensively the whole mandiblular movements. It could be concluded that our system would contribute to the study of mandiblular helical axis pathways.

  12. Introducing network Gramians to undirected network systems for structure-preserving model reduction

    NARCIS (Netherlands)

    Cheng, Xiaodong; Scherpen, Jacquelien M.A.

    2016-01-01

    In this paper, we propose the notion of controllability Gramian for linear network systems. In contrast to the conventional Gramians defined for asymptotically stable systems, the new Gramian is generalized to semi-stable systems and can be computed for network systems with imaginary axis poles. We

  13. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  14. A network-based dynamical ranking system for competitive sports

    National Research Council Canada - National Science Library

    Motegi, Shun; Masuda, Naoki

    2012-01-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game...

  15. An economical method of analyzing transient motion of gas-lubricated rotor-bearing systems.

    Science.gov (United States)

    Falkenhagen, G. L.; Ayers, A. L.; Barsalou, L. C.

    1973-01-01

    A method of economically evaluating the hydrodynamic forces generated in a gas-lubricated tilting-pad bearing is presented. The numerical method consists of solving the case of the infinite width bearing and then converting this solution to the case of the finite bearing by accounting for end leakage. The approximate method is compared to the finite-difference solution of Reynolds equation and yields acceptable accuracy while running about one-hundred times faster. A mathematical model of a gas-lubricated tilting-pad vertical rotor systems is developed. The model is capable of analyzing a two-bearing-rotor system in which the rotor center of mass is not at midspan by accounting for gyroscopic moments. The numerical results from the model are compared to actual test data as well as analytical results of other investigators.

  16. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  17. Analyzing and Comparing Biomass Feedstock Supply Systems in China: Corn Stover and Sweet Sorghum Case Studies

    Directory of Open Access Journals (Sweden)

    Lantian Ren

    2015-06-01

    Full Text Available This paper analyzes the rural Chinese biomass supply system and models supply chain operations according to U.S. concepts of logistical unit operations: harvest and collection, storage, transportation, preprocessing, and handling and queuing. In this paper, we quantify the logistics cost of corn stover and sweet sorghum in China under different scenarios. We analyze three scenarios of corn stover logistics from northeast China and three scenarios of sweet sorghum stalks logistics from Inner Mongolia in China. The case study estimates that the logistics cost of corn stover and sweet sorghum stalk to be $52.95/dry metric ton and $52.64/dry metric ton, respectively, for the current labor-based biomass logistics system. However, if the feedstock logistics operation is mechanized, the cost of corn stover and sweet sorghum stalk decreases to $36.01/dry metric ton and $35.76/dry metric ton, respectively. The study also includes a sensitivity analysis to identify the cost factors that cause logistics cost variation. Results of the sensitivity analysis show that labor price has the most influence on the logistics cost of corn stover and sweet sorghum stalk, with a variation of $6 to $12/dry metric ton.

  18. Development of an automated in situ analyzer based on ferrozine colorimetry and flow injection analysis to analyze iron in freshwater systems

    Science.gov (United States)

    Cooray, A. T.; Schwingle, R.; Pullin, M. J.

    2011-12-01

    Iron is a common element in the earth crust and also a highly redox active metal in aqueous environments. The chemistry of aqueous iron predominantly involves the common oxidation states of iron, Fe(II) and Fe(III) and their biogeochemical reactions in the oceans, freshwaters, sediments and pore waters. Iron(III) is the thermodynamically stable form of iron in oxic and circumneutral natural waters; however, rapidly hydrolyzes and precipitates and become biologically unavailable. Iron(II) is more soluble and available for many microbial iron uptake strategies but rapidly oxidizes in oxic waters with a half-life in the order of minutes around pH 8. The often rapid interconversion of iron redox states makes in situ analysis preferable. Here we describe the development of an automated in situ iron analyzer based on ferrozine colorimetry and flow injection analysis (FIA) to analyze iron in freshwater systems. Ferrozine selectively reacts with iron(II) in the pH range 4 to 9 to produce a magenta colored 3:1 complex with a maximum absorption at 562 nm. Ferrozine does not react with iron(III) or any of its hydrolytic products. However, total iron determinations can be achieved use reducing agents such as ascorbic acid to reduce iron(III) to iron(II). Ferrozine colorimetry has been used successfully to develop automated iron sensors for marine systems and freshwater systems. Unlike luminol-based chemiluminescence methods, the ferrozine method is not sensitive to the amount of dissolved organic matter present in system or the temperature variations during the analysis. The instrument uses microscale tubing and fittings together with solenoid-based pumps and valves for flow control. Optical detection of the iron(II)-ferrozine complex uses a LED lamp with maximum emission at 560 nm and digital light sensor to avoid the use of complex optics. The instrument analyzes iron(II) and total iron in alternation, with a frequency of 4 minutes.

  19. Analyzer-based phase-contrast imaging system using a micro focus x-ray source

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Wei [BME Department, Illinois Institute of Technology, Chicago, Illinois 60616 (United States); Majidi, Keivan; Brankov, Jovan G., E-mail: brankov@iit.edu [ECE Department, Illinois Institute of Technology, Chicago, Illinois 60616 (United States)

    2014-08-15

    Here we describe a new in-laboratory analyzer based phase contrast-imaging (ABI) instrument using a conventional X-ray tube source (CXS) aimed at bio-medical imaging applications. Phase contrast-imaging allows visualization of soft tissue details usually obscured in conventional X-ray imaging. The ABI system design and major features are described in detail. The key advantage of the presented system, over the few existing CXS ABI systems, is that it does not require high precision components, i.e., CXS, X-ray detector, and electro-mechanical components. To overcome a main problem introduced by these components, identified as temperature stability, the system components are kept at a constant temperature inside of three enclosures, thus minimizing the electrical and mechanical thermal drifts. This is achieved by using thermoelectric (Peltier) cooling/heating modules that are easy to control precisely. For CXS we utilized a microfocus X-ray source with tungsten (W) anode material. In addition the proposed system eliminates tungsten's multiple spectral lines by selecting monochromator crystal size appropriately therefore eliminating need for the costly mismatched, two-crystal monochromator. The system imaging was fine-tuned for tungsten Kα{sub 1} line with the energy of 59.3 keV since it has been shown to be of great clinical significance by a number of researchers at synchrotron facilities. In this way a laboratory system that can be used for evaluating and quantifying tissue properties, initially explored at synchrotron facilities, would be of great interest to a larger research community. To demonstrate the imaging capability of our instrument we use a chicken thigh tissue sample.

  20. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  1. The analysis of thermal network of district heating system from investor point of view

    Science.gov (United States)

    Takács, Ján; Rácz, Lukáš

    2016-06-01

    The hydraulics of a thermal network of a district heating system is a very important issue, to which not enough attention is often paid. In this paper the authors want to point out some of the important aspects of the design and operation of thermal networks in district heating systems. The design boundary conditions of a heat distribution network and the requirements on active pressure - circulation pump - influencing the operation costs of the centralized district heating system as a whole, are analyzed in detail. The heat generators and the heat exchange stations are designed according to the design heat loads after thermal insulation, and modern boiler units are installed in the heating plant.

  2. Construction of Network Management Information System of Agricultural Products Supply Chain Based on 3PLs

    OpenAIRE

    Gao, Shujin; Yang, Qiangxian

    2010-01-01

    The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed, showing that 3PLs can improve the overall competitive advantage of agricultural supply chain. 3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain. Network management information system structure of agricultural products supply chain based on 3PL...

  3. An artificial immune system algorithm approach for reconfiguring distribution network

    Science.gov (United States)

    Syahputra, Ramadoni; Soesanti, Indah

    2017-08-01

    This paper proposes an artificial immune system (AIS) algorithm approach for reconfiguring distribution network with the presence distributed generators (DG). The distribution network with high-performance is a network that has a low power loss, better voltage profile, and loading balance among feeders. The task for improving the performance of the distribution network is optimization of network configuration. The optimization has become a necessary study with the presence of DG in entire networks. In this work, optimization of network configuration is based on an AIS algorithm. The methodology has been tested in a model of 33 bus IEEE radial distribution networks with and without DG integration. The results have been showed that the optimal configuration of the distribution network is able to reduce power loss and to improve the voltage profile of the distribution network significantly.

  4. Modeling and Analyzing Adaptive User-Centric Systems in Real-Time Maude

    Directory of Open Access Journals (Sweden)

    Andreas Schroeder

    2010-09-01

    Full Text Available Pervasive user-centric applications are systems which are meant to sense the presence, mood, and intentions of users in order to optimize user comfort and performance. Building such applications requires not only state-of-the art techniques from artificial intelligence but also sound software engineering methods for facilitating modular design, runtime adaptation and verification of critical system requirements. In this paper we focus on high-level design and analysis, and use the algebraic rewriting language Real-Time Maude for specifying applications in a real-time setting. We propose a generic component-based approach for modeling pervasive user-centric systems and we show how to analyze and prove crucial properties of the system architecture through model checking and simulation. For proving time-dependent properties we use Metric Temporal Logic (MTL and present analysis algorithms for model checking two subclasses of MTL formulas: time-bounded response and time-bounded safety MTL formulas. The underlying idea is to extend the Real-Time Maude model with suitable clocks, to transform the MTL formulas into LTL formulas over the extended specification, and then to use the LTL model checker of Maude. It is shown that these analyses are sound and complete for maximal time sampling. The approach is illustrated by a simple adaptive advertising scenario in which an adaptive advertisement display can react to actions of the users in front of the display.

  5. Analyzing Collaborative Governance Through Social Network Analysis: A Case Study of River Management Along the Waal River in The Netherlands

    Science.gov (United States)

    Fliervoet, J. M.; Geerling, G. W.; Mostert, E.; Smits, A. J. M.

    2016-02-01

    Until recently, governmental organizations played a dominant and decisive role in natural resource management. However, an increasing number of studies indicate that this dominant role is developing towards a more facilitating role as equal partner to improve efficiency and create a leaner state. This approach is characterized by complex collaborative relationships between various actors and sectors on multiple levels. To understand this complexity in the field of environmental management, we conducted a social network analysis of floodplain management in the Dutch Rhine delta. We charted the current interorganizational relationships between 43 organizations involved in flood protection (blue network) and nature management (green network) and explored the consequences of abolishing the central actor in these networks. The discontinuation of this actor will decrease the connectedness of actors within the blue and green network and may therefore have a large impact on the exchange of ideas and decision-making processes. Furthermore, our research shows the dependence of non-governmental actors on the main governmental organizations. It seems that the Dutch governmental organizations still have a dominant and controlling role in floodplain management. This challenges the alleged shift from a dominant government towards collaborative governance and calls for detailed analysis of actual governance.

  6. The Use and Significance of a Research Networking System

    Science.gov (United States)

    Yuan, Leslie; Daigre, John; Meeks, Eric; Nelson, Katie; Piontkowski, Cynthia; Reuter, Katja; Sak, Rachael; Turner, Brian; Weber, Griffin M; Chatterjee, Anirvan

    2014-01-01

    Background Universities have begun deploying public Internet systems that allow for easy search of their experts, expertise, and intellectual networks. Deployed first in biomedical schools but now being implemented more broadly, the initial motivator of these research networking systems was to enable easier identification of collaborators and enable the development of teams for research. Objective The intent of the study was to provide the first description of the usage of an institutional research “social networking” system or research networking system (RNS). Methods Number of visits, visitor location and type, referral source, depth of visit, search terms, and click paths were derived from 2.5 years of Web analytics data. Feedback from a pop-up survey presented to users over 15 months was summarized. Results RNSs automatically generate and display profiles and networks of researchers. Within 2.5 years, the RNS at the University of California, San Francisco (UCSF) achieved one-seventh of the monthly visit rate of the main longstanding university website, with an increasing trend. Visitors came from diverse locations beyond the institution. Close to 75% (74.78%, 208,304/278,570) came via a public search engine and 84.0% (210 out of a sample of 250) of these queried an individual’s name that took them directly to the relevant profile page. In addition, 20.90% (214 of 1024) visits went beyond the page related to a person of interest to explore related researchers and topics through the novel and networked information provided by the tool. At the end of the period analyzed, more than 2000 visits per month traversed 5 or more links into related people and topics. One-third of visits came from returning visitors who were significantly more likely to continue to explore networked people and topics (P<.001). Responses to an online survey suggest a broad range of benefits of using the RNS in supporting the research and clinical mission. Conclusions Returning

  7. Network versus portfolio structure in financial systems

    Science.gov (United States)

    Kobayashi, Teruyoshi

    2013-10-01

    The question of how to stabilize financial systems has attracted considerable attention since the global financial crisis of 2007-2009. Recently, Beale et al. [Proc. Natl. Acad. Sci. USA 108, 12647 (2011)] demonstrated that higher portfolio diversity among banks would reduce systemic risk by decreasing the risk of simultaneous defaults at the expense of a higher likelihood of individual defaults. In practice, however, a bank default has an externality in that it undermines other banks’ balance sheets. This paper explores how each of these different sources of risk, simultaneity risk and externality, contributes to systemic risk. The results show that the allocation of external assets that minimizes systemic risk varies with the topology of the financial network as long as asset returns have negative correlations. In the model, a well-known centrality measure, PageRank, reflects an appropriately defined “infectiveness” of a bank. An important result is that the most infective bank needs not always to be the safest bank. Under certain circumstances, the most infective node should act as a firewall to prevent large-scale collective defaults. The introduction of a counteractive portfolio structure will significantly reduce systemic risk.

  8. Artificial Neural Network System for Thyroid Diagnosis

    Directory of Open Access Journals (Sweden)

    Mazin Abdulrasool Hameed

    2017-05-01

    Full Text Available Thyroid disease is one of major causes of severe medical problems for human beings. Therefore, proper diagnosis of thyroid disease is considered as an important issue to determine treatment for patients. This paper focuses on using Artificial Neural Network (ANN as a significant technique of artificial intelligence to diagnose thyroid diseases. The continuous values of three laboratory blood tests are used as input signals to the proposed system of ANN. All types of thyroid diseases that may occur in patients are taken into account in design of system, as well as the high accuracy of the detection and categorization of thyroid diseases are considered in the system. A multilayer feedforward architecture of ANN is adopted in the proposed design, and the back propagation is selected as learning algorithm to accomplish the training process. The result of this research shows that the proposed ANN system is able to precisely diagnose thyroid disease, and can be exploited in practical uses. The system is simulated via MATLAB software to evaluate its performance

  9. Neural network system for traffic flow management

    Science.gov (United States)

    Gilmore, John F.; Elibiary, Khalid J.; Petersson, L. E. Rickard

    1992-09-01

    Atlanta will be the home of several special events during the next five years ranging from the 1996 Olympics to the 1994 Super Bowl. When combined with the existing special events (Braves, Falcons, and Hawks games, concerts, festivals, etc.), the need to effectively manage traffic flow from surface streets to interstate highways is apparent. This paper describes a system for traffic event response and management for intelligent navigation utilizing signals (TERMINUS) developed at Georgia Tech for adaptively managing special event traffic flows in the Atlanta, Georgia area. TERMINUS (the original name given Atlanta, Georgia based upon its role as a rail line terminating center) is an intelligent surface street signal control system designed to manage traffic flow in Metro Atlanta. The system consists of three components. The first is a traffic simulation of the downtown Atlanta area around Fulton County Stadium that models the flow of traffic when a stadium event lets out. Parameters for the surrounding area include modeling for events during various times of day (such as rush hour). The second component is a computer graphics interface with the simulation that shows the traffic flows achieved based upon intelligent control system execution. The final component is the intelligent control system that manages surface street light signals based upon feedback from control sensors that dynamically adapt the intelligent controller's decision making process. The intelligent controller is a neural network model that allows TERMINUS to control the configuration of surface street signals to optimize the flow of traffic away from special events.

  10. Optical multichannel analyzer constructed with 4400 system for glass surface and thin film measurement

    Science.gov (United States)

    Gu, Zhengtian; Ye, Ren; Wang, Zhenyuan; Liang, Peihui

    2007-12-01

    A new scheme of optical multichannel analyzer is developed based on Model 4400 Signal Detection and Analysis System. The scheme consists of an optical signal source, a photodiode array and Model 4400 Signal Detection and Analysis System. The signal source provides varies light intensity distribution from optical system. The photodiode array transforms spatial distribution of light intensity into time dependence of electric current intensity. Model 4400 Signal Detection and Analysis System carries out signal processing and analysis through boxcar, keyboard control and advanced microprocessor. With this scheme, the spatial distribution of laser light-intensity was described and the relevant parameters such as beam waist radius of Gaussian distribution were obtained. Further, the optical parameters of the plane glass surface and PMTES thin films were obtained by p-polarized reflectance method. By measuring the angle distribution of reflectance ratio and fitting the results with theoretical data, the optical parameters can be obtained easily. Experimental results indicate that the refractive index and extinction coefficient of glass surface layers decrease exponentially with the thickness of glass layer. Also the optical parameters of PMTES films with the presented scheme have been measured, and the experimental results coincide well with theoretical simulation only if the glass surface layers are considered. Due to the introduction of digital averaging technique in 4400 System, the sampling signals with higher signal-to-noise ratio are acquired, and the presented scheme has higher measurement precision, which is very suitable to temporal-spatial transform and analysis of optical field and precise measurement of surface and film system.

  11. Model Based Reasoning by Introductory Students When Analyzing Earth Systems and Societal Challenges

    Science.gov (United States)

    Holder, L. N.; Herbert, B. E.

    2014-12-01

    Understanding how students use their conceptual models to reason about societal challenges involving societal issues such as natural hazard risk assessment, environmental policy and management, and energy resources can improve instructional activity design that directly impacts student motivation and literacy. To address this question, we created four laboratory exercises for an introductory physical geology course at Texas A&M University that engages students in authentic scientific practices by using real world problems and issues that affect societies based on the theory of situated cognition. Our case-study design allows us to investigate the various ways that students utilize model based reasoning to identify and propose solutions to societally relevant issues. In each of the four interventions, approximately 60 students in three sections of introductory physical geology were expected to represent and evaluate scientific data, make evidence-based claims about the data trends, use those claims to express conceptual models, and use their models to analyze societal challenges. Throughout each step of the laboratory exercise students were asked to justify their claims, models, and data representations using evidence and through the use of argumentation with peers. Cognitive apprenticeship was the foundation for instruction used to scaffold students so that in the first exercise they are given a partially completed model and in the last exercise students are asked to generate a conceptual model on their own. Student artifacts, including representation of earth systems, representation of scientific data, verbal and written explanations of models and scientific arguments, and written solutions to specific societal issues or environmental problems surrounding earth systems, were analyzed through the use of a rubric that modeled authentic expertise and students were sorted into three categories. Written artifacts were examined to identify student argumentation and

  12. Transformation of legacy network management system to service oriented architecture

    Science.gov (United States)

    Sathyan, Jithesh; Shenoy, Krishnananda

    2007-09-01

    Service providers today are facing the challenge of operating and maintaining multiple networks, based on multiple technologies. Network Management System (NMS) solutions are being used to manage these networks. However the NMS is tightly coupled with Element or the Core network components. Hence there are multiple NMS solutions for heterogeneous networks. Current network management solutions are targeted at a variety of independent networks. The wide spread popularity of IP Multimedia Subsystem (IMS) is a clear indication that all of these independent networks will be integrated into a single IP-based infrastructure referred to as Next Generation Networks (NGN) in the near future. The services, network architectures and traffic pattern in NGN will dramatically differ from the current networks. The heterogeneity and complexity in NGN including concepts like Fixed Mobile Convergence will bring a number of challenges to network management. The high degree of complexity accompanying the network element technology necessitates network management systems (NMS) which can utilize this technology to provide more service interfaces while hiding the inherent complexity. As operators begin to add new networks and expand existing networks to support new technologies and products, the necessity of scalable, flexible and functionally rich NMS systems arises. Another important factor influencing NMS architecture is mergers and acquisitions among the key vendors. Ease of integration is a key impediment in the traditional hierarchical NMS architecture. These requirements trigger the need for an architectural framework that will address the NGNM (Next Generation Network Management) issues seamlessly. This paper presents a unique perspective of bringing service orientated architecture (SOA) to legacy network management systems (NMS). It advocates a staged approach in transforming a legacy NMS to SOA. The architecture at each stage is detailed along with the technical advantages and

  13. The Social Process of Analyzing Real Water Resource Systems Plans and Management Policies

    Science.gov (United States)

    Loucks, Daniel

    2016-04-01

    Developing and applying systems analysis methods for improving the development and management of real world water resource systems, I have learned, is primarily a social process. This talk is a call for more recognition of this reality in the modeling approaches we propose in the papers and books we publish. The mathematical models designed to inform planners and managers of water systems that we see in many of our journals often seem more complex than they need be. They also often seem not as connected to reality as they could be. While it may be easier to publish descriptions of complex models than simpler ones, and while adding complexity to models might make them better able to mimic or resemble the actual complexity of the real physical and/or social systems or processes being analyzed, the usefulness of such models often can be an illusion. Sometimes the important features of reality that are of concern or interest to those who make decisions can be adequately captured using relatively simple models. Finding the right balance for the particular issues being addressed or the particular decisions that need to be made is an art. When applied to real world problems or issues in specific basins or regions, systems modeling projects often involve more attention to the social aspects than the mathematical ones. Mathematical models addressing connected interacting interdependent components of complex water systems are in fact some of the most useful methods we have to study and better understand the systems we manage around us. They can help us identify and evaluate possible alternative solutions to problems facing humanity today. The study of real world systems of interacting components using mathematical models is commonly called applied systems analyses. Performing such analyses with decision makers rather than of decision makers is critical if the needed trust between project personnel and their clients is to be developed. Using examples from recent and ongoing

  14. A Fundamental Scale of Descriptions for Analyzing Information Content of Communication Systems

    Directory of Open Access Journals (Sweden)

    Gerardo Febres

    2015-03-01

    Full Text Available The complexity of the description of a system is a function of the entropy of its symbolic description. Prior to computing the entropy of the system’s description, an observation scale has to be assumed. In texts written in artificial and natural languages, typical scales are binary, characters, and words. However, considering languages as structures built around certain preconceived set of symbols, like words or characters, limits the level of complexity that can be revealed analytically. This study introduces the notion of the fundamental description scale to analyze the essence of the structure of a language. The concept of Fundamental Scale is tested for English and musical instrument digital interface (MIDI music texts using an algorithm developed to split a text in a collection of sets of symbols that minimizes the observed entropy of the system. This Fundamental Scale reflects more details of the complexity of the language than using bits, characters or words. Results show that this Fundamental Scale allows to compare completely different languages, such as English and MIDI coded music regarding its structural entropy. This comparative power facilitates the study of the complexity of the structure of different communication systems.

  15. Preliminary PANSAT ground station software design and use of an expert system to analyze telemetry

    Science.gov (United States)

    Lawrence, Gregory W.

    1994-03-01

    The Petite Amateur Navy Satellite (PANSAT) is a communications satellite designed to be used by civilian amateur radio operators. A master ground station is being built at the Naval Postgraduate School. This computer system performs satellite commands, displays telemetry, trouble-shoots problems, and passes messages. The system also controls an open loop tracking antenna. This paper concentrates on the telemetry display, decoding, and interpretation through artificial intelligence (AI). The telemetry is displayed in an easily interpretable format, so that any user can understand the current health of the satellite and be cued as to any problems and possible solutions. Only the master ground station has the ability to receive all telemetry and send commands to the spacecraft; civilian ham users do not have access to this information. The telemetry data is decommutated and analyzed before it is displayed to the user, so that the raw data will not have to be interpreted by ground users. The analysis will use CLIPS imbedded in the code, and derive its inputs from telemetry decommutation. The program is an expert system using a forward chaining set of rules based on the expected operation and parameters of the satellite. By building the rules during the construction and design of the satellite, the telemetry can be well understood and interpreted after the satellite is launched and the designers may no longer be available to provide input to the problem.

  16. Configurations of power relations in the Brazilian emergency care system: analyzing a context of visible practices.

    Science.gov (United States)

    Velloso, Isabela; Ceci, Christine; Alves, Marilia

    2013-09-01

    In this paper, we make explicit the changing configurations of power relations that currently characterize the Brazilian Emergency Care System (SAMU) team in Belo Horizonte, Brazil. The SAMU is a recent innovation in Brazilian healthcare service delivery. A qualitative case study methodology was used to explore SAMU's current organizational arrangements, specifically the power relations that have developed and that demonstrate internal team struggles over space and defense of particular occupational interests. The argument advanced in this paper is that these professionals are developing their work in conditions of exposure, that is, they are always being observed by someone, and that such observational exposure provides the conditions whereby everyday emergency care practices are enacted such that practice is shaped by, as well as shapes, particular, yet recognizable power relationships. Data were collected through the observation of the SAMU's work processes and through semi-structured interviews. Research materials were analyzed using discourse analysis. In the emergency care process of work, visibility is actually embedded in the disciplinary context and can thus be analyzed as a technique applied to produce disciplined individuals through the simple mechanisms elaborated by Foucault such as hierarchical surveillance, normalizing judgment, and the examination. © 2012 John Wiley & Sons Ltd.

  17. An open network type DCME system

    Science.gov (United States)

    Kato, T.; Suga, K.; Hagi, K.; Ohtsuki, H.; Shinta, M.; Kinoshita, T.; Murata, K.

    1992-03-01

    The first open network-type digital circuit multiplication equipment (DCME) system, which complies with Intelsat IESS-501 (Rev.2), Eutelsat BS14-49E, CCITT Rec. G.723, G.721, and Rec. Q.50 specifications, has been developed. It provides an economical way to multiply circuit capacity by using DSI and variable bit rate adaptive differential pulse code modulation techniques. It is flexible enough to support a variety of operation modes such as Multidestination for up to four destinations, Multiclique for up to two destinations, Single destination, and Mixed Single-destination and Multidestination operations. In addition, it offers a wide range of possibilities in satellite, submarine, and terrestrial applications. The newly-developed DCME system utilizes a modified adaptive threshold activity detector and an accurate, robust data/speech discriminator in order to prevent false detection and false decisions in high background noise environment. In the DCME system, the Operation and Maintenance Center is used to monitor the operating conditions and to control the system functions.

  18. Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Min, Moon Gi; Lee, Jae Ki; Lee, Kwang Hyun; Lee, Dong Il; Lim, Hee Taek [Korea Hydro and Nuclear Power Co., Ltd, Daejeon (Korea, Republic of)

    2017-08-15

    Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs)

  19. The meaning of loss codebook: construction of a system for analyzing meanings made in bereavement.

    Science.gov (United States)

    Gillies, James; Neimeyer, Robert A; Milman, Evgenia

    2014-01-01

    Recent research on grieving populations has emphasized the role of meaning making in adaptation to bereavement, typically relying on simple self-reports of the extent to which respondents have been able to find sense or benefit in their loss. The present article reports the development of a reliable and comprehensive coding system for analyzing meanings made in the wake of the death of a loved one, yielding a 30-category codebook demonstrating excellent reliability, and comprising both negative and positive themes that arise as grievers attempt to make sense of loss. Based on an intensive qualitative analysis of a diverse sample of 162 adults mourning the natural or violent death of a variety of loved ones, the Meaning of Loss Codebook could prove useful in process-outcome studies of grief therapy, analysis of naturalistic first-person writing about bereavement experiences in grief diaries and blogs, and clinical assessment of meanings made in the course of bereavement support or professional intervention.

  20. Development of Labview based data acquisition and multichannel analyzer software for radioactive particle tracking system

    Energy Technology Data Exchange (ETDEWEB)

    Rahman, Nur Aira Abd, E-mail: nur-aira@nuclearmalaysia.gov.my; Yussup, Nolida; Ibrahim, Maslina Bt. Mohd; Abdullah, Nor Arymaswati; Mokhtar, Mukhlis B. [Technical Support Division, Malaysian Nuclear Agency, 43000, Kajang, Selangor (Malaysia); Abdullah, Jaafar B.; Hassan, Hearie B. [Industrial Technology Division, Malaysian Nuclear Agency, 43000, Kajang, Selangor (Malaysia)

    2015-04-29

    A DAQ (data acquisition) software called RPTv2.0 has been developed for Radioactive Particle Tracking System in Malaysian Nuclear Agency. RPTv2.0 that features scanning control GUI, data acquisition from 12-channel counter via RS-232 interface, and multichannel analyzer (MCA). This software is fully developed on National Instruments Labview 8.6 platform. Ludlum Model 4612 Counter is used to count the signals from the scintillation detectors while a host computer is used to send control parameters, acquire and display data, and compute results. Each detector channel consists of independent high voltage control, threshold or sensitivity value and window settings. The counter is configured with a host board and twelve slave boards. The host board collects the counts from each slave board and communicates with the computer via RS-232 data interface.

  1. The Equivalent Linearization Method with a Weighted Averaging for Analyzing of Nonlinear Vibrating Systems

    Directory of Open Access Journals (Sweden)

    N. D. Anh

    Full Text Available Abstract In this paper, the Equivalent Linearization Method (ELM with a weighted averaging, which is proposed by Anh (Anh, 2015, is applied to analyze some vibrating systems with nonlinearities. The strongly nonlinear Duffing oscillator with third, fifth, and seventh powers of the amplitude, the other strongly nonlinear oscillators and the cubic Duffing with discontinuity are considered. The results obtained via this method are compared with the ones achieved by the Min-Max Approach (MMA, the Modified Lindstedt - Poincare Method (MLPM, the Parameter - Expansion Method (PEM, the Homotopy Perturbation Method (HPM and 4th order Runge-Kutta method. The obtained results demonstrate that this method is very convenient for solving nonlinear equations and also can be successfully exerted to a lot of practical engineering and physical problems.

  2. Polymerase chain reaction system using magnetic beads for analyzing a sample that includes nucleic acid

    Science.gov (United States)

    Nasarabadi, Shanavaz [Livermore, CA

    2011-01-11

    A polymerase chain reaction system for analyzing a sample containing nucleic acid includes providing magnetic beads; providing a flow channel having a polymerase chain reaction chamber, a pre polymerase chain reaction magnet position adjacent the polymerase chain reaction chamber, and a post pre polymerase magnet position adjacent the polymerase chain reaction chamber. The nucleic acid is bound to the magnetic beads. The magnetic beads with the nucleic acid flow to the pre polymerase chain reaction magnet position in the flow channel. The magnetic beads and the nucleic acid are washed with ethanol. The nucleic acid in the polymerase chain reaction chamber is amplified. The magnetic beads and the nucleic acid are separated into a waste stream containing the magnetic beads and a post polymerase chain reaction mix containing the nucleic acid. The reaction mix containing the nucleic acid flows to an analysis unit in the channel for analysis.

  3. iTOUGH2: A multiphysics simulation-optimization framework for analyzing subsurface systems

    Science.gov (United States)

    Finsterle, S.; Commer, M.; Edmiston, J. K.; Jung, Y.; Kowalsky, M. B.; Pau, G. S. H.; Wainwright, H. M.; Zhang, Y.

    2017-11-01

    iTOUGH2 is a simulation-optimization framework for the TOUGH suite of nonisothermal multiphase flow models and related simulators of geophysical, geochemical, and geomechanical processes. After appropriate parameterization of subsurface structures and their properties, iTOUGH2 runs simulations for multiple parameter sets and analyzes the resulting output for parameter estimation through automatic model calibration, local and global sensitivity analyses, data-worth analyses, and uncertainty propagation analyses. Development of iTOUGH2 is driven by scientific challenges and user needs, with new capabilities continually added to both the forward simulator and the optimization framework. This review article provides a summary description of methods and features implemented in iTOUGH2, and discusses the usefulness and limitations of an integrated simulation-optimization workflow in support of the characterization and analysis of complex multiphysics subsurface systems.

  4. Bi-Directional Brillouin Optical Time Domain Analyzer System for Long Range Distributed Sensing.

    Science.gov (United States)

    Guo, Nan; Wang, Liang; Wang, Jie; Jin, Chao; Tam, Hwa-Yaw; Zhang, A Ping; Lu, Chao

    2016-12-16

    We propose and experimentally demonstrate a novel scheme of bi-directional Brillouin time domain analyzer (BD-BOTDA) to extend the sensing range. By deploying two pump-probe pairs at two different wavelengths, the Brillouin frequency shift (BFS) distribution over each half of the whole fiber can be obtained with the simultaneous detection of Brillouin signals in both channels. Compared to the conventional unidirectional BOTDA system of the same sensing range, the proposed BD-BOTDA scheme enables distributed sensing with a performance level comparable to the conventional one with half of the sensing range and a spatial resolution of 2 m, while maintaining the Brillouin signal-to-noise ratio (SNR) and the BFS uncertainty. Based on this technique, we have achieved distributed temperature sensing with a measurement range of 81.9 km fiber at a spatial resolution of 2 m and BFS uncertainty of ~0.44 MHz without introducing any complicated components or schemes.

  5. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  6. The research of the evaluation system towards a core enterprise's network capability in the industrial technology alliance

    Science.gov (United States)

    Yan, Guangshi; Tian, Xuelian; Shen, Xue; You, Yue

    2017-05-01

    The social network theory is introduced for the industrial technology alliance based on the actual needs of the development of the industrial technology alliance. Through discussing the influence of the core enterprise network capacity on alliance performance, this article establishes evaluation system and index model of core enterprise network ability. We also evaluate and analyze the network capacity of core enterprise by fuzzy comprehensive evaluation method. So, the evaluation method is very important and full of practical value with a new research vision.

  7. Fault Detection for Quantized Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Wei-Wei Che

    2013-01-01

    Full Text Available The fault detection problem in the finite frequency domain for networked control systems with signal quantization is considered. With the logarithmic quantizer consideration, a quantized fault detection observer is designed by employing a performance index which is used to increase the fault sensitivity in finite frequency domain. The quantized measurement signals are dealt with by utilizing the sector bound method, in which the quantization error is treated as sector-bounded uncertainty. By using the Kalman-Yakubovich-Popov (GKYP Lemma, an iterative LMI-based optimization algorithm is developed for designing the quantized fault detection observer. And a numerical example is given to illustrate the effectiveness of the proposed method.

  8. Analyzing the Potential for High-speed Rail as Part of the Multimodal Transportation System in the United States' Midwest Corridor

    Directory of Open Access Journals (Sweden)

    Jeffrey C. Peters

    2014-06-01

    Full Text Available With increasing demand and rising fuel costs, both travel time and cost of current intercity passenger transportation modes are becoming increasingly relevant. Around the world, highspeed rail (HSR is seen as a way to alleviate demand on highways and at airports. Ridership is the critical element in determining the viability of a large capital, long-term transportation investment. This paper provides a systematic, consistent methodology for analyzing systemwide modal ridership with and without a proposed HSR network and analyzes the potential for highspeed rail as part of the existing multimodal transportation system in a region in terms of ridership. Considerations of capital investment (e.g., network design and HSR speed, along with exogenous demographic, technological, economic, and policy trends in the long-term, are used to project ridership over time. This study represents an important step toward a consistent, comprehensive economic analysis of HSR in the United States.

  9. Analyzing recommender systems for health promotion using a multidisciplinary taxonomy: A scoping review.

    Science.gov (United States)

    Hors-Fraile, Santiago; Rivera-Romero, Octavio; Schneider, Francine; Fernandez-Luque, Luis; Luna-Perejon, Francisco; Civit-Balcells, Anton; de Vries, Hein

    2017-12-28

    Recommender systems are information retrieval systems that provide users with relevant items (e.g., through messages). Despite their extensive use in the e-commerce and leisure domains, their application in healthcare is still in its infancy. These systems may be used to create tailored health interventions, thus reducing the cost of healthcare and fostering a healthier lifestyle in the population. This paper identifies, categorizes, and analyzes the existing knowledge in terms of the literature published over the past 10 years on the use of health recommender systems for patient interventions. The aim of this study is to understand the scientific evidence generated about health recommender systems, to identify any gaps in this field to achieve the United Nations Sustainable Development Goal 3 (SDG3) (namely, "Ensure healthy lives and promote well-being for all at all ages"), and to suggest possible reasons for these gaps as well as to propose some solutions. We conducted a scoping review, which consisted of a keyword search of the literature related to health recommender systems for patients in the following databases: ScienceDirect, PsycInfo, Association for Computing Machinery, IEEExplore, and Pubmed. Further, we limited our search to consider only English-language journal articles published in the last 10 years. The reviewing process comprised three researchers who filtered the results simultaneously. The quantitative synthesis was conducted in parallel by two researchers, who classified each paper in terms of four aspects-the domain, the methodological and procedural aspects, the health promotion theoretical factors and behavior change theories, and the technical aspects-using a new multidisciplinary taxonomy. Nineteen papers met the inclusion criteria and were included in the data analysis, for which thirty-three features were assessed. The nine features associated with the health promotion theoretical factors and behavior change theories were not observed in

  10. Software structure for broadband wireless sensor network system

    Science.gov (United States)

    Kwon, Hyeokjun; Oh, Sechang; Yoon, Hargsoon; Varadan, Vijay K.

    2010-04-01

    Zigbee Sensor Network system has been investigating for monitoring and analyzing the data measured from a lot of sensors because the Zigbee Sensor Network has several advantages of low power consumption, compact size, and multi-node connection. However, it has a disadvantage not to be able to monitor the data measured from sensors at the remote area such as other room that is located at other city. This paper describes the software structure to compensate the defect with combining the Zigbee Sensor Network and wireless LAN technology for remote monitoring of measured sensor data. The software structure has both benefits of Zigbee Sensor Network and the advantage of wireless LAN. The software structure has three main software structures. The first software structure consists of the function in order to acquire the data from sensors and the second software structure is to gather the sensor data through wireless Zigbee and to send the data to Monitoring system by using wireless LAN. The second part consists of Linux packages software based on 2440 CPU (Samsung corp.), which has ARM9 core. The Linux packages include bootloader, device drivers, kernel, and applications, and the applications are TCP/IP server program, the program interfacing with Zigbee RF module, and wireless LAN program. The last part of software structure is to receive the sensor data through TCP/IP client program from Wireless Gate Unit and to display graphically measured data by using MATLAB program; the sensor data is measured on 100Hz sampling rate and the measured data has 10bit data resolution. The wireless data transmission rate per each channel is 1.6kbps.

  11. Intrinsic noise analyzer: a software package for the exploration of stochastic biochemical kinetics using the system size expansion.

    Science.gov (United States)

    Thomas, Philipp; Matuschek, Hannes; Grima, Ramon

    2012-01-01

    The accepted stochastic descriptions of biochemical dynamics under well-mixed conditions are given by the Chemical Master Equation and the Stochastic Simulation Algorithm, which are equivalent. The latter is a Monte-Carlo method, which, despite enjoying broad availability in a large number of existing software packages, is computationally expensive due to the huge amounts of ensemble averaging required for obtaining accurate statistical information. The former is a set of coupled differential-difference equations for the probability of the system being in any one of the possible mesoscopic states; these equations are typically computationally intractable because of the inherently large state space. Here we introduce the software package intrinsic Noise Analyzer (iNA), which allows for systematic analysis of stochastic biochemical kinetics by means of van Kampen's system size expansion of the Chemical Master Equation. iNA is platform independent and supports the popular SBML format natively. The present implementation is the first to adopt a complementary approach that combines state-of-the-art analysis tools using the computer algebra system Ginac with traditional methods of stochastic simulation. iNA integrates two approximation methods based on the system size expansion, the Linear Noise Approximation and effective mesoscopic rate equations, which to-date have not been available to non-expert users, into an easy-to-use graphical user interface. In particular, the present methods allow for quick approximate analysis of time-dependent mean concentrations, variances, covariances and correlations coefficients, which typically outperforms stochastic simulations. These analytical tools are complemented by automated multi-core stochastic simulations with direct statistical evaluation and visualization. We showcase iNA's performance by using it to explore the stochastic properties of cooperative and non-cooperative enzyme kinetics and a gene network associated with

  12. Network quotients: structural skeletons of complex systems.

    Science.gov (United States)

    Xiao, Yanghua; MacArthur, Ben D; Wang, Hui; Xiong, Momiao; Wang, Wei

    2008-10-01

    A defining feature of many large empirical networks is their intrinsic complexity. However, many networks also contain a large degree of structural repetition. An immediate question then arises: can we characterize essential network complexity while excluding structural redundancy? In this article we utilize inherent network symmetry to collapse all redundant information from a network, resulting in a coarse graining which we show to carry the essential structural information of the "parent" network. In the context of algebraic combinatorics, this coarse-graining is known as the "quotient." We systematically explore the theoretical properties of network quotients and summarize key statistics of a variety of "real-world" quotients with respect to those of their parent networks. In particular, we find that quotients can be substantially smaller than their parent networks yet typically preserve various key functional properties such as complexity (heterogeneity and hub vertices) and communication (diameter and mean geodesic distance), suggesting that quotients constitute the essential structural skeletons of their parent networks. We summarize with a discussion of potential uses of quotients in analysis of biological regulatory networks and ways in which using quotients can reduce the computational complexity of network algorithms.

  13. System Leadership, Networks and the Question of Power

    Science.gov (United States)

    Hatcher, Richard

    2008-01-01

    The author's argument revolves around the relationships between government agendas and the agency of teachers, and between them the intermediary role of management as "system leaders" of network forms. Network is a pluralistic concept: networks can serve very different educational-political interests. They offer the potential of new…

  14. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  15. The Artifical Neural Network as means for modeling Nonlinear Systems

    OpenAIRE

    Drábek Oldøich; Taufer Ivan

    1998-01-01

    The paper deals with nonlinear system identification based on neural network. The topic of this publication is simulation of training and testing a neural network. A contribution is assigned to technologists which are good at the clasical identification problems but their knowledges about identification based on neural network are only on the stage of theoretical bases.

  16. The Artifical Neural Network as means for modeling Nonlinear Systems

    Directory of Open Access Journals (Sweden)

    Drábek Oldøich

    1998-12-01

    Full Text Available The paper deals with nonlinear system identification based on neural network. The topic of this publication is simulation of training and testing a neural network. A contribution is assigned to technologists which are good at the clasical identification problems but their knowledges about identification based on neural network are only on the stage of theoretical bases.

  17. Sensitivity and network topology in chemical reaction systems

    Science.gov (United States)

    Okada, Takashi; Mochizuki, Atsushi

    2017-08-01

    In living cells, biochemical reactions are catalyzed by specific enzymes and connect to one another by sharing substrates and products, forming complex networks. In our previous studies, we established a framework determining the responses to enzyme perturbations only from network topology, and then proved a theorem, called the law of localization, explaining response patterns in terms of network topology. In this paper, we generalize these results to reaction networks with conserved concentrations, which allows us to study any reaction system. We also propose network characteristics quantifying robustness. We compare E. coli metabolic network with randomly rewired networks, and find that the robustness of the E. coli network is significantly higher than that of the random networks.

  18. Stability of Networked Control System with Dynamic Quantizer and Data-Driven Zero-Order Hold

    Science.gov (United States)

    Konaka, Eiji

    Recently, high-speed communication network, e.g., the Internet, has seen rapid development. Therefore, the construction of control systems employing these networks is becoming a real possibility. The realization of such systems, however, has the following two limitations. i) bit rate limitation of network, and ii) network's reliability, e.g., delays, data dropouts, and so on. This paper uses dynamic quantization in order to overcome the first problem. For the second problem, an data-driven zero-order hold is used to supress the effects of stochastic data dropout through an unreliable network. The stochastic stability of the system is analyzed and its sufficient condition is developed in this paper. Finally, the validity of the proposed method is demonstrated through some experiments.

  19. Network centrality measures and systemic risk: An application to the Turkish financial crisis

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Ömercikoğlu, Inci; Saltoğlu, Burak

    2014-07-01

    In this paper, we analyze the performance of several network centrality measures in detecting systemically important financial institutions (SIFI) using data from the Turkish Interbank market during the financial crisis in 2000. We employ various network investigation tools such as volume, transactions, links, connectivity and reciprocity to gain a clearer picture of the network topology of the interbank market. We study the main borrower role of Demirbank in the crash of the banking system with network centrality measures which are extensively used in the network theory. This ex-post analysis of the crisis shows that centrality measures perform well in identifying and monitoring systemically important financial institutions which provide useful insights for financial regulations.

  20. System and method for generating a relationship network

    Science.gov (United States)

    Franks, Kasian [Kensington, CA; Myers, Cornelia A [St. Louis, MO; Podowski, Raf M [Pleasant Hill, CA

    2011-07-26

    A computer-implemented system and process for generating a relationship network is disclosed. The system provides a set of data items to be related and generates variable length data vectors to represent the relationships between the terms within each data item. The system can be used to generate a relationship network for documents, images, or any other type of file. This relationship network can then be queried to discover the relationships between terms within the set of data items.

  1. A Quantitative Experimental Study of the Effectiveness of Systems to Identify Network Attackers

    Science.gov (United States)

    Handorf, C. Russell

    2016-01-01

    This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…

  2. USING ALMOST IDEAL DEMAND SYSTEM TO ANALYZE DEMAND FOR SHRIMP IN US FOOD MARKET

    Directory of Open Access Journals (Sweden)

    Xia “Vivian” Zhou

    2015-07-01

    Full Text Available This paper analyzes the demand for shrimp along with beef, pork, and chicken in the US food market, which contributes much to predicting supply strategies, consumer preferences and policy making. It focuses on the own and cross elasticity relationship between the expenditure share, price, and expenditure changes. An Almost Ideal Demand System (AIDs model and two alternative specifications (both nonlinear AIDs and LA-AIDs are used to estimate a system of expenditure share equations for ocean shrimp, penaeid shrimp, beef, pork, and chicken. Empirical results from nonlinear AIDs model is compared with those from LA-AIDs model. There are quite a few inconsistency between nonlinear and LA results. Results from nonlinear are more expected and more complied with microeconomic theory than those from LA. Also, results indicated that some insignificant slope coefficients and inappropriate signs of them did not comply with microeconomic theory. This could be caused by heteroscedasticity, autocorrelation, a limitation in the data used, or shrimp is a quite different commodity.

  3. Tourist activated networks: Implications for dynamic packaging systems in tourism

    DEFF Research Database (Denmark)

    Zach, Florian; Gretzel, Ulrike; Fesenmaier, Daniel R.

    2008-01-01

    This paper discusses tourist activated networks as a concept to inform technological applications supporting dynamic bundling and en-route recommendations. Empirical data was collected from travellers who visited a regional destination in the US and then analyzed with respect to its network struc...... marketing....

  4. Use of Bayesian Networks to Analyze Port Variables in Order to Make Sustainable Planning and Management Decision

    Directory of Open Access Journals (Sweden)

    Beatriz Molina Serrano

    2018-01-01

    Full Text Available In the current economic, social and political environment, society demands a greater variety of outcomes from the public logistics sector, such as efficiency, efficiency of managed resources, greater transparency and business performance. All of them are an indispensable counterpart for its recognition and support. In case of port planning and management, many variables are included. Use of Bayesian Networks allows to classify, predict and diagnose these variables and even to estimate the subsequent probability of unknown variables, basing on the known ones. Research includes a data base with more than 40 variables, which have been classified as smart port studies in Spain. Then a network was generated using a non-cyclic conducted grafo, which shows port variable relationships. As conclusion, economic variables are cause of the rest of categories and they represent a parent role in the most of cases. Furthermore, if environmental variables are known, subsequent probability of social variables can be estimated.

  5. Using individualized brain network for analyzing structural covariance of the cerebral cortex in Alzheimer’s patients

    Directory of Open Access Journals (Sweden)

    Hee-Jong Kim

    2016-09-01

    Full Text Available Cortical thinning patterns in Alzheimer’s disease (AD have been widely reported through conventional regional analysis. In addition, the coordinated variance of cortical thickness in different brain regions has been investigated both at the individual and group network levels. In this study, we aim to investigate network architectural characteristics of a structural covariance network (SCN in AD, and further to show that the structural covariance connectivity becomes disorganized across the brain regions in AD, while the normal control (NC subjects maintain more clustered and consistent coordination in cortical atrophy variations. We generated SCNs directly from T1-weighted MR images of individual patients using surface-based cortical thickness data, with structural connectivity defined as similarity in cortical thickness within different brain regions. Individual SCNs were constructed using morphometric data from the Samsung Medical Center (SMC dataset. The structural covariance connectivity showed higher clustering than randomly generated networks, as well as similar minimum path lengths, indicating that the SCNs are small world. There were significant difference between NC and AD group in characteristic path lengths (z=-2.97, p<0.01 and small-worldness values (z=4.05, p<0.01. Clustering coefficients in AD was smaller than that of NC but there was no significant difference (z=1.81, not significant. We further observed that the AD patients had significantly disrupted structural connectivity. We also show that the coordinated variance of cortical thickness is distributed more randomly from one region to other regions in AD patients when compared to NC subjects. Our proposed SCN may provide surface-based measures for understanding interaction between two brain regions with co-atrophy of the cerebral cortex due to normal aging or AD. We applied our method to the AD Neuroimaging Initiative (ADNI data to show consistency in results with the SMC

  6. Introduction to Focus Issue: Complex Dynamics in Networks, Multilayered Structures and Systems

    Science.gov (United States)

    Boccaletti, Stefano; Criado, Regino; Romance, Miguel; Torres, Joaquín J.

    2016-06-01

    In the last years, network scientists have directed their interest to the multi-layer character of real-world systems, and explicitly considered the structural and dynamical organization of graphs made of diverse layers between its constituents. Most complex systems include multiple subsystems and layers of connectivity and, in many cases, the interdependent components of systems interact through many different channels. Such a new perspective is indeed found to be the adequate representation for a wealth of features exhibited by networked systems in the real world. The contributions presented in this Focus Issue cover, from different points of view, the many achievements and still open questions in the field of multi-layer networks, such as: new frameworks and structures to represent and analyze heterogeneous complex systems, different aspects related to synchronization and centrality of complex networks, interplay between layers, and applications to logistic, biological, social, and technological fields.

  7. Efficient Network Monitoring for Large Data Acquisition Systems

    CERN Document Server

    Savu, DO; The ATLAS collaboration; Al-Shabibi, A; Sjoen, R; Batraneanu, SM; Stancu, SN

    2011-01-01

    Though constantly evolving and improving, the available network monitoring solutions have limitations when applied to the infrastructure of a high speed real-time data acquisition (DAQ) system. DAQ networks are particular computer networks where experts have to pay attention to both individual subsections as well as system wide traffic flows while monitoring the network. The ATLAS Network at the Large Hadron Collider (LHC) has more than 200 switches interconnecting 3500 hosts and totaling 8500 high speed links. The use of heterogeneous tools for monitoring various infrastructure parameters, in order to assure optimal DAQ system performance, proved to be a tedious and time consuming task for experts. To alleviate this problem we used our networking and DAQ expertise to build a flexible and scalable monitoring system providing an intuitive user interface with the same look and feel irrespective of the data provider that is used. Our system uses custom developed components for critical performance monitoring and...

  8. Neural Network Based Intelligent Sootblowing System

    Energy Technology Data Exchange (ETDEWEB)

    Mark Rhode

    2005-04-01

    . Due to the composition of coal, particulate matter is also a by-product of coal combustion. Modern day utility boilers are usually fitted with electrostatic precipitators to aid in the collection of particulate matter. Although extremely efficient, these devices are sensitive to rapid changes in inlet mass concentration as well as total mass loading. Traditionally, utility boilers are equipped with devices known as sootblowers, which use, steam, water or air to dislodge and clean the surfaces within the boiler and are operated based upon established rule or operator's judgment. Poor sootblowing regimes can influence particulate mass loading to the electrostatic precipitators. The project applied a neural network intelligent sootblowing system in conjunction with state-of-the-art controls and instruments to optimize the operation of a utility boiler and systematically control boiler slagging/fouling. This optimization process targeted reduction of NOx of 30%, improved efficiency of 2% and a reduction in opacity of 5%. The neural network system proved to be a non-invasive system which can readily be adapted to virtually any utility boiler. Specific conclusions from this neural network application are listed below. These conclusions should be used in conjunction with the specific details provided in the technical discussions of this report to develop a thorough understanding of the process.

  9. Comparison of Free Space Measurement Using a Vector Network Analyzer and Low-Cost-Type THz-TDS Measurement Methods Between 75 and 325 GHz

    Science.gov (United States)

    Ozturk, Turgut; Morikawa, Osamu; Ünal, İlhami; Uluer, İhsan

    2017-10-01

    Specifications of two measurement systems, free space measurement using a vector network analyzer and low-cost-type terahertz time-domain spectroscopy using a multimode laser diode, have been compared in the frequency region of millimeter/sub-THz waves. In the comparison, accuracy, cost, measurement time, calculation time, etc. were considered. Four samples (Rexolite, RO3003, Ultralam 3850HT-design, and L1000HF) were selected for the comparison of the specifications of the two methods. The acquired data was used to compute the complex permittivity of measured materials. The extracted results by free space measurement agreed well to the ones obtained by low-cost-type terahertz time-domain spectroscopy. This result proves free space measurement that can be assessed as a new method of material characterization in the sub-THz region successfully worked. Furthermore, free space measurement was proved to be suitable for a measurement in a narrow frequency range. On the other hand, low-cost-type terahertz time-domain spectroscopy has features not only low cost but also measurement capability in wide frequency range.

  10. Fitness networks for real world systems via modified preferential attachment

    Science.gov (United States)

    Shang, Ke-ke; Small, Michael; Yan, Wei-sheng

    2017-05-01

    Complex networks are virtually ubiquitous, and the Barabási and Albert model (BA model) has became an acknowledged standard for the modelling of these systems. The so-called BA model is a kind of preferential attachment growth model based on the intuitive premise that popularity is attractive. However, preferential attachment alone is insufficient to describe the diversity of complex networks observed in the real world. In this paper we first use the accuracy of a link prediction method, as a metric for network fitness. The link prediction method predicts the occurrence of links consistent with preferential attachment, the performance of this link prediction scheme is then a natural measure of the ;preferential-attachment-likeness; of a given network. We then propose several modification methods and modified BA models to construct networks which more accurately describe the fitness properties of real networks. We find that all features assortativity, degree distribution and rich-club formation can play significant roles for the network construction and eventual structure. Moreover, link sparsity and the size of a network are key factors for network reconstruction. In addition, we find that the structure of the network which is limited by geographic location (nodes are embedded in a Euclidean space and connectivity is correlated with distances) differs from other typical networks. In social networks, we observe that the high school contact network has similar structure as the friends network and so we speculate that the contact behaviours can reflect real friendships.

  11. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  12. Development of a Simulation Framework for Analyzing Security of Supply in Integrated Gas and Electric Power Systems

    Directory of Open Access Journals (Sweden)

    Kwabena Addo Pambour

    2017-01-01

    Full Text Available Gas and power networks are tightly coupled and interact with each other due to physically interconnected facilities. In an integrated gas and power network, a contingency observed in one system may cause iterative cascading failures, resulting in network wide disruptions. Therefore, understanding the impacts of the interactions in both systems is crucial for governments, system operators, regulators and operational planners, particularly, to ensure security of supply for the overall energy system. Although simulation has been widely used in the assessment of gas systems as well as power systems, there is a significant gap in simulation models that are able to address the coupling of both systems. In this paper, a simulation framework that models and simulates the gas and power network in an integrated manner is proposed. The framework consists of a transient model for the gas system and a steady state model for the power system based on AC-Optimal Power Flow. The gas and power system model are coupled through an interface which uses the coupling equations to establish the data exchange and coordination between the individual models. The bidirectional interlink between both systems considered in this studies are the fuel gas offtake of gas fired power plants for power generation and the power supply to liquefied natural gas (LNG terminals and electric drivers installed in gas compressor stations and underground gas storage facilities. The simulation framework is implemented into an innovative simulation tool named SAInt (Scenario Analysis Interface for Energy Systems and the capabilities of the tool are demonstrated by performing a contingency analysis for a real world example. Results indicate how a disruption triggered in one system propagates to the other system and affects the operation of critical facilities. In addition, the studies show the importance of using transient gas models for security of supply studies instead of successions of

  13. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  14. Principles of network and system administration

    CERN Document Server

    Burgess, Mark

    2002-01-01

    A practical guide for meeting the challenges of planning and designing a networkNetwork design has to be logical and efficient, decisions have to be made about what services are needed, and security concerns must be addressed. Focusing on general principles, this book will help make the process of setting up, configuring, and maintaining a network much easier. It outlines proven procedures for working in a global community of networked machines, and provides practical illustrations of technical specifics. Readers will also find broad coverage of Linux and other Unix versions, Windows(r), Macs,

  15. Efficient combined security system for wireless sensor network

    Directory of Open Access Journals (Sweden)

    N.S. Fayed

    2012-11-01

    Full Text Available Wireless Sensor Networks (WSNs need effective security mechanisms because these networks deployed in hostel unattended environments. There are many parameters affect selecting the security mechanism as its speed and energy consumption. This paper presents a combined security system for WSN that enhance the speed of the network and it is energy consumption. This system combines two strong protocols, Lightweight Kerberos and Elliptic Curve Menezes–Qu–Vanstone (ECMQV. The simulation results demonstrate that the combined system can enlarge the life time for wireless sensor networks, enhance its security, and increase its speed.

  16. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  17. AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION

    OpenAIRE

    Noria Benyettou; Abdelkader Benyettou; Vincent Rodin

    2014-01-01

    With the development growing of network technology, computer networks became increasingly wide and opened. This evolution gave birth to new techniques allowing accessibility of networks and information systems with an aim of facilitating the transactions. Consequently, these techniques gave also birth to new forms of threats. In this article, we present the utility to use a system of intrusion detection through a presentation of these characteristics. Using as inspiration the i...

  18. Network analysis and Canada's large value transfer system

    OpenAIRE

    Embree, Lana; Roberts, Tom

    2009-01-01

    Analysis of the characteristics and structure of a network of financial institutions can provide insight into the complex relationships and interdependencies that exist in a payment, clearing, and settlement system (PCSS), and allow an intuitive understanding of the PCSS's efficiency, stability, and resiliency. The authors review the literature related to the PCSS network and describe the daily and intraday network structure of payment activity in the Large Value Transfer System (LVTS), which...

  19. The architecture of a network level intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  20. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  1. Network anomaly detection system with optimized DS evidence theory.

    Science.gov (United States)

    Liu, Yuan; Wang, Xiaofeng; Liu, Kaiyu

    2014-01-01

    Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network-complicated and varied. To achieve high detection rate, we present a novel network anomaly detection system with optimized Dempster-Shafer evidence theory (ODS) and regression basic probability assignment (RBPA) function. In this model, we add weights for each sensor to optimize DS evidence theory according to its previous predict accuracy. And RBPA employs sensor's regression ability to address complex network. By four kinds of experiments, we find that our novel network anomaly detection model has a better detection rate, and RBPA as well as ODS optimization methods can improve system performance significantly.

  2. Reject mechanisms for massively parallel neural network character recognition systems

    Science.gov (United States)

    Garris, Michael D.; Wilson, Charles L.

    1992-12-01

    Two reject mechanisms are compared using a massively parallel character recognition system implemented at NIST. The recognition system was designed to study the feasibility of automatically recognizing hand-printed text in a loosely constrained environment. The first method is a simple scalar threshold on the output activation of the winning neurode from the character classifier network. The second method uses an additional neural network trained on all outputs from the character classifier network to accept or reject assigned classifications. The neural network rejection method was expected to perform with greater accuracy than the scalar threshold method, but this was not supported by the test results presented. The scalar threshold method, even though arbitrary, is shown to be a viable reject mechanism for use with neural network character classifiers. Upon studying the performance of the neural network rejection method, analyses show that the two neural networks, the character classifier network and the rejection network, perform very similarly. This can be explained by the strong non-linear function of the character classifier network which effectively removes most of the correlation between character accuracy and all activations other than the winning activation. This suggests that any effective rejection network must receive information from the system which has not been filtered through the non-linear classifier.

  3. Generalized Flow Tracing for the Analysis of Networked Renewable Electricity Systems

    CERN Document Server

    Hörsch, Jonas; Becker, Sarah; Schramm, Stefan; Greiner, Martin

    2016-01-01

    Flow allocation methods represent a valuable tool set to analyze the power flows in networked electricity systems. Based on this flow allocation, the costs associated with the usage of the underlying network infrastructure can be assigned to the users of the electricity system. This paper presents a generalization of the flow tracing method that is applicable to arbitrary compositions of inflow appearing naturally in aggregated networks. The composition of inflow is followed from net-generating sources through the network and assigns corresponding shares of the total power flow as well as of the outflow to the net-consuming sinks. We showcase the analytical power of this method for a scenario based on the IEEE 118 bus network and emphasize the need of appropriate aggregating measures, which allow to integrate over whole time series of fluctuating flow patterns.

  4. ANALYZING THE POSTPONEMENT OF TIME PRODUCTION SYSTEMS IN MAKE-TO-STOCK AND SEASONAL DEMAND

    Directory of Open Access Journals (Sweden)

    Paulo Cesar Chagas Rodrigues

    2011-12-01

    Full Text Available The supply chain management, postponement and demand management functions are of strategic importance to the economic success of organizations because they influence the production process, when viewed in isolation and empirically may hinder understanding of their behavior. The aim of this paper is to analyze the influence of the postponement in an enterprise production system with make-to-stock and with seasonal demand. The research method used was a case study, the instruments of data collection were semi-structured interviews, documentary analysis and site visits. This research is restricted to analysis of the influence that different levels of delay and the company's position in the supply chain have on the practice of demand management in the productive segment graphic, product spiral notebook and also in relation to geographical focus (region of the state São Paulo, in which it will seek to interview the managers and directors. As a way to support the research on the analysis of case study and the final considerations will be discussed the following issues: supply chain management, postponement, demand management and production system make-to-stock. The demand management can be understood as a practice that allows you to manage and coordinate the supply chain in reverse, i.e. the consumer to the supplier, in which consumers trigger actions for the supply of products can make the process more efficient. The purpose of managing the supply chain is able to allow the addition of value, exceeding the expectations of consumers, it is necessary to develop a relationship with suppliers and customers win-win. The postponement strategy must fit the characteristics of the turbulent environment within the markets along with demands that require variety of customized products and services and reasonable costs, aiming to support decision making. The postponement of time can be a way to soften the increase in inventory of finished product in the company

  5. Analyzing Science Education in the United Kingdom: Taking a System-Wide Approach

    Science.gov (United States)

    Falk, John H.; Dierking, Lynn D.; Osborne, Jonathan; Wenger, Matthew; Dawson, Emily; Wong, Billy

    2015-01-01

    Increasing evidence suggests that individuals develop their understanding of science concepts in and out of school, using varied community resources and networks. Thus in contrast to historic research approaches that focus exclusively on single organizations and/or educational events, the current paper presents exploratory research in which we…

  6. Interpreting physical flows in networks as a communication system

    Indian Academy of Sciences (India)

    communication systems and multiple-channel commu- nication systems. Moreover, we are able to interpret directly the information transmission capacity of the network with the network invariants, such as the node degree. 2. Methods and model. The starting point in our approach is to define and to analytically solve the ...

  7. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  8. Analysis of Basic Transmission Networks for Integrated Ship Control Systems

    DEFF Research Database (Denmark)

    Hansen, T.N.; Granum-Jensen, M.

    1993-01-01

    Description of a computer network for Integrated Ship Control Systems which is going to be developed as part of an EC-project. Today equipment of different make are not able to communicate with each other because most often each supplier of ISC systems has got their own proprietary network.....

  9. Encouraging Autonomy through the Use of a Social Networking System

    Science.gov (United States)

    Leis, Adrian

    2014-01-01

    The use of social networking systems has enabled communication to occur around the globe almost instantly, with news about various events being spread around the world as they happen. There has also been much interest in the benefits and disadvantages the use of such social networking systems may bring for education. This paper reports on the use…

  10. Distributed control of networked Lur’e systems

    NARCIS (Netherlands)

    Zhang, Fan

    2015-01-01

    In this thesis we systematically study distributed control of networked Lur'e systems, specifically, robust synchronization problems and cooperative robust output regulation problems. In such nonlinear multi-agent networks, the model of each agent dynamics is taken as a Lur'e system that consists of

  11. Using Critical Systems thinking to Improve Student Performance in Networking

    OpenAIRE

    Albertus G. Joubert; Roelien Goede

    2012-01-01

    This paper explores how Critical Systems Thinking and Action Research can be used to improve student performance in Networking. When describing a system from a systems thinking perspective, the following aspects can be identified: the total system performance, the systems environment, the resources, the components and the management of the system. Following the history of system thinking we observe three emerged methodologies namely, hard systems, soft systems, and critical systems. This pape...

  12. Complex Networks/Foundations of Information Systems

    Science.gov (United States)

    2013-03-06

    Random Network (ex: Mobile Ad Hoc) Hybrid Network (Mesh) Deterministic Routing (ex: OSPF) Hybrid Routing (ex: OLSR) Random Protocol...10 - 2 10 - 1 100 Transmit power to noise ratio, P/N0, dB B it E rr o r R a te ( B E R ) BPSK signals, CDMA (L = 16), ds, d = 100m, UAV height = 1Km

  13. Distributed Robust Optimization in Networked System.

    Science.gov (United States)

    Wang, Shengnan; Li, Chunguang

    2016-10-11

    In this paper, we consider a distributed robust optimization (DRO) problem, where multiple agents in a networked system cooperatively minimize a global convex objective function with respect to a global variable under the global constraints. The objective function can be represented by a sum of local objective functions. The global constraints contain some uncertain parameters which are partially known, and can be characterized by some inequality constraints. After problem transformation, we adopt the Lagrangian primal-dual method to solve this problem. We prove that the primal and dual optimal solutions of the problem are restricted in some specific sets, and we give a method to construct these sets. Then, we propose a DRO algorithm to find the primal-dual optimal solutions of the Lagrangian function, which consists of a subgradient step, a projection step, and a diffusion step, and in the projection step of the algorithm, the optimized variables are projected onto the specific sets to guarantee the boundedness of the subgradients. Convergence analysis and numerical simulations verifying the performance of the proposed algorithm are then provided. Further, for nonconvex DRO problem, the corresponding approach and algorithm framework are also provided.

  14. Knowledge networks: socio-environmental innovation regional systems

    Directory of Open Access Journals (Sweden)

    Marcelo Macedo Valinhas

    2010-05-01

    Full Text Available This work aims to evaluate knowledge networks by analyzing actions executed by two socio-environmental projects designed to improve life of fishermen communities in Macaé, Rio de Janeiro, Brazil. The network structure was studied in terms of institutional representatives, regional character, types of network, flow and kinds of knowledge, formal and informal network aspects, and development of technical confidence. Despite the need for improving the network connectivity in the two evaluated projects, and adapting them to emphasize decentralization, multi-leadership, transparence, cooperation and interdependence principles, the studied network has provided an increase in the knowledge flow of participants and closer contact among technical staff, researches and social segments badly affected by the extremely accelerated urban growth resulting from local oil industry activities.

  15. Cooperative cognitive radio networking system model, enabling techniques, and performance

    CERN Document Server

    Cao, Bin; Mark, Jon W

    2016-01-01

    This SpringerBrief examines the active cooperation between users of Cooperative Cognitive Radio Networking (CCRN), exploring the system model, enabling techniques, and performance. The brief provides a systematic study on active cooperation between primary users and secondary users, i.e., (CCRN), followed by the discussions on research issues and challenges in designing spectrum-energy efficient CCRN. As an effort to shed light on the design of spectrum-energy efficient CCRN, they model the CCRN based on orthogonal modulation and orthogonally dual-polarized antenna (ODPA). The resource allocation issues are detailed with respect to both models, in terms of problem formulation, solution approach, and numerical results. Finally, the optimal communication strategies for both primary and secondary users to achieve spectrum-energy efficient CCRN are analyzed.

  16. Method for designing networking adaptive interactive hybrid systems

    NARCIS (Netherlands)

    Kester, L. J.H.M.

    2010-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to co-ordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defence, crisis management, traffic management and public

  17. Networked Adaptive Interactive Hybrid Systems (NAIHS) for multiplatform engagement capability

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defence, crisis management, traffic management and public

  18. Creating networking adaptive interactive hybrid systems : A methodic approach

    NARCIS (Netherlands)

    Kester, L.J.

    2011-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defense, crisis management, traffic management, public

  19. Bio-Inspired Networking — Self-Organizing Networked Embedded Systems

    Science.gov (United States)

    Dressler, Falko

    The turn to nature has brought us many unforeseen great concepts and solutions. This course seems to hold on for many research domains. In this article, we study the applicability of biological mechanisms and techniques in the domain of communications. In particular, we study the behavior and the challenges in networked embedded systems that are meant to self-organize in large groups of nodes. Application examples include wireless sensor networks and sensor/actuator networks. Based on a review of the needs and requirements in such networks, we study selected bio-inspired networking approaches that claim to outperform other methods in specific domains. We study mechanisms in swarm intelligence, the artificial immune system, and approaches based on investigations on the cellular signaling pathways. As a major conclusion, we derive that bio-inspired networking techniques do have advantages compared to engineering methods. Nevertheless, selection and employment must be done carefully to achieve the desired performance gains.

  20. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  1. Network analysis and synthesis a modern systems theory approach

    CERN Document Server

    Anderson, Brian D O

    2006-01-01

    Geared toward upper-level undergraduates and graduate students, this book offers a comprehensive look at linear network analysis and synthesis. It explores state-space synthesis as well as analysis, employing modern systems theory to unite the classical concepts of network theory. The authors stress passive networks but include material on active networks. They avoid topology in dealing with analysis problems and discuss computational techniques. The concepts of controllability, observability, and degree are emphasized in reviewing the state-variable description of linear systems. Explorations

  2. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  3. WDM Systems and Networks Modeling, Simulation, Design and Engineering

    CERN Document Server

    Ellinas, Georgios; Roudas, Ioannis

    2012-01-01

    WDM Systems and Networks: Modeling, Simulation, Design and Engineering provides readers with the basic skills, concepts, and design techniques used to begin design and engineering of optical communication systems and networks at various layers. The latest semi-analytical system simulation techniques are applied to optical WDM systems and networks, and a review of the various current areas of optical communications is presented. Simulation is mixed with experimental verification and engineering to present the industry as well as state-of-the-art research. This contributed volume is divided into three parts, accommodating different readers interested in various types of networks and applications. The first part of the book presents modeling approaches and simulation tools mainly for the physical layer including transmission effects, devices, subsystems, and systems), whereas the second part features more engineering/design issues for various types of optical systems including ULH, access, and in-building system...

  4. Analyzing Brain Functions by Subject Classification of Functional Near-Infrared Spectroscopy Data Using Convolutional Neural Networks Analysis

    Directory of Open Access Journals (Sweden)

    Satoru Hiwa

    2016-01-01

    Full Text Available Functional near-infrared spectroscopy (fNIRS is suitable for noninvasive mapping of relative changes in regional cortical activity but is limited for quantitative comparisons among cortical sites, subjects, and populations. We have developed a convolutional neural network (CNN analysis method that learns feature vectors for accurate identification of group differences in fNIRS responses. In this study, subject gender was classified using CNN analysis of fNIRS data. fNIRS data were acquired from male and female subjects during a visual number memory task performed in a white noise environment because previous studies had revealed that the pattern of cortical blood flow during the task differed between males and females. A learned classifier accurately distinguished males from females based on distinct fNIRS signals from regions of interest (ROI including the inferior frontal gyrus and premotor areas that were identified by the learning algorithm. These cortical regions are associated with memory storage, attention, and task motor response. The accuracy of the classifier suggests stable gender-based differences in cerebral blood flow during this task. The proposed CNN analysis method can objectively identify ROIs using fNIRS time series data for machine learning to distinguish features between groups.

  5. The Accounting Network: how financial institutions react to systemic crisis

    CERN Document Server

    Flori, Andrea; Puliga, Michelangelo; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies' financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001-2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible region...

  6. Intrinsic Noise Analyzer: A Software Package for the Exploration of Stochastic Biochemical Kinetics Using the System Size Expansion

    Science.gov (United States)

    Grima, Ramon

    2012-01-01

    The accepted stochastic descriptions of biochemical dynamics under well-mixed conditions are given by the Chemical Master Equation and the Stochastic Simulation Algorithm, which are equivalent. The latter is a Monte-Carlo method, which, despite enjoying broad availability in a large number of existing software packages, is computationally expensive due to the huge amounts of ensemble averaging required for obtaining accurate statistical information. The former is a set of coupled differential-difference equations for the probability of the system being in any one of the possible mesoscopic states; these equations are typically computationally intractable because of the inherently large state space. Here we introduce the software package intrinsic Noise Analyzer (iNA), which allows for systematic analysis of stochastic biochemical kinetics by means of van Kampen’s system size expansion of the Chemical Master Equation. iNA is platform independent and supports the popular SBML format natively. The present implementation is the first to adopt a complementary approach that combines state-of-the-art analysis tools using the computer algebra system Ginac with traditional methods of stochastic simulation. iNA integrates two approximation methods based on the system size expansion, the Linear Noise Approximation and effective mesoscopic rate equations, which to-date have not been available to non-expert users, into an easy-to-use graphical user interface. In particular, the present methods allow for quick approximate analysis of time-dependent mean concentrations, variances, covariances and correlations coefficients, which typically outperforms stochastic simulations. These analytical tools are complemented by automated multi-core stochastic simulations with direct statistical evaluation and visualization. We showcase iNA’s performance by using it to explore the stochastic properties of cooperative and non-cooperative enzyme kinetics and a gene network associated with

  7. Intrinsic noise analyzer: a software package for the exploration of stochastic biochemical kinetics using the system size expansion.

    Directory of Open Access Journals (Sweden)

    Philipp Thomas

    Full Text Available The accepted stochastic descriptions of biochemical dynamics under well-mixed conditions are given by the Chemical Master Equation and the Stochastic Simulation Algorithm, which are equivalent. The latter is a Monte-Carlo method, which, despite enjoying broad availability in a large number of existing software packages, is computationally expensive due to the huge amounts of ensemble averaging required for obtaining accurate statistical information. The former is a set of coupled differential-difference equations for the probability of the system being in any one of the possible mesoscopic states; these equations are typically computationally intractable because of the inherently large state space. Here we introduce the software package intrinsic Noise Analyzer (iNA, which allows for systematic analysis of stochastic biochemical kinetics by means of van Kampen's system size expansion of the Chemical Master Equation. iNA is platform independent and supports the popular SBML format natively. The present implementation is the first to adopt a complementary approach that combines state-of-the-art analysis tools using the computer algebra system Ginac with traditional methods of stochastic simulation. iNA integrates two approximation methods based on the system size expansion, the Linear Noise Approximation and effective mesoscopic rate equations, which to-date have not been available to non-expert users, into an easy-to-use graphical user interface. In particular, the present methods allow for quick approximate analysis of time-dependent mean concentrations, variances, covariances and correlations coefficients, which typically outperforms stochastic simulations. These analytical tools are complemented by automated multi-core stochastic simulations with direct statistical evaluation and visualization. We showcase iNA's performance by using it to explore the stochastic properties of cooperative and non-cooperative enzyme kinetics and a gene network

  8. Study of network topology effect on measurement accuracy for a distributed rotary-laser measurement system

    Science.gov (United States)

    Guo, Siyang; Lin, Jiarui; Ren, Yongjie; Yang, Linghui; Zhu, Jigui

    2017-09-01

    The workshop Measurement Positioning System (wMPS) is a large-scale measurement system that better copes with the current challenges of dimensional metrology. However, as a distributed measuring system with multiple transmitters forming a spatial measurement network, the network topology of transmitters relative to the receiver exerts a significant influence on the measurement accuracy albeit one that is difficult to quantify. An evaluation metric, termed the geometric dilution of precision (GDOP), is introduced to quantify the quality of the network topology of the wMPS. The GDOP is derived from the measurement error model of wMPS and its mathematical derivation is expounded. Two significant factors (density and layout of the transmitter) affecting the network topology are analyzed by simulations and experiments. The experimental results show that GDOP is approximately proportional to the measurement error. More transmitters, and a relatively good layout thereof, can decrease the value of GDOP and the measurement error.

  9. Rational function systems and electrical networks with multiparameters

    CERN Document Server

    Lu, KaiSheng

    2012-01-01

    To overcome the problems of system theory and network theory over real field, this book uses matrices over the field F(z) of rational functions in multiparameters describing coefficient matrices of systems and networks and makes systems and network description over F(z) and researches their structural properties: reducible condition of a class of matrices over F(z) and their characteristic polynomial; type1 matrix and two basic properties; variable replacement conditions for independent parameters; structural controllability and observability of linear systems over F(z); separability, reducibi

  10. Increased Efficiency of Face Recognition System using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rajani Muraleedharan

    2006-02-01

    Full Text Available This research was inspired by the need of a flexible and cost effective biometric security system. The flexibility of the wireless sensor network makes it a natural choice for data transmission. Swarm intelligence (SI is used to optimize routing in distributed time varying network. In this paper, SI maintains the required bit error rate (BER for varied channel conditions while consuming minimal energy. A specific biometric, the face recognition system, is discussed as an example. Simulation shows that the wireless sensor network is efficient in energy consumption while keeping the transmission accuracy, and the wireless face recognition system is competitive to the traditional wired face recognition system in classification accuracy.

  11. Synthesis of recurrent neural networks for dynamical system simulation.

    Science.gov (United States)

    Trischler, Adam P; D'Eleuterio, Gabriele M T

    2016-08-01

    We review several of the most widely used techniques for training recurrent neural networks to approximate dynamical systems, then describe a novel algorithm for this task. The algorithm is based on an earlier theoretical result that guarantees the quality of the network approximation. We show that a feedforward neural network can be trained on the vector-field representation of a given dynamical system using backpropagation, then recast it as a recurrent network that replicates the original system's dynamics. After detailing this algorithm and its relation to earlier approaches, we present numerical examples that demonstrate its capabilities. One of the distinguishing features of our approach is that both the original dynamical systems and the recurrent networks that simulate them operate in continuous time. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Systemic risk analysis in reconstructed economic and financial networks

    CERN Document Server

    Cimini, Giulio; Gabrielli, Andrea; Garlaschelli, Diego

    2014-01-01

    The assessment of fundamental properties for economic and financial systems, such as systemic risk, is systematically hindered by privacy issues$-$that put severe limitations on the available information. Here we introduce a novel method to reconstruct partially-accessible networked systems of this kind. The method is based on the knowledge of the fitnesses, $i.e.$, intrinsic node-specific properties, and of the number of connections of only a limited subset of nodes. Such information is used to calibrate a directed configuration model which can generate ensembles of networks intended to represent the real system, so that the real network properties can be estimated within the generated ensemble in terms of mean values of the observables. Here we focus on estimating those properties that are commonly used to measure the network resilience to shock and crashes. Tests on both artificial and empirical networks shows that the method is remarkably robust with respect to the limitedness of the information available...

  13. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  14. A network-based dynamical ranking system for competitive sports.

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-01-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  15. The Reliability of Wireless Sensor Network on Pipeline Monitoring System

    Directory of Open Access Journals (Sweden)

    Hafizh Prihtiadi

    2017-06-01

    Full Text Available The wireless sensor network (WSN is an attractive technology, which combines embedded systems and communication networks making them more efficient and effective. Currently, WSNs have been developed for various monitoring applications. In this research, a wireless mesh network for a pipeline monitoring system was designed and developed. Sensor nodes were placed at each branch in the pipe system. Some router fails were simulated and the response of each node in the network was evaluated. Three different scenarios were examined to test the data transmission performance. The results proved that the wireless mesh network was reliable and robust. The system is able to perform link reconfiguration, automatic routing and safe data transmission from the beginning node to the end node.

  16. Optimal design of network distribution systems

    Directory of Open Access Journals (Sweden)

    U. Passy

    2003-12-01

    Full Text Available The problem of finding the optimal distribution of pressure drop over a network is solved via an unconstrained gradient type algorithm. The developed algorithm is computationally attractive. Problems with several hundred variables and constraints were solved.

  17. Network system effects of mileage fee.

    Science.gov (United States)

    2015-08-01

    This project presents a comprehensive investigation about the network effects of MF to facilitate the : developments of proper MF policies. After a practice scan and a review of the recent literature on MF, a multi-class mathematical programming with...

  18. The system of technical diagnostics of the industrial safety information network

    Science.gov (United States)

    Repp, P. V.

    2017-01-01

    This research is devoted to problems of safety of the industrial information network. Basic sub-networks, ensuring reliable operation of the elements of the industrial Automatic Process Control System, were identified. The core tasks of technical diagnostics of industrial information safety were presented. The structure of the technical diagnostics system of the information safety was proposed. It includes two parts: a generator of cyber-attacks and the virtual model of the enterprise information network. The virtual model was obtained by scanning a real enterprise network. A new classification of cyber-attacks was proposed. This classification enables one to design an efficient generator of cyber-attacks sets for testing the virtual modes of the industrial information network. The numerical method of the Monte Carlo (with LPτ - sequences of Sobol), and Markov chain was considered as the design method for the cyber-attacks generation algorithm. The proposed system also includes a diagnostic analyzer, performing expert functions. As an integrative quantitative indicator of the network reliability the stability factor (Kstab) was selected. This factor is determined by the weight of sets of cyber-attacks, identifying the vulnerability of the network. The weight depends on the frequency and complexity of cyber-attacks, the degree of damage, complexity of remediation. The proposed Kstab is an effective integral quantitative measure of the information network reliability.

  19. Analysis on the University’s Network Security Level System in the Big Data Era

    Science.gov (United States)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  20. Remote sensing, geographical information systems, and spatial modeling for analyzing public transit services

    Science.gov (United States)

    Wu, Changshan

    Public transit service is a promising transportation mode because of its potential to address urban sustainability. Current ridership of public transit, however, is very low in most urban regions, particularly those in the United States. This woeful transit ridership can be attributed to many factors, among which poor service quality is key. Given this, there is a need for transit planning and analysis to improve service quality. Traditionally, spatially aggregate data are utilized in transit analysis and planning. Examples include data associated with the census, zip codes, states, etc. Few studies, however, address the influences of spatially aggregate data on transit planning results. In this research, previous studies in transit planning that use spatially aggregate data are reviewed. Next, problems associated with the utilization of aggregate data, the so-called modifiable areal unit problem (MAUP), are detailed and the need for fine resolution data to support public transit planning is argued. Fine resolution data is generated using intelligent interpolation techniques with the help of remote sensing imagery. In particular, impervious surface fraction, an important socio-economic indicator, is estimated through a fully constrained linear spectral mixture model using Landsat Enhanced Thematic Mapper Plus (ETM+) data within the metropolitan area of Columbus, Ohio in the United States. Four endmembers, low albedo, high albedo, vegetation, and soil are selected to model heterogeneous urban land cover. Impervious surface fraction is estimated by analyzing low and high albedo endmembers. With the derived impervious surface fraction, three spatial interpolation methods, spatial regression, dasymetric mapping, and cokriging, are developed to interpolate detailed population density. Results suggest that cokriging applied to impervious surface is a better alternative for estimating fine resolution population density. With the derived fine resolution data, a multiple