WorldWideScience

Sample records for network based call

  1. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  2. Evidence That Calls-Based and Mobility Networks Are Isomorphic

    OpenAIRE

    Coscia, Michele; Hausmann, Ricardo

    2015-01-01

    Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network a...

  3. DeepNano: Deep recurrent neural networks for base calling in MinION nanopore reads.

    Directory of Open Access Journals (Sweden)

    Vladimír Boža

    Full Text Available The MinION device by Oxford Nanopore produces very long reads (reads over 100 kBp were reported; however it suffers from high sequencing error rate. We present an open-source DNA base caller based on deep recurrent neural networks and show that the accuracy of base calling is much dependent on the underlying software and can be improved by considering modern machine learning methods. By employing carefully crafted recurrent neural networks, our tool significantly improves base calling accuracy on data from R7.3 version of the platform compared to the default base caller supplied by the manufacturer. On R9 version, we achieve results comparable to Nanonet base caller provided by Oxford Nanopore. Availability of an open source tool with high base calling accuracy will be useful for development of new applications of the MinION device, including infectious disease detection and custom target enrichment during sequencing.

  4. Base Station Ordering for Emergency Call Localization in Ultra-dense Cellular Networks

    KAUST Repository

    Elsawy, Hesham

    2017-10-04

    This paper proposes the base station ordering localization technique (BoLT) for emergency call localization in cellular networks. Exploiting the foreseen ultra-densification of the next-generation (5G and beyond) cellular networks, we utilize higher-order Voronoi tessellations to provide ubiquitous localization services that are in compliance to the public safety standards in cellular networks. The proposed localization algorithm runs at the base stations (BSs) and requires minimal operation from agents (i.e., mobile users). Particularly, BoLT requires each agent to feedback a neighbor cell list (NCL) that contains the order of neighboring BSs based on the received signal power in the pilots sent from these BSs. Moreover, this paper utilizes stochastic geometry to develop a tractable mathematical model to assess the performance of BoLT in a general network setting. The goal of this paper is to answer the following two fundamental questions: i) how many BSs should be ordered and reported by the agent to achieve a desirable localization accuracy? and ii) what is the localization error probability given that the pilot signals are subject to shadowing? Assuming that the BSs are deployed according to a Poisson point process (PPP), we answer these two questions via characterizing the tradeoff between the area of location region (ALR) and the localization error probability in terms of the number of BSs ordered by the agent. The results show that reporting the order of six neighboring BSs is sufficient to localize the agent within 10% of the cell area. Increasing the number of reported BSs to ten confines the location region to 1% of the cell area. This would translate to the range of a few meters to decimeters in the foreseen ultra-dense 5G networks.

  5. Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph

    Directory of Open Access Journals (Sweden)

    Jae-wook Jang

    2015-01-01

    Full Text Available As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using features driven from the graph structure of their system calls. To achieve that, we first construct a system call graph that consists of system calls found in the execution of the individual malware families. To explore distinguishing features of various malware species, we study social network properties as applied to the call graph, including the degree distribution, degree centrality, average distance, clustering coefficient, network density, and component ratio. We utilize features driven from those properties to build a classifier for malware families. Our experimental results show that “influence-based” graph metrics such as the degree centrality are effective for classifying malware, whereas the general structural metrics of malware are less effective for classifying malware. Our experiments demonstrate that the proposed system performs well in detecting and classifying malware families within each malware class with accuracy greater than 96%.

  6. Optimal Priority-based Call Admission Control Scheme For QoS Provisioning in Heterogeneous Wireless Networks

    OpenAIRE

    Wen Chen; Jinming Yu; Feng Pan

    2011-01-01

    Next generation wireless networks will support a diverse set of access technologies. And the demanding breed of multimedia applications will even more considerably require Quality of Service (QoS) support. This paper proposes an optimal prority-based Call Admission Control (CAC) scheme in heterogeneous wireless networks, i.e., the generalized semi-Markov Decision Process based CAC (GCAC). Considering the limitations of the traditional Markov decision process for optimal CAC policy, we charact...

  7. CNNdel: Calling Structural Variations on Low Coverage Data Based on Convolutional Neural Networks

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2017-01-01

    Full Text Available Many structural variations (SVs detection methods have been proposed due to the popularization of next-generation sequencing (NGS. These SV calling methods use different SV-property-dependent features; however, they all suffer from poor accuracy when running on low coverage sequences. The union of results from these tools achieves fairly high sensitivity but still produces low accuracy on low coverage sequence data. That is, these methods contain many false positives. In this paper, we present CNNdel, an approach for calling deletions from paired-end reads. CNNdel gathers SV candidates reported by multiple tools and then extracts features from aligned BAM files at the positions of candidates. With labeled feature-expressed candidates as a training set, CNNdel trains convolutional neural networks (CNNs to distinguish true unlabeled candidates from false ones. Results show that CNNdel works well with NGS reads from 26 low coverage genomes of the 1000 Genomes Project. The paper demonstrates that convolutional neural networks can automatically assign the priority of SV features and reduce the false positives efficaciously.

  8. Communication cliques in mobile phone calling networks

    Science.gov (United States)

    Li, Ming-Xia; Xie, Wen-Jie; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2015-11-01

    People in modern societies form different social networks through numerous means of communication. These communication networks reflect different aspects of human's societal structure. The billing records of calls among mobile phone users enable us to construct a directed calling network (DCN) and its Bonferroni network (SVDCN) in which the preferential communications are statistically validated. Here we perform a comparative investigation of the cliques of the original DCN and its SVDCN constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that the statistical properties of the cliques of the two calling networks are qualitatively similar and the clique members in the DCN and the SVDCN exhibit idiosyncratic behaviors quantitatively. Members in large cliques are found to be spatially close to each other. Based on the clique degree profile of each mobile phone user, the most active users in the two calling networks can be classified in to several groups. The users in different groups are found to have different calling behaviors. Our study unveils interesting communication behaviors among mobile phone users that are densely connected to each other.

  9. Call Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network

    Directory of Open Access Journals (Sweden)

    Neeta Nathani

    2017-08-01

    Full Text Available The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power Wireless Personal Area Network based protocol from sensor to Gateway Cluster Head. For Cognitive Radio-Media Access Control protocol for Gateway to Cognitive Radio-Base Station communication, it will use vacant channels of licensed band. Standalone secondary users of Cognitive Radio Network shall be considered as a Gateway with one user. The Gateway will handle multi-channel multi radio for communication with Base Station. Cognitive Radio Network operators shall define various traffic data accumulation counters at Base Station for storing signal strength, Carrier-to-Interference and Noise Ratio, etc. parameters and record channel occupied/vacant status. The researches has been done so far using hour as interval is too long for parameters like holding time expressed in minutes and hence channel vacant/occupied status time is only probabilistically calculated. In the present work, an infrastructure based architecture has been proposed which polls channel status each minute in contrary to hourly polling of data. The Gateways of the Cognitive Radio Network shall monitor status of each Primary User periodically inside its working range and shall inform to Cognitive Radio- Base Station for preparation of minutewise database. For simulation, the occupancy data for all primary user channels were pulled in one minute interval from a live mobile network. Hourly traffic data and minutewise holding times has been analyzed to optimize the parameters of Seasonal Auto Regressive Integrated Moving Average prediction model. The blocking probability of an incoming Cognitive Radio call has been

  10. Call Admission Control in Mobile Cellular Networks

    CERN Document Server

    Ghosh, Sanchita

    2013-01-01

    Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently.      CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators.  The second approach is concerned with formulation of CAC ...

  11. Call Duration Characteristics based on Customers Location

    Directory of Open Access Journals (Sweden)

    Žvinys Karolis

    2014-05-01

    Full Text Available Nowadays a lot of different researches are performed based on call duration distributions (CDD analysis. However, the majority of studies are linked with social relationships between the people. Therefore the scarcity of information, how the call duration is associated with a user's location, is appreciable. The goal of this paper is to reveal the ties between user's voice call duration and the location of call. For this reason we analyzed more than 5 million calls from real mobile network, which were made over the base stations located in rural areas, roads, small towns, business and entertainment centers, residential districts. According to these site types CDD’s and characteristic features for call durations are given and discussed. Submitted analysis presents the users habits and behavior as a group (not an individual. The research showed that CDD’s of customers being them in different locations are not equal. It has been found that users at entertainment, business centers are tend to talk much shortly, than people being at home. Even more CDD can be distorted strongly, when machinery calls are evaluated. Hence to apply a common CDD for a whole network it is not recommended. The study also deals with specific parameters of call duration for distinguished user groups, the influence of network technology for call duration is considered.

  12. Mitigating Handoff Call Dropping in Wireless Cellular Networks: A Call Admission Control Technique

    Science.gov (United States)

    Ekpenyong, Moses Effiong; Udoh, Victoria Idia; Bassey, Udoma James

    2016-06-01

    Handoff management has been an important but challenging issue in the field of wireless communication. It seeks to maintain seamless connectivity of mobile users changing their points of attachment from one base station to another. This paper derives a call admission control model and establishes an optimal step-size coefficient (k) that regulates the admission probability of handoff calls. An operational CDMA network carrier was investigated through the analysis of empirical data collected over a period of 1 month, to verify the performance of the network. Our findings revealed that approximately 23 % of calls in the existing system were lost, while 40 % of the calls (on the average) were successfully admitted. A simulation of the proposed model was then carried out under ideal network conditions to study the relationship between the various network parameters and validate our claim. Simulation results showed that increasing the step-size coefficient degrades the network performance. Even at optimum step-size (k), the network could still be compromised in the presence of severe network crises, but our model was able to recover from these problems and still functions normally.

  13. Adaptive control of call acceptance in WCDMA network

    Directory of Open Access Journals (Sweden)

    Milan Manojle Šunjevarić

    2013-10-01

    Full Text Available In this paper, an overview of the algorithms for access control in mobile wireless networks is presented. A review of adaptive control methods of accepting a call in WCDMA networks is discussed, based on the overview of the algorithms used for this purpose, and their comparison. Appropriate comments and conculsions in comparison with the basic characteristics of these algorithms are given. The OVSF codes are explained as well as how the allocation method influences the capacity and probability of blocking.. Introduction We are witnessing a steady increase in the number of demands placed upon modern wireless networks. New applications and an increasing number of users as well as user activities growth in recent years reinforce the need for an efficient use of the spectrum and its proper distribution among different applications and classes of services. Besides humans, the last few years saw different computers, machines, applications, and, in the future, many other devices, RFID applications, and finally networked objects, as a new kind of wireless networks "users". Because of the exceptional rise in the number of users, the demands placed upon modern wireless networks are becoming larger, and spectrum management plays an important role. For these reasons, choosing an appropriate call admission control algorithm is of great importance. Multiple access and resource management in wireless networks Radio resource management of mobile networks is a set of algorithms to manage the use of radio resources with the aim is to maximize the total capacity of wireless systems with equal distribution of resources to users. Management of radio resources in cellular networks is usually located in the base station controller, the base station and the mobile terminal, and is based on decisions made on appropriate measurement and feedback. It is often defined as the maximum volume of traffic load that the system can provide for some of the requirements for the

  14. Wireless cellular networks with Pareto-distributed call holding times

    Science.gov (United States)

    Rodriguez-Dagnino, Ramon M.; Takagi, Hideaki

    2001-07-01

    Nowadays, there is a growing interest in providing internet to mobile users. For instance, NTT DoCoMo in Japan deploys an important mobile phone network with that offers the Internet service, named 'i-mode', to more than 17 million subscribers. Internet traffic measurements show that the session duration of Call Holding Time (CHT) has probability distributions with heavy-tails, which tells us that they depart significantly from the traffic statistics of traditional voice services. In this environment, it is particularly important to know the number of handovers during a call for a network designer to make an appropriate dimensioning of virtual circuits for a wireless cell. The handover traffic has a direct impact on the Quality of Service (QoS); e.g. the service disruption due to the handover failure may significantly degrade the specified QoS of time-constrained services. In this paper, we first study the random behavior of the number of handovers during a call, where we assume that the CHT are Pareto distributed (heavy-tail distribution), and the Cell Residence Times (CRT) are exponentially distributed. Our approach is based on renewal theory arguments. We present closed-form formulae for the probability mass function (pmf) of the number of handovers during a Pareto distributed CHT, and obtain the probability of call completion as well as handover rates. Most of the formulae are expressed in terms of the Whittaker's function. We compare the Pareto case with cases of $k(subscript Erlang and hyperexponential distributions for the CHT.

  15. Legal Network report calls for decriminalization of prostitution in Canada.

    Science.gov (United States)

    Betteridge, Glenn

    2005-12-01

    In December 2005 the Canadian HIV/AIDS Legal Network released Sex, work, rights: reforming Canadian criminal laws on prostitution. The report examines the ways in which the prostitution-related provisions of the Criminal Code, and their enforcement, have criminalized many aspects of sex workers' lives and have promoted their social marginalization. Evidence indicates that the criminal law has contributed to health and safety risks, including the risk of HIV infection, faced by sex workers. The Legal Network calls for the decriminalization of prostitution in Canada, and for other legal and policy reforms that respect the human rights and promote the health of sex workers. Despite the report's Canadian focus, its human rights analysis is relevant to the situation of sex workers in other countries where prostitution is illegal and sex workers face rights abuses. In this article, Glenn Betteridge, the principal author of the report, briefly sets out the case for law reform.

  16. Voice Communications over 802.11 Ad Hoc Networks: Modeling, Optimization and Call Admission Control

    Science.gov (United States)

    Xu, Changchun; Xu, Yanyi; Liu, Gan; Liu, Kezhong

    Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MAC layer. The model is applied for performance analysis of voice communications over IEEE 802.11 single-hop ad hoc networks. By using the model, we finish the performance optimization of IEEE MAC layer and obtain the maximum number of voice calls in IEEE 802.11 ad hoc networks as well as the statistical performance bounds. Furthermore, we design a fully distributed call admission control (CAC) algorithm which can provide strict statistical QoS guarantee for voice communications over IEEE 802.11 ad hoc networks. Extensive simulations indicate the accuracy of the analytical model and the CAC scheme.

  17. Sinc-function based Network

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1999-01-01

    The purpose of this paper is to describe a neural network (SNN), that is based on Shannons ideas of reconstruction of a real continuous function from its samples. The basic function, used in this network, is the Sinc-function. Two learning algorithms are described. A simple one called IM-learning......The purpose of this paper is to describe a neural network (SNN), that is based on Shannons ideas of reconstruction of a real continuous function from its samples. The basic function, used in this network, is the Sinc-function. Two learning algorithms are described. A simple one called IM...

  18. Task Based Language Teaching: Development of CALL

    Science.gov (United States)

    Anwar, Khoirul; Arifani, Yudhi

    2016-01-01

    The dominant complexities of English teaching in Indonesia are about limited development of teaching methods and materials which still cannot optimally reflect students' needs (in particular of how to acquire knowledge and select the most effective learning models). This research is to develop materials with complete task-based activities by using…

  19. Design considerations for CALL based upon evaluation criteria for ...

    African Journals Online (AJOL)

    This article presents a rubric for the evaluation of Computer-Assisted Language Learning (CALL) software based on international recommendations for effective CALL. After a brief overview of the pedagogical and implementation fundamentals of CALL, and a discussion of what should be included in a needs analysis for ...

  20. Who's calling? Social networks and mobile phone use among motorcyclists.

    Science.gov (United States)

    De Gruyter, Chris; Truong, Long T; Nguyen, Hang T T

    2017-06-01

    Mobile phone use while riding a motorcycle poses a key safety risk, particularly among younger people who have been found to be more susceptible to distracted driving. While previous research has examined the influence of social networks on mobile phone use while driving a car, no research has explored this association in the context of motorcycle use. Using a survey of university students in Vietnam, this research explores the association between social networks and mobile phone use among motorcyclists and the links this has to reported crashes/falls. Results show that the majority of students are most likely to use a mobile phone to communicate with a friend while riding, either through talking (56.5%) or text messaging (62.0%). However, respondents who frequently talk to a girlfriend/boyfriend or spouse while riding were more likely to experience a crash/fall than those who frequently talk with others while riding (e.g. parent, brother/sister). In addition, those who frequently text message a friend while riding were more likely to experience a crash/fall than those who frequently text message others while riding. The results highlight a clear association between social networks and mobile phone use while riding a motorcycle. Developing a culture of societal norms, where mobile phone use while riding a motorcycle is considered socially unacceptable, will help to reduce the prevalence and ultimate crash risk associated with mobile phone use while riding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Optimization of European call options considering physical delivery network and reservoir operation rules

    Science.gov (United States)

    Cheng, Wei-Chen; Hsu, Nien-Sheng; Cheng, Wen-Ming; Yeh, William W.-G.

    2011-10-01

    This paper develops alternative strategies for European call options for water purchase under hydrological uncertainties that can be used by water resources managers for decision making. Each alternative strategy maximizes its own objective over a selected sequence of future hydrology that is characterized by exceedance probability. Water trade provides flexibility and enhances water distribution system reliability. However, water trade between two parties in a regional water distribution system involves many issues, such as delivery network, reservoir operation rules, storage space, demand, water availability, uncertainty, and any existing contracts. An option is a security giving the right to buy or sell an asset; in our case, the asset is water. We extend a flow path-based water distribution model to include reservoir operation rules. The model simultaneously considers both the physical distribution network as well as the relationships between water sellers and buyers. We first test the model extension. Then we apply the proposed optimization model for European call options to the Tainan water distribution system in southern Taiwan. The formulation lends itself to a mixed integer linear programming model. We use the weighing method to formulate a composite function for a multiobjective problem. The proposed methodology provides water resources managers with an overall picture of water trade strategies and the consequence of each strategy. The results from the case study indicate that the strategy associated with a streamflow exceedence probability of 50% or smaller should be adopted as the reference strategy for the Tainan water distribution system.

  2. Criteria for Evaluating a Game-Based CALL Platform

    Science.gov (United States)

    Ní Chiaráin, Neasa; Ní Chasaide, Ailbhe

    2017-01-01

    Game-based Computer-Assisted Language Learning (CALL) is an area that currently warrants attention, as task-based, interactive, multimodal games increasingly show promise for language learning. This area is inherently multidisciplinary--theories from second language acquisition, games, and psychology must be explored and relevant concepts from…

  3. A Set of Free Cross-Platform Authoring Programs for Flexible Web-Based CALL Exercises

    Science.gov (United States)

    O'Brien, Myles

    2012-01-01

    The Mango Suite is a set of three freely downloadable cross-platform authoring programs for flexible network-based CALL exercises. They are Adobe Air applications, so they can be used on Windows, Macintosh, or Linux computers, provided the freely-available Adobe Air has been installed on the computer. The exercises which the programs generate are…

  4. Loss Performance Modeling for Hierarchical Heterogeneous Wireless Networks With Speed-Sensitive Call Admission Control

    DEFF Research Database (Denmark)

    Huang, Qian; Huang, Yue-Cai; Ko, King-Tim

    2011-01-01

    A hierarchical overlay structure is an alternative solution that integrates existing and future heterogeneous wireless networks to provide subscribers with better mobile broadband services. Traffic loss performance in such integrated heterogeneous networks is necessary for an operator's network...... dimensioning and planning. This paper investigates the computationally efficient loss performance modeling for multiservice in hierarchical heterogeneous wireless networks. A speed-sensitive call admission control (CAC) scheme is considered in our model to assign overflowed calls to appropriate tiers....... This approach avoids unnecessary and frequent handoff between cells and reduces signaling overheads. An approximation model with guaranteed accuracy and low computational complexity is presented for the loss performance of multiservice traffic. The accuracy of numerical results is validated by comparing...

  5. Call-Center Based Disease Management of Pediatric Asthmatics

    Science.gov (United States)

    2006-04-01

    Cagnani CE. Allergic rhinitis and asthma in children: disease management and outcomes. Current Allergy & Asthma Reports. 1(6):515-22, 2001. 58. Chan...of Pediatric Asthmatics PRINCIPAL INVESTIGATOR: James M. Quinn, M.D. CONTRACTING ORGANIZATION: The Geneva Foundation...CONTRACT NUMBER Call-Center Based Disease Management of Pediatric Asthmatics 5b. GRANT NUMBER DAMD17-02-1-0182 5c. PROGRAM ELEMENT NUMBER 6

  6. Call-graph-based inter-class MM path generation

    Science.gov (United States)

    He, Wei; Zhao, Ruilian

    2012-01-01

    Inter-class testing is the testing of classes for composing an object-oriented system or subsystem during integration. MM Path is defined as an interleaved sequence of method executions linked by messages. It represents the interactions between methods in object-oriented software well, hence fits for object-oriented integration testing. However, the current MM Path generation methods only support intra-class testing. In this paper, a call-graph-based approach is proposed to promote MM Path automatic generation from intra-class to inter-class level. The approach is evaluated by controlled experiments on 12 Java benchmark programs with two typical call graph construction algorithms, Class Hierarchy Analysis and Anderson's Points-to Analysis. Then, the impact of the two algorithms on inter-class MM path generation efficiency is studied. The result shows that our approach is practicable and Anderson's Points-to Analysis outperforms Class Hierarchy Analysis for inter-class MM Path generation.

  7. Adaptive call admission control and resource allocation in multi server wireless/cellular network

    Science.gov (United States)

    Jain, Madhu; Mittal, Ragini

    2016-11-01

    The ever increasing demand of the subscribers has put pressure on the capacity of wireless networks around the world. To utilize the scare resources, in the present paper we propose an optimal allocation scheme for an integrated wireless/cellular model with handoff priority and handoff guarantee services. The suggested algorithm optimally allocates the resources in each cell and dynamically adjust threshold to control the admission. To give the priority to handoff calls over the new calls, the provision of guard channels and subrating scheme is taken into consideration. The handoff voice call may balk and renege from the system while waiting in the buffer. An iterative algorithm is implemented to generate the arrival rate of the handoff calls in each cell. Various performance indices are established in term of steady state probabilities. The sensitivity analysis has also been carried out to examine the tractability of algorithms and to explore the effects of system descriptors on the performance indices.

  8. Effect of call-clubs to institute local network effects in mobile telecommunication and its′ implications on brand loyalty

    Directory of Open Access Journals (Sweden)

    Karunarathne E. A .C. P

    2017-03-01

    Full Text Available As a result of rapid technological advancements in the mobile telecommunication industry, many firms have set their strategies to target larger customer bases since it forecasts extensive future profit generation. Due to severe competition, while employing successful customer loyalty strategies, customer locked-in strategies are also commonly used in the telecommunication industry to retain their customers within the firm. Call-clubs benefits are one of the commonly used strategies used to create local network effects in the mobile telecommunication market place. Thus, this paper targets to provide insight on the implication of subscriber’s involvement in call-clubs on their loyalty towards service providers. A survey based quantitative approach was followed for this study and the data was gathered through a structured off-line questionnaire from randomly selected mobile users in Sri Lanka. Based on collected valid responses, analysis was carried out to answer the designed research hypotheses and structural equation modelling techniques were mainly used for statistical analysis. As per the analysis, research model shows a fairly high level of explanatory power with customer loyalty and perceived call-clubs benefits which indicate customers′ preference towards the service provider when most frequently contacting parties are using the same network. Further analysis was carried out to investigate the moderating effect on call-clubs benefits and customer loyalty relationships due to two main technological advancements; namely, Internet based voice calling facility and multiple connection access facility. Based on the analysis results recommendations were made to track the value of call-clubs strategies accordingly.

  9. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Voice Call Analysis

    Science.gov (United States)

    2015-09-01

    comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to...multimedia communication sessions, such as voice and video calls over IP networks. It is defined in ITEF RFC 3261.2 This protocol defines the messages that...conferences. 4 SIP is implemented using a simple text-based protocol, stepping through session management using a request -response model (e.g., INVITE/OK

  10. Cognitive Radio-based Home Area Networks

    NARCIS (Netherlands)

    Sarijari, M.A.B.

    2016-01-01

    A future home area network (HAN) is envisaged to consist of a large number of devices that support various applications such as smart grid, security and safety systems, voice call, and video streaming. Most of these home devices are communicating based on various wireless networking technologies

  11. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ... (extended from Leavitt, 1965). This text identifies aspects of network-based effectiveness that can benefit from a better understanding of leadership and management development of people, procedures, technology, and organizations...

  12. Design considerations for CALL based upon evaluation criteria for ...

    African Journals Online (AJOL)

    ... be included in a needs analysis for CALL evaluation, the rubric is presented. The author then illustrates how the evaluation criteria in the rubric can be used in the design of a new CALL system. Keywords: Software evaluation, CALL, language laboratory, MarkWrite, writing across the curriculum, software development ...

  13. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  14. Learning Based Approach for Optimal Clustering of Distributed Program's Call Flow Graph

    Science.gov (United States)

    Abofathi, Yousef; Zarei, Bager; Parsa, Saeed

    Optimal clustering of call flow graph for reaching maximum concurrency in execution of distributable components is one of the NP-Complete problems. Learning automatas (LAs) are search tools which are used for solving many NP-Complete problems. In this paper a learning based algorithm is proposed to optimal clustering of call flow graph and appropriate distributing of programs in network level. The algorithm uses learning feature of LAs to search in state space. It has been shown that the speed of reaching to solution increases remarkably using LA in search process, and it also prevents algorithm from being trapped in local minimums. Experimental results show the superiority of proposed algorithm over others.

  15. Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET [Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Ryan Ari Setyawan

    2015-06-01

    Full Text Available Penelitian ini bertujuan menganalisis kinerja aplikasi  VoIP call android di jaringan MANET (mobile ad hoc network.  Hasil pengujian menunjukan bahwa aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2% sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. *****This study aims to analyze the performance of VOIP call android application in the MANET (mobile ad hoc network. The results showed that VoIP applications could be implemented in MANET network. The highest  delay is produced in indoor testing  with distance of 11-15 meters,  which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%. The jitter is between 0.01 to 0.06 seconds, while the standard set by CISCO is ≤ 30 ms or 0.03 seconds. Throughput generated in the testing process is between 161 kbps-481 kbps.

  16. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  17. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    2.1.1 Viruses The first use of the term “computer virus ” is attributed to Fred Cohen in 1983. Fred Cohen originally defined a computer virus as a...agents. Once compromised, these systems become part of what is known as a “zombie” network. 2.1.3 Trojans A Trojan horse is malware pretending to...be benign or useful software. When activated, Trojans perform unauthorized actions such as collecting, modifying, and forging data. Unlike viruses

  18. Evaluation of the functional status of learning networks based on the dimensions defining communities of practice

    NARCIS (Netherlands)

    Meijs, Celeste; Prinsen, Fleur; De Laat, Maarten

    2017-01-01

    Abstract: Learning in professional networks is gaining popularity in teachers’ professional development. To study how teachers evaluated their networks, we developed a questionnaire called the ‘network barometer’ to inquire functioning according to three dimensions based on communities of

  19. Air Base Defense: Different Times Call for Different Methods

    Science.gov (United States)

    2006-12-01

    value.27 As the war rages on in Iraq, Matthew Levitt argues that the U.S. cannot afford to be distracted by the situation there, as terrorists may...serious and more difficult to defend.101 Air bases typically employ infrared and thermal imagers, security sentries, canine patrols and motion-tracking

  20. A CALL-Based Lesson Plan for Teaching Reading Comprehension to Iranian Intermediate EFL Learners

    Science.gov (United States)

    Khoshsima, Hooshang; Khosravani, Mahboobeh

    2014-01-01

    The main purpose of this descriptive research is to provide a CALL (Computer-Assisted Language Learning)-based lesson plan for teaching reading comprehension to Iranian intermediate EFL learners. CALL is a new way of learning and teaching language. It is proved that CALL mainly has positive effects on educational contexts. Although teachers…

  1. Network-Based Management Procedures.

    Science.gov (United States)

    Buckner, Allen L.

    Network-based management procedures serve as valuable aids in organizational management, achievement of objectives, problem solving, and decisionmaking. Network techniques especially applicable to educational management systems are the program evaluation and review technique (PERT) and the critical path method (CPM). Other network charting…

  2. The PAGES 2k Network, Phase 3: Themes and Call for Participation

    Science.gov (United States)

    von Gunten, L.; Mcgregor, H. V.; Martrat, B.; St George, S.; Neukom, R.; Bothe, O.; Linderholm, H. W.; Phipps, S. J.; Abram, N.

    2017-12-01

    The past 2000 years (the "2k" interval) provides critical context for understanding recent anthropogenic forcing of the climate and provides baseline information about the characteristics of natural climate variability. It also presents opportunities to improve the interpretation of proxy observations and to evaluate the climate models used to make future projections. Phases 1 and 2 of the PAGES 2k Network focussed on building regional and global surface temperature reconstructions for terrestrial regions and the oceans, and comparing these with model simulations to identify mechanisms of climate variation on interannual to bicentennial time scales. Phase 3 was launched in May 2017 and aims to address major questions around past hydroclimate, climate processes and proxy uncertainties. Its scientific themes are: Theme 1: "Climate Variability, Modes and Mechanisms"Further understand the mechanisms driving regional climate variability and change on interannual to centennial time scales; Theme 2: "Methods and Uncertainties"Reduce uncertainties in the interpretation of observations imprinted in paleoclimatic archives by environmental sensors; Theme 3: "Proxy and Model Understanding"Identify and analyse the extent of agreement between reconstructions and climate model simulations. Research is organized as a linked network of well-defined projects, identified and led by 2k community members. The 2k projects focus on specific scientific questions aligned with Phase 3 themes, rather than being defined along regional boundaries. New 2k projects can be proposed at any time at http://www.pastglobalchanges.org/ini/wg/2k-network/projects An enduring element of PAGES 2k is a culture of collegiality, transparency, and reciprocity. Phase 3 seeks to stimulate community based projects and facilitate collaboration between researchers from different regions and career stages, drawing on the breadth and depth of the global PAGES 2k community. All PAGES 2k projects also promote best

  3. Impact of Queuing on Call Completion Rate in GSM Networks | Nkop ...

    African Journals Online (AJOL)

    In this paper, we use the queuing approach to develop a model for call completion, making signal power considerations as well. A General User Interface (GUI) is designed for the developed model using MATLAB and the impact of queuing on call completion is analysed by carrying out an assessment of the performance of ...

  4. Classification of Echolocation Calls from 14 Species of Bat by Support Vector Machines and Ensembles of Neural Networks

    Directory of Open Access Journals (Sweden)

    Stuart Parsons

    2009-07-01

    Full Text Available Calls from 14 species of bat were classified to genus and species using discriminant function analysis (DFA, support vector machines (SVM and ensembles of neural networks (ENN. Both SVMs and ENNs outperformed DFA for every species while ENNs (mean identification rate – 97% consistently outperformed SVMs (mean identification rate – 87%. Correct classification rates produced by the ENNs varied from 91% to 100%; calls from six species were correctly identified with 100% accuracy. Calls from the five species of Myotis, a genus whose species are considered difficult to distinguish acoustically, had correct identification rates that varied from 91 – 100%. Five parameters were most important for classifying calls correctly while seven others contributed little to classification performance.

  5. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  6. The PAGES 2k Network, Phase 3: Introduction, Goals and Call for Participation

    Science.gov (United States)

    McGregor, Helen; Phipps, Steven; von Gunten, Lucien; Martrat, Belen; Linderholm, Lars; Abram, Nerilie; Bothe, Oliver; Neukom, Raphael; St. George, Scott; Evans, Michael; Kaufman, Darrell; Goosse, Hugues; Turney, Chris

    2017-04-01

    The past 2000 years (the "2k" interval) provides critical context for recent anthropogenic forcing of the climate, baseline information about Earth's natural climate variability, opportunities to improve the interpretation of proxy observations, and evaluation of climate models. The PAGES 2k Network (2008-2013 Phase 1; 2014-2016 Phase 2) built regional and global surface temperature reconstructions for terrestrial regions and the oceans, and used comparison with realistically forced simulations to identify mechanisms of climate variation on interannual to bicentennial time scales. The goals of Phase 3 (2017-2019), which launches in May 2017 at the PAGES Open Science Meeting, are to: 1) Further understand the mechanisms driving regional climate variability and change on interannual to centennial time scales (Theme: "Climate Variability, Modes and Mechanisms"); 2) Reduce uncertainties in the interpretation of observations imprinted in paleoclimatic archives by environmental sensors (Theme: "Methods and Uncertainties"); and 3) Identify and analyse the extent of agreement between reconstructions and climate model simulations (Theme: "Proxy and Model Understanding") Research will be organized as a linked network of well-defined projects and targeted manuscripts, identified and led by 2k members. The 2k projects will focus on specific scientific questions aligned with Phase 3 goals, rather than being defined along regional boundaries. An enduring element from earlier phases of PAGES 2k will be a culture of collegiality, transparency, and reciprocity. Phase 3 seeks to stimulate community based projects and facilitate collaboration of researchers from different regions and career stages, drawing on breadth and depth of the global PAGES 2k community; support end-to-end workflow transparency and open data and knowledge access; and develop collaborations with other research communities and engage with stakeholders. If you would like to participate in PAGES 2k Phase 3 or

  7. RBF neural network based H∞ H∞ H∞ synchronization for ...

    Indian Academy of Sciences (India)

    In this paper, we propose a new H ∞ synchronization strategy, called a Radial Basis Function Neural Network H ∞ synchronization (RBFNNHS) strategy, for ... Based on this neural network and linear matrix inequality (LMI) formulation, the RBFNNHS controller and the learning laws are presented to reduce the effect of ...

  8. Neural network based facial recognition system

    Science.gov (United States)

    Luebbers, Paul G.; Uwechue, Okechukwu A.; Pandya, Abhijit S.

    1994-03-01

    Researchers have for many years tried to develop machine recognition systems using video images of the human face as the input, with limited success. This paper presents a technique for recognizing individuals based on facial features using a novel multi-layer neural network architecture called `PWRNET'. We envision a real-time version of this technique to be used for high security applications. Two systems are proposed. One involves taking a grayscale video image and using it directly, the other involves decomposing the grayscale image into a series of binary images using the isodensity regions of the image. Isodensity regions are the areas within an image where the intensity is within a certain range. The binary image is produced by setting the pixels inside this intensity range to one, and the rest of the pixels in the image to zero. Features based on moments are subsequently extracted from these grayscale images. These features are then used for classification of the image. The classification is accomplished using an artificial neural network called `PWRNET', which produces a polynomial expression of the trained network. There is one neural network for each individual to be identified, with an output value which is either positive or negative identification. A detailed development of the design is presented, and identification for small population of individuals is presented. It is shown that the system is effective for variations in both scale and translation, which are considered to be reasonable variations for this type of facial identification.

  9. An ontology-based nurse call management system (oNCS with probabilistic priority assessment

    Directory of Open Access Journals (Sweden)

    Verhoeve Piet

    2011-02-01

    Full Text Available Abstract Background The current, place-oriented nurse call systems are very static. A patient can only make calls with a button which is fixed to a wall of a room. Moreover, the system does not take into account various factors specific to a situation. In the future, there will be an evolution to a mobile button for each patient so that they can walk around freely and still make calls. The system would become person-oriented and the available context information should be taken into account to assign the correct nurse to a call. The aim of this research is (1 the design of a software platform that supports the transition to mobile and wireless nurse call buttons in hospitals and residential care and (2 the design of a sophisticated nurse call algorithm. This algorithm dynamically adapts to the situation at hand by taking the profile information of staff members and patients into account. Additionally, the priority of a call probabilistically depends on the risk factors, assigned to a patient. Methods The ontology-based Nurse Call System (oNCS was developed as an extension of a Context-Aware Service Platform. An ontology is used to manage the profile information. Rules implement the novel nurse call algorithm that takes all this information into account. Probabilistic reasoning algorithms are designed to determine the priority of a call based on the risk factors of the patient. Results The oNCS system is evaluated through a prototype implementation and simulations, based on a detailed dataset obtained from Ghent University Hospital. The arrival times of nurses at the location of a call, the workload distribution of calls amongst nurses and the assignment of priorities to calls are compared for the oNCS system and the current, place-oriented nurse call system. Additionally, the performance of the system is discussed. Conclusions The execution time of the nurse call algorithm is on average 50.333 ms. Moreover, the oNCS system significantly improves

  10. An ontology-based nurse call management system (oNCS) with probabilistic priority assessment.

    Science.gov (United States)

    Ongenae, Femke; Myny, Dries; Dhaene, Tom; Defloor, Tom; Van Goubergen, Dirk; Verhoeve, Piet; Decruyenaere, Johan; De Turck, Filip

    2011-02-04

    The current, place-oriented nurse call systems are very static. A patient can only make calls with a button which is fixed to a wall of a room. Moreover, the system does not take into account various factors specific to a situation. In the future, there will be an evolution to a mobile button for each patient so that they can walk around freely and still make calls. The system would become person-oriented and the available context information should be taken into account to assign the correct nurse to a call.The aim of this research is (1) the design of a software platform that supports the transition to mobile and wireless nurse call buttons in hospitals and residential care and (2) the design of a sophisticated nurse call algorithm. This algorithm dynamically adapts to the situation at hand by taking the profile information of staff members and patients into account. Additionally, the priority of a call probabilistically depends on the risk factors, assigned to a patient. The ontology-based Nurse Call System (oNCS) was developed as an extension of a Context-Aware Service Platform. An ontology is used to manage the profile information. Rules implement the novel nurse call algorithm that takes all this information into account. Probabilistic reasoning algorithms are designed to determine the priority of a call based on the risk factors of the patient. The oNCS system is evaluated through a prototype implementation and simulations, based on a detailed dataset obtained from Ghent University Hospital. The arrival times of nurses at the location of a call, the workload distribution of calls amongst nurses and the assignment of priorities to calls are compared for the oNCS system and the current, place-oriented nurse call system. Additionally, the performance of the system is discussed. The execution time of the nurse call algorithm is on average 50.333 ms. Moreover, the oNCS system significantly improves the assignment of nurses to calls. Calls generally have a nurse

  11. A Freely-Available Authoring System for Browser-Based CALL with Speech Recognition

    Science.gov (United States)

    O'Brien, Myles

    2017-01-01

    A system for authoring browser-based CALL material incorporating Google speech recognition has been developed and made freely available for download. The system provides a teacher with a simple way to set up CALL material, including an optional image, sound or video, which will elicit spoken (and/or typed) answers from the user and check them…

  12. A gray-box DPDA-based intrusion detection technique using system-call monitoring

    NARCIS (Netherlands)

    Jafarian, Jafar Haadi; Abbasi, Ali; Safaei Sheikhabadi, Siavash

    2011-01-01

    In this paper, we present a novel technique for automatic and efficient intrusion detection based on learning program behaviors. Program behavior is captured in terms of issued system calls augmented with point-of-system-call information, and is modeled according to an efficient deterministic

  13. Energy Efficient Wireless Sensor Network Modelling Based on Complex Networks

    OpenAIRE

    Xiao, Lin; Wu, Fahui; Yang, Dingcheng; Zhang, Tiankui; Zhu, Xiaoya

    2016-01-01

    The power consumption and energy efficiency of wireless sensor network are the significant problems in Internet of Things network. In this paper, we consider the network topology optimization based on complex network theory to solve the energy efficiency problem of WSN. We propose the energy efficient model of WSN according to the basic principle of small world from complex networks. Small world network has clustering features that are similar to that of the rules of the network but also has ...

  14. From calls to communities: a model for time-varying social networks

    Science.gov (United States)

    Laurent, Guillaume; Saramäki, Jari; Karsai, Márton

    2015-11-01

    Social interactions vary in time and appear to be driven by intrinsic mechanisms that shape the emergent structure of social networks. Large-scale empirical observations of social interaction structure have become possible only recently, and modelling their dynamics is an actual challenge. Here we propose a temporal network model which builds on the framework of activity-driven time-varying networks with memory. The model integrates key mechanisms that drive the formation of social ties - social reinforcement, focal closure and cyclic closure, which have been shown to give rise to community structure and small-world connectedness in social networks. We compare the proposed model with a real-world time-varying network of mobile phone communication, and show that they share several characteristics from heterogeneous degrees and weights to rich community structure. Further, the strong and weak ties that emerge from the model follow similar weight-topology correlations as real-world social networks, including the role of weak ties.

  15. Informal value transfer systems and criminal organizations : A study into so-called underground banking networks

    NARCIS (Netherlands)

    Passas, N.

    1999-01-01

    This report presents the findings of a preliminary study into what is commonly called 'underground banking systems'. As the conventional banking industry is increasingly being regulated many fear that criminal organizations may turn to alternatives, such as underground banking systems - or informal

  16. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  17. The association of drinking water treatment and distribution network disturbances with Health Call Centre contacts for gastrointestinal illness symptoms.

    Science.gov (United States)

    Malm, Annika; Axelsson, Gösta; Barregard, Lars; Ljungqvist, Jakob; Forsberg, Bertil; Bergstedt, Olof; Pettersson, Thomas J R

    2013-09-01

    There are relatively few studies on the association between disturbances in drinking water services and symptoms of gastrointestinal (GI) illness. Health Call Centres data concerning GI illness may be a useful source of information. This study investigates if there is an increased frequency of contacts with the Health Call Centre (HCC) concerning gastrointestinal symptoms at times when there is a risk of impaired water quality due to disturbances at water works or the distribution network. The study was conducted in Gothenburg, a Swedish city with 0.5 million inhabitants with a surface water source of drinking water and two water works. All HCC contacts due to GI symptoms (diarrhoea, vomiting or abdominal pain) were recorded for a three-year period, including also sex, age, and geocoded location of residence. The number of contacts with the HCC in the affected geographical areas were recorded during eight periods of disturbances in the water works (e.g. short stops of chlorine dosing), six periods of large disturbances in the distribution network (e.g. pumping station failure or pipe breaks with major consequences), and 818 pipe break and leak repairs over a three-year period. For each period of disturbance the observed number of calls was compared with the number of calls during a control period without disturbances in the same geographical area. In total about 55, 000 calls to the HCC due to GI symptoms were recorded over the three-year period, 35 per 1000 inhabitants and year, but much higher (>200) for children water works or in the distribution network. Our results indicate that GI symptoms due to disturbances in water works or the distribution network are rare. The number of serious failures was, however limited, and further studies are needed to be able to assess the risk of GI illness in such cases. The technique of using geocoded HCC data together with geocoded records of disturbances in the drinking water network was feasible. Copyright © 2013 Elsevier

  18. Restoration in multi-domain GMPLS-based networks

    DEFF Research Database (Denmark)

    Manolova, Anna; Ruepp, Sarah Renée; Dittmann, Lars

    2011-01-01

    are introduced: one based on the position of a failed link, called Location-Based, and another based on minimizing the additional resources consumed during restoration, called Shortest-New. A complete set of simulations in different network scenarios show where each mechanism is more efficient in terms, such as......In this paper, we evaluate the efficiency of using restoration mechanisms in a dynamic multi-domain GMPLS network. Major challenges and solutions are introduced and two well-known restoration schemes (End-to-End and Local-to-End) are evaluated. Additionally, new restoration mechanisms...

  19. Effective Prediction of Errors by Non-native Speakers Using Decision Tree for Speech Recognition-Based CALL System

    Science.gov (United States)

    Wang, Hongcui; Kawahara, Tatsuya

    CALL (Computer Assisted Language Learning) systems using ASR (Automatic Speech Recognition) for second language learning have received increasing interest recently. However, it still remains a challenge to achieve high speech recognition performance, including accurate detection of erroneous utterances by non-native speakers. Conventionally, possible error patterns, based on linguistic knowledge, are added to the lexicon and language model, or the ASR grammar network. However, this approach easily falls in the trade-off of coverage of errors and the increase of perplexity. To solve the problem, we propose a method based on a decision tree to learn effective prediction of errors made by non-native speakers. An experimental evaluation with a number of foreign students learning Japanese shows that the proposed method can effectively generate an ASR grammar network, given a target sentence, to achieve both better coverage of errors and smaller perplexity, resulting in significant improvement in ASR accuracy.

  20. Simulation-based education (SBE) within postgraduate emergency on-call physiotherapy in the United Kingdom.

    Science.gov (United States)

    Gough, Suzanne; Yohannes, Abebaw M; Thomas, Catharine; Sixsmith, Judith

    2013-08-01

    The application and extent of simulation-based education use within cardiorespiratory physiotherapy postgraduate education (in-house/regional provisions) and emergency oncall services were previously unexplored. This survey aimed to investigate the extent to which simulation-based education is currently utilised by physiotherapy services in the UK. A national postal questionnaire-based survey. All 280 National Health Service Critical/Intensive Care Units in England, Northern Ireland, Scotland and Wales, providing emergency on-call physiotherapy services were included in the survey. Emergency on-call physiotherapy service leads. A self-administered 20-item postal questionnaire survey was designed to establish the extent to which simulation-based education was currently being used within cardio-respiratory physiotherapy post-registration training. A useable response rate of 55% (155/280) was achieved, representing a range of respiratory and emergency on-call service leads. Sixty-one Trusts (39%) currently use simulation within acute respiratory or emergency on-call postgraduate training. The provision of simulation equipment varied with respect to type, fidelity and accessible to the physiotherapy service. Simulation-based education featured in emergency on-call induction, updates, competency assessment, assessment skills, treatment skills and scenarios (75, 92, 39, 28, 82, 48% respectively). Simulation is currently used to teach a wide variety of cardio-respiratory physiotherapy skills relevant to the acute respiratory and on-call environments. Adoption was dependent upon local facilities, needs and training requirements. National inconsistencies in availability, fidelity and accessibility were identified. The evidence base surrounding the current use of simulation-based education within physiotherapy is limited and evidence of transferability to the practice arena remains relatively unknown. Future research is warranted to determine the education outcomes, impact

  1. Modeling acquaintance networks based on balance theory

    Directory of Open Access Journals (Sweden)

    Vukašinović Vida

    2014-09-01

    Full Text Available An acquaintance network is a social structure made up of a set of actors and the ties between them. These ties change dynamically as a consequence of incessant interactions between the actors. In this paper we introduce a social network model called the Interaction-Based (IB model that involves well-known sociological principles. The connections between the actors and the strength of the connections are influenced by the continuous positive and negative interactions between the actors and, vice versa, the future interactions are more likely to happen between the actors that are connected with stronger ties. The model is also inspired by the social behavior of animal species, particularly that of ants in their colony. A model evaluation showed that the IB model turned out to be sparse. The model has a small diameter and an average path length that grows in proportion to the logarithm of the number of vertices. The clustering coefficient is relatively high, and its value stabilizes in larger networks. The degree distributions are slightly right-skewed. In the mature phase of the IB model, i.e., when the number of edges does not change significantly, most of the network properties do not change significantly either. The IB model was found to be the best of all the compared models in simulating the e-mail URV (University Rovira i Virgili of Tarragona network because the properties of the IB model more closely matched those of the e-mail URV network than the other models

  2. Biomimetic agent based modelling using male Frog calling behaviour as a case study

    DEFF Research Database (Denmark)

    Jørgensen, Søren V.; Demazeau, Yves; Christensen-Dalsgaard, Jakob

    2014-01-01

    A new agent-based modelling tool has been developed to allow the modelling of populations of individuals whose interactions are characterised by tightly timed dynamics. The tool was developed to model male frog calling dynamics, to facilitate research into what local rules may be employed by indi...

  3. Comparison of Medical Priority Dispatch (MPD) and Criteria Based Dispatch (CBD) relating to cardiac arrest calls.

    Science.gov (United States)

    Hardeland, Camilla; Olasveengen, Theresa M; Lawrence, Rob; Garrison, Danny; Lorem, Tonje; Farstad, Gunnar; Wik, Lars

    2014-05-01

    Prompt emergency medical service (EMS) system activation with rapid delivery of pre-hospital treatment is essential for patients suffering out-of-hospital cardiac arrest (OHCA). The two most commonly used dispatch tools are Medical Priority Dispatch (MPD) and Criteria Based Dispatch (CBD). We compared cardiac arrest call processing using these two dispatch tools in two different dispatch centres. Observational study of adult EMS confirmed (non-EMS witnessed) OHCA calls during one year in Richmond, USA (MPD) and Oslo, Norway (CBD). Patients receiving CPR prior to call, interrupted calls or calls where the caller did not have access to the patients were excluded from analysis. Dispatch logs, ambulance records and digitalized dispatcher and caller voice recordings were compared. The MPDS-site processed 182 cardiac arrest calls and the CBD-site 232, of which 100 and 140 calls met the inclusion criteria, respectively. The recognition of cardiac arrest was not different in the MPD and CBD systems; 82% vs. 77% (p=0.42), and pre-EMS arrival CPR instructions were offered to 81% vs. 74% (p=0.22) of callers, respectively. Time to ambulance dispatch was median (95% confidence interval) 15 (13, 17) vs. 33 (29, 36) seconds (pCBD systems, respectively (p=0.05). Pre-arrival CPR instructions were offered faster and more frequently in the CBD system, but in both systems chest compressions were delayed 3-4min. Earlier recognition of cardiac arrest and improved CPR instructions may facilitate earlier lay rescuer CPR. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  4. Host Event Based Network Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Jonathan Chugg

    2013-01-01

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  5. TotalReCaller: improved accuracy and performance via integrated alignment and base-calling.

    Science.gov (United States)

    Menges, Fabian; Narzisi, Giuseppe; Mishra, Bud

    2011-09-01

    Currently, re-sequencing approaches use multiple modules serially to interpret raw sequencing data from next-generation sequencing platforms, while remaining oblivious to the genomic information until the final alignment step. Such approaches fail to exploit the full information from both raw sequencing data and the reference genome that can yield better quality sequence reads, SNP-calls, variant detection, as well as an alignment at the best possible location in the reference genome. Thus, there is a need for novel reference-guided bioinformatics algorithms for interpreting analog signals representing sequences of the bases ({A, C, G, T}), while simultaneously aligning possible sequence reads to a source reference genome whenever available. Here, we propose a new base-calling algorithm, TotalReCaller, to achieve improved performance. A linear error model for the raw intensity data and Burrows-Wheeler transform (BWT) based alignment are combined utilizing a Bayesian score function, which is then globally optimized over all possible genomic locations using an efficient branch-and-bound approach. The algorithm has been implemented in soft- and hardware [field-programmable gate array (FPGA)] to achieve real-time performance. Empirical results on real high-throughput Illumina data were used to evaluate TotalReCaller's performance relative to its peers-Bustard, BayesCall, Ibis and Rolexa-based on several criteria, particularly those important in clinical and scientific applications. Namely, it was evaluated for (i) its base-calling speed and throughput, (ii) its read accuracy and (iii) its specificity and sensitivity in variant calling. A software implementation of TotalReCaller as well as additional information, is available at: http://bioinformatics.nyu.edu/wordpress/projects/totalrecaller/ fabian.menges@nyu.edu.

  6. Cloud-Based Virtual Laboratory for Network Security Education

    Science.gov (United States)

    Xu, Le; Huang, Dijiang; Tsai, Wei-Tek

    2014-01-01

    Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…

  7. A Spectrum Handoff Scheme for Optimal Network Selection in NEMO Based Cognitive Radio Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2017-01-01

    Full Text Available When a mobile network changes its point of attachments in Cognitive Radio (CR vehicular networks, the Mobile Router (MR requires spectrum handoff. Network Mobility (NEMO in CR vehicular networks is concerned with the management of this movement. In future NEMO based CR vehicular networks deployment, multiple radio access networks may coexist in the overlapping areas having different characteristics in terms of multiple attributes. The CR vehicular node may have the capability to make call for two or more types of nonsafety services such as voice, video, and best effort simultaneously. Hence, it becomes difficult for MR to select optimal network for the spectrum handoff. This can be done by performing spectrum handoff using Multiple Attributes Decision Making (MADM methods which is the objective of the paper. The MADM methods such as grey relational analysis and cost based methods are used. The application of MADM methods provides wider and optimum choice among the available networks with quality of service. Numerical results reveal that the proposed scheme is effective for spectrum handoff decision for optimal network selection with reduced complexity in NEMO based CR vehicular networks.

  8. Formal Specification Based Automatic Test Generation for Embedded Network Systems

    Directory of Open Access Journals (Sweden)

    Eun Hye Choi

    2014-01-01

    Full Text Available Embedded systems have become increasingly connected and communicate with each other, forming large-scaled and complicated network systems. To make their design and testing more reliable and robust, this paper proposes a formal specification language called SENS and a SENS-based automatic test generation tool called TGSENS. Our approach is summarized as follows: (1 A user describes requirements of target embedded network systems by logical property-based constraints using SENS. (2 Given SENS specifications, test cases are automatically generated using a SAT-based solver. Filtering mechanisms to select efficient test cases are also available in our tool. (3 In addition, given a testing goal by the user, test sequences are automatically extracted from exhaustive test cases. We’ve implemented our approach and conducted several experiments on practical case studies. Through the experiments, we confirmed the efficiency of our approach in design and test generation of real embedded air-conditioning network systems.

  9. Towards Transgressive Learning through Ontological Politics: Answering the “Call of the Mountain” in a Colombian Network of Sustainability

    Directory of Open Access Journals (Sweden)

    Martha Chaves

    2016-12-01

    Full Text Available In line with the increasing calls for more transformative and transgressive learning in the context of sustainability studies, this article explores how encounters between different ontologies can lead to socio-ecological sustainability. With the dominant one-world universe increasingly being questioned by those who advocate the existence of many worlds—a so-called pluriverse—there lays the possibility of not only imagining other human–nature realities, but also engaging with them in practice. Moving towards an understanding of what happens when a multiplicity of worlds encounter one another, however, entails a sensitivity to the negotiations between often competing ontologies—or ontological politics. Based on an ethnographic methodology and narrative methods, data were collected from two consecutive intercultural gatherings called El Llamado de la Montaña (The Call of the Mountain, which take place for five days every year in different parts of Colombia. By actively participating in these gatherings of multiplicity, which address complex socio-ecological challenges such as food sovereignty and defence of territory, results show how encounters between different ontologies can result in transformative and potentially transgressive learning in terms of disrupting stubborn routines, norms and hegemonic powers which tend to accelerate unsustainability. Although we argue that a fundamental part of the wicked sustainability puzzle lies in supporting more relational ontologies, we note that such learning environments also lead to conflicts through inflexibility and (abuse of power which must be addressed if sustained socio-ecological learning is to take place.

  10. A modulator based regulatory network for ERα signaling pathway.

    Science.gov (United States)

    Wu, Heng-Yi; Zheng, Pengyue; Jiang, Guanglong; Liu, Yunlong; Nephew, Kenneth P; Huang, Tim H M; Li, Lang

    2012-01-01

    Estrogens control multiple functions of hormone-responsive breast cancer cells. They regulate diverse physiological processes in various tissues through genomic and non-genomic mechanisms that result in activation or repression of gene expression. Transcription regulation upon estrogen stimulation is a critical biological process underlying the onset and progress of the majority of breast cancer. ERα requires distinct co-regulator or modulators for efficient transcriptional regulation, and they form a regulatory network. Knowing this regulatory network will enable systematic study of the effect of ERα on breast cancer. To investigate the regulatory network of ERα and discover novel modulators of ERα functions, we proposed an analytical method based on a linear regression model to identify translational modulators and their network relationships. In the network analysis, a group of specific modulator and target genes were selected according to the functionality of modulator and the ERα binding. Network formed from targets genes with ERα binding was called ERα genomic regulatory network; while network formed from targets genes without ERα binding was called ERα non-genomic regulatory network. Considering the active or repressive function of ERα, active or repressive function of a modulator, and agonist or antagonist effect of a modulator on ERα, the ERα/modulator/target relationships were categorized into 27 classes. Using the gene expression data and ERα Chip-seq data from the MCF-7 cell line, the ERα genomic/non-genomic regulatory networks were built by merging ERα/ modulator/target triplets (TF, M, T), where TF refers to the ERα, M refers to the modulator, and T refers to the target. Comparing these two networks, ERα non-genomic network has lower FDR than the genomic network. In order to validate these two networks, the same network analysis was performed in the gene expression data from the ZR-75.1 cell. The network overlap analysis between two

  11. Feature Selection for Natural Language Call Routing Based on Self-Adaptive Genetic Algorithm

    Science.gov (United States)

    Koromyslova, A.; Semenkina, M.; Sergienko, R.

    2017-02-01

    The text classification problem for natural language call routing was considered in the paper. Seven different term weighting methods were applied. As dimensionality reduction methods, the feature selection based on self-adaptive GA is considered. k-NN, linear SVM and ANN were used as classification algorithms. The tasks of the research are the following: perform research of text classification for natural language call routing with different term weighting methods and classification algorithms and investigate the feature selection method based on self-adaptive GA. The numerical results showed that the most effective term weighting is TRR. The most effective classification algorithm is ANN. Feature selection with self-adaptive GA provides improvement of classification effectiveness and significant dimensionality reduction with all term weighting methods and with all classification algorithms.

  12. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  13. Orion: a web-based application designed to monitor resident and fellow performance on-call.

    Science.gov (United States)

    Itri, Jason N; Kim, Woojin; Scanlon, Mary H

    2011-10-01

    Radiology residency and fellowship training provides a unique opportunity to evaluate trainee performance and determine the impact of various educational interventions. We have developed a simple software application (Orion) using open-source tools to facilitate the identification and monitoring of resident and fellow discrepancies in on-call preliminary reports. Over a 6-month period, 19,200 on-call studies were interpreted by 20 radiology residents, and 13,953 on-call studies were interpreted by 25 board-certified radiology fellows representing eight subspecialties. Using standard review macros during faculty interpretation, each of these reports was classified as "agreement", "minor discrepancy", and "major discrepancy" based on the potential to impact patient management or outcome. Major discrepancy rates were used to establish benchmarks for resident and fellow performance by year of training, modality, and subspecialty, and to identify residents and fellows demonstrating a significantly higher major discrepancy rate compared with their classmates. Trends in discrepancies were used to identify subspecialty-specific areas of increased major discrepancy rates in an effort to tailor the didactic and case-based curriculum. A series of missed-case conferences were developed based on trends in discrepancies, and the impact of these conferences is currently being evaluated. Orion is a powerful information technology tool that can be used by residency program directors, fellowship programs directors, residents, and fellows to improve radiology education and training.

  14. Knowledge-Based Network Operations

    Science.gov (United States)

    Wu, Chuan-lin; Hung, Chaw-Kwei; Stedry, Steven P.; McClure, James P.; Yeh, Show-Way

    1988-03-01

    An expert system is being implemented for enhancing operability of the Ground Communication Facility (GCF) of Jet Propulsion Laboratory's (JPL) Deep Space Network (DSN). The DSN is a tracking network for all of JPL's spacecraft plus a subset of spacecrafts launched by other NASA centers. A GCF upgrade task is set to replace the current GCF aging system with new, modern equipments which are capable of using knowledge-based monitor and control approach. The expert system, implemented in terms of KEE and SUN workstation, is used for performing network fault management, configuration management, and performance management in real-time. Monitor data are collected from each processor and DSCC's in every five seconds. In addition to serving as input parameters of the expert system, extracted management information is used to update a management information database. For the monitor and control purpose, software of each processor is divided into layers following the OSI standard. Each layer is modeled as a finite state machine. A System Management Application Process (SMAP) is implemented at application layer, which coordinates layer managers of the same processor and communicates with peer SMAPs of other processors. The expert system will be tuned by augmenting the production rules as the operation is going on, and its performance will be measured.

  15. Estimating Phred scores of Illumina base calls by logistic regression and sparse modeling.

    Science.gov (United States)

    Zhang, Sheng; Wang, Bo; Wan, Lin; Li, Lei M

    2017-07-11

    Phred quality scores are essential for downstream DNA analysis such as SNP detection and DNA assembly. Thus a valid model to define them is indispensable for any base-calling software. Recently, we developed the base-caller 3Dec for Illumina sequencing platforms, which reduces base-calling errors by 44-69% compared to the existing ones. However, the model to predict its quality scores has not been fully investigated yet. In this study, we used logistic regression models to evaluate quality scores from predictive features, which include different aspects of the sequencing signals as well as local DNA contents. Sparse models were further obtained by three methods: the backward deletion with either AIC or BIC and the L 1 regularization learning method. The L 1 -regularized one was then compared with the Illumina scoring method. The L 1 -regularized logistic regression improves the empirical discrimination power by as large as 14 and 25% respectively for two kinds of preprocessed sequencing signals, compared to the Illumina scoring method. Namely, the L 1 method identifies more base calls of high fidelity. Computationally, the L 1 method can handle large dataset and is efficient enough for daily sequencing. Meanwhile, the logistic model resulted from BIC is more interpretable. The modeling suggested that the most prominent quenching pattern in the current chemistry of Illumina occurred at the dinucleotide "GT". Besides, nucleotides were more likely to be miscalled as the previous bases if the preceding ones were not "G". It suggested that the phasing effect of bases after "G" was somewhat different from those after other nucleotide types.

  16. UPM: unified policy-based network management

    Science.gov (United States)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  17. A freely-available authoring system for browser-based CALL with speech recognition

    Directory of Open Access Journals (Sweden)

    Myles O'Brien

    2017-06-01

    Full Text Available A system for authoring browser-based CALL material incorporating Google speech recognition has been developed and made freely available for download. The system provides a teacher with a simple way to set up CALL material, including an optional image, sound or video, which will elicit spoken (and/or typed answers from the user and check them against a list of specified permitted answers, giving feedback with hints when necessary. The teacher needs no HTML or Javascript expertise, just the facilities and ability to edit text files and upload to the Internet. The structure and functioning of the system are explained in detail, and some suggestions are given for practical use. Finally, some of its limitations are described.

  18. High performance network and channel-based storage

    Science.gov (United States)

    Katz, Randy H.

    1991-01-01

    In the traditional mainframe-centered view of a computer system, storage devices are coupled to the system through complex hardware subsystems called input/output (I/O) channels. With the dramatic shift towards workstation-based computing, and its associated client/server model of computation, storage facilities are now found attached to file servers and distributed throughout the network. We discuss the underlying technology trends that are leading to high performance network-based storage, namely advances in networks, storage devices, and I/O controller and server architectures. We review several commercial systems and research prototypes that are leading to a new approach to high performance computing based on network-attached storage.

  19. High-performance network and channel based storage

    Science.gov (United States)

    Katz, Randy H.

    1992-01-01

    In the traditional mainframe-centered view of a computer system, storage devices are coupled to the system through complex hardware subsystems called I/O channels. With the dramatic shift toward workstation-based computing, and its associated client/server model of computation, storage facilities are now found attached to file servers and distributed throughout the network. In this paper, we discuss the underlying technology trends that are leading to high-performance network-based storage, namely advances in networks, storage devices, and I/O controller and server architectures. We review several commercial systems and research prototypes that are leading to a new approach to high-performance computing based on network-attached storage.

  20. Identifying key nodes in multilayer networks based on tensor decomposition

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  1. An acoustical model based monitoring network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der

    2010-01-01

    In this paper the approach for an acoustical model based monitoring network is demonstrated. This network is capable of reconstructing a noise map, based on the combination of measured sound levels and an acoustic model of the area. By pre-calculating the sound attenuation within the network the

  2. A practice-based research network on the survival of ceramic inlay/onlay restorations

    NARCIS (Netherlands)

    Collares, K.; Correa, M.B.; Laske, M.; Kramer, E.; Reiss, B.; Moraes, R.R.; Huysmans, M.C.; Opdam, N.J.

    2016-01-01

    OBJECTIVE: To evaluate prospectively the longevity of ceramic inlay/onlay restorations placed in a web-based practice-based research network and to investigate risk factors associated with restoration failures. MATERIALS AND METHODS: Data were collected by a practice-based research network called

  3. A complex network-based importance measure for mechatronics systems

    Science.gov (United States)

    Wang, Yanhui; Bi, Lifeng; Lin, Shuai; Li, Man; Shi, Hao

    2017-01-01

    In view of the negative impact of functional dependency, this paper attempts to provide an alternative importance measure called Improved-PageRank (IPR) for measuring the importance of components in mechatronics systems. IPR is a meaningful extension of the centrality measures in complex network, which considers usage reliability of components and functional dependency between components to increase importance measures usefulness. Our work makes two important contributions. First, this paper integrates the literature of mechatronic architecture and complex networks theory to define component network. Second, based on the notion of component network, a meaningful IPR is brought into the identifying of important components. In addition, the IPR component importance measures, and an algorithm to perform stochastic ordering of components due to the time-varying nature of usage reliability of components and functional dependency between components, are illustrated with a component network of bogie system that consists of 27 components.

  4. A network coding based routing protocol for underwater sensor networks.

    Science.gov (United States)

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  5. A Quantum Cryptography Communication Network Based on Software Defined Network

    Directory of Open Access Journals (Sweden)

    Zhang Hongliang

    2018-01-01

    Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.

  6. Object Classification Using Substance Based Neural Network

    Directory of Open Access Journals (Sweden)

    P. Sengottuvelan

    2014-01-01

    Full Text Available Object recognition has shown tremendous increase in the field of image analysis. The required set of image objects is identified and retrieved on the basis of object recognition. In this paper, we propose a novel classification technique called substance based image classification (SIC using a wavelet neural network. The foremost task of SIC is to remove the surrounding regions from an image to reduce the misclassified portion and to effectively reflect the shape of an object. At first, the image to be extracted is performed with SIC system through the segmentation of the image. Next, in order to attain more accurate information, with the extracted set of regions, the wavelet transform is applied for extracting the configured set of features. Finally, using the neural network classifier model, misclassification over the given natural images and further background images are removed from the given natural image using the LSEG segmentation. Moreover, to increase the accuracy of object classification, SIC system involves the removal of the regions in the surrounding image. Performance evaluation reveals that the proposed SIC system reduces the occurrence of misclassification and reflects the exact shape of an object to approximately 10–15%.

  7. Network-based analysis reveals distinct association patterns in a semantic MEDLINE-based drug-disease-gene network.

    Science.gov (United States)

    Zhang, Yuji; Tao, Cui; Jiang, Guoqian; Nair, Asha A; Su, Jian; Chute, Christopher G; Liu, Hongfang

    2014-01-01

    A huge amount of associations among different biological entities (e.g., disease, drug, and gene) are scattered in millions of biomedical articles. Systematic analysis of such heterogeneous data can infer novel associations among different biological entities in the context of personalized medicine and translational research. Recently, network-based computational approaches have gained popularity in investigating such heterogeneous data, proposing novel therapeutic targets and deciphering disease mechanisms. However, little effort has been devoted to investigating associations among drugs, diseases, and genes in an integrative manner. We propose a novel network-based computational framework to identify statistically over-expressed subnetwork patterns, called network motifs, in an integrated disease-drug-gene network extracted from Semantic MEDLINE. The framework consists of two steps. The first step is to construct an association network by extracting pair-wise associations between diseases, drugs and genes in Semantic MEDLINE using a domain pattern driven strategy. A Resource Description Framework (RDF)-linked data approach is used to re-organize the data to increase the flexibility of data integration, the interoperability within domain ontologies, and the efficiency of data storage. Unique associations among drugs, diseases, and genes are extracted for downstream network-based analysis. The second step is to apply a network-based approach to mine the local network structure of this heterogeneous network. Significant network motifs are then identified as the backbone of the network. A simplified network based on those significant motifs is then constructed to facilitate discovery. We implemented our computational framework and identified five network motifs, each of which corresponds to specific biological meanings. Three case studies demonstrate that novel associations are derived from the network topology analysis of reconstructed networks of significant

  8. Energy Efficient Wireless Sensor Network Modelling Based on Complex Networks

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2016-01-01

    Full Text Available The power consumption and energy efficiency of wireless sensor network are the significant problems in Internet of Things network. In this paper, we consider the network topology optimization based on complex network theory to solve the energy efficiency problem of WSN. We propose the energy efficient model of WSN according to the basic principle of small world from complex networks. Small world network has clustering features that are similar to that of the rules of the network but also has similarity to random networks of small average path length. It can be utilized to optimize the energy efficiency of the whole network. Optimal number of multiple sink nodes of the WSN topology is proposed for optimizing energy efficiency. Then, the hierarchical clustering analysis is applied to implement this clustering of the sensor nodes and pick up the sink nodes from the sensor nodes as the clustering head. Meanwhile, the update method is proposed to determine the sink node when the death of certain sink node happened which can cause the paralysis of network. Simulation results verify the energy efficiency of the proposed model and validate the updating of the sink nodes to ensure the normal operation of the WSN.

  9. Social networking for web-based communities

    NARCIS (Netherlands)

    Issa, T.; Kommers, Petrus A.M.

    2013-01-01

    In the 21st century, a new technology was introduced to facilitate communication, collaboration, and interaction between individuals and businesses. This technology is called social networking; this technology is now part of Internet commodities like email, browsing and blogging. From the 20th

  10. Base-calling algorithm with vocabulary (BCV method for analyzing population sequencing chromatograms.

    Directory of Open Access Journals (Sweden)

    Yuri S Fantin

    Full Text Available Sanger sequencing is a common method of reading DNA sequences. It is less expensive than high-throughput methods, and it is appropriate for numerous applications including molecular diagnostics. However, sequencing mixtures of similar DNA of pathogens with this method is challenging. This is important because most clinical samples contain such mixtures, rather than pure single strains. The traditional solution is to sequence selected clones of PCR products, a complicated, time-consuming, and expensive procedure. Here, we propose the base-calling with vocabulary (BCV method that computationally deciphers Sanger chromatograms obtained from mixed DNA samples. The inputs to the BCV algorithm are a chromatogram and a dictionary of sequences that are similar to those we expect to obtain. We apply the base-calling function on a test dataset of chromatograms without ambiguous positions, as well as one with 3-14% sequence degeneracy. Furthermore, we use BCV to assemble a consensus sequence for an HIV genome fragment in a sample containing a mixture of viral DNA variants and to determine the positions of the indels. Finally, we detect drug-resistant Mycobacterium tuberculosis strains carrying frameshift mutations mixed with wild-type bacteria in the pncA gene, and roughly characterize bacterial communities in clinical samples by direct 16S rRNA sequencing.

  11. Base-calling algorithm with vocabulary (BCV) method for analyzing population sequencing chromatograms.

    Science.gov (United States)

    Fantin, Yuri S; Neverov, Alexey D; Favorov, Alexander V; Alvarez-Figueroa, Maria V; Braslavskaya, Svetlana I; Gordukova, Maria A; Karandashova, Inga V; Kuleshov, Konstantin V; Myznikova, Anna I; Polishchuk, Maya S; Reshetov, Denis A; Voiciehovskaya, Yana A; Mironov, Andrei A; Chulanov, Vladimir P

    2013-01-01

    Sanger sequencing is a common method of reading DNA sequences. It is less expensive than high-throughput methods, and it is appropriate for numerous applications including molecular diagnostics. However, sequencing mixtures of similar DNA of pathogens with this method is challenging. This is important because most clinical samples contain such mixtures, rather than pure single strains. The traditional solution is to sequence selected clones of PCR products, a complicated, time-consuming, and expensive procedure. Here, we propose the base-calling with vocabulary (BCV) method that computationally deciphers Sanger chromatograms obtained from mixed DNA samples. The inputs to the BCV algorithm are a chromatogram and a dictionary of sequences that are similar to those we expect to obtain. We apply the base-calling function on a test dataset of chromatograms without ambiguous positions, as well as one with 3-14% sequence degeneracy. Furthermore, we use BCV to assemble a consensus sequence for an HIV genome fragment in a sample containing a mixture of viral DNA variants and to determine the positions of the indels. Finally, we detect drug-resistant Mycobacterium tuberculosis strains carrying frameshift mutations mixed with wild-type bacteria in the pncA gene, and roughly characterize bacterial communities in clinical samples by direct 16S rRNA sequencing.

  12. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  13. Durer-pentagon-based complex network

    Directory of Open Access Journals (Sweden)

    Rui Hou

    2016-04-01

    Full Text Available A novel Durer-pentagon-based complex network was constructed by adding a centre node. The properties of the complex network including the average degree, clustering coefficient, average path length, and fractal dimension were determined. The proposed complex network is small-world and fractal.

  14. A Web-Based Mindfulness Stress Management Program in a Corporate Call Center

    Science.gov (United States)

    Allexandre, Didier; Bernstein, Adam M.; Walker, Esteban; Hunter, Jennifer; Roizen, Michael F.; Morledge, Thomas J.

    2016-01-01

    Objective: The objective of this study is to determine the effectiveness of an 8-week web-based, mindfulness stress management program (WSM) in a corporate call center and added benefit of group support. Methods: One hundred sixty-one participants were randomized to WSM, WSM with group support, WSM with group and expert clinical support, or wait-list control. Perceived stress, burnout, emotional and psychological well-being, mindfulness, and productivity were measured at baseline, weeks 8 and 16, and 1 year. Results: Online usage was low with participants favoring CD use and group practice. All active groups demonstrated significant reductions in perceived stress and increases in emotional and psychological well-being compared with control. Group support improved participation, engagement, and outcomes. Conclusion: A self-directed mindfulness program with group practice and support can provide an affordable, effective, and scalable workplace stress management solution. Engagement may also benefit from combining web-based and traditional CD delivery. PMID:26949875

  15. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    The availability of location information in mobile devices, e.g., through built-in GPS receivers in smart phones, has motivated the investigation of the usefulness of location based network optimizations. Since the quality of input information is important for network optimizations, a main focus...... the achievable accuracy of future localization system in mobile settings, as well as quantifying the impact of having a realistic model of the required measurement exchanges. Secondly, this work has considered different large scale and small scale location based network optimizations, namely centralized relay...... and highly mobile scenarios....

  16. Directory Enabled Policy Based Networking; TOPICAL

    International Nuclear Information System (INIS)

    KELIIAA, CURTIS M.

    2001-01-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking

  17. Agent-based modeling and network dynamics

    CERN Document Server

    Namatame, Akira

    2016-01-01

    The book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The book begins with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling’s segregation model and Axelrod’s spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The book also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. The book reviews a number of pioneering and representative models in this family. Upon the gi...

  18. Network reliability analysis based on percolation theory

    International Nuclear Information System (INIS)

    Li, Daqing; Zhang, Qiong; Zio, Enrico; Havlin, Shlomo; Kang, Rui

    2015-01-01

    In this paper, we propose a new way of looking at the reliability of a network using percolation theory. In this new view, a network failure can be regarded as a percolation process and the critical threshold of percolation can be used as network failure criterion linked to the operational settings under control. To demonstrate our approach, we consider both random network models and real networks with different nodes and/or edges lifetime distributions. We study numerically and theoretically the network reliability and find that the network reliability can be solved as a voting system with threshold given by percolation theory. Then we find that the average lifetime of random network increases linearly with the average lifetime of its nodes with uniform life distributions. Furthermore, the average lifetime of the network becomes saturated when system size is increased. Finally, we demonstrate our method on the transmission network system of IEEE 14 bus. - Highlights: • Based on percolation theory, we address questions of practical interest such as “how many failed nodes/edges will break down the whole network?” • The percolation threshold naturally gives a network failure criterion. • The approach based on percolation theory is suited for calculations of large-scale networks

  19. Practical Calling Approach for Exome Array-Based Genome-Wide Association Studies in Korean Population

    Directory of Open Access Journals (Sweden)

    Tae-Joon Park

    2015-01-01

    Full Text Available Exome-based genotyping arrays are cost-effective and have recently been used as alternative platforms to whole-exome sequencing. However, the automated clustering algorithm in an exome array has a genotype calling problem in accuracy for identifying rare and low-frequency variants. To address these shortcomings, we present a practical approach for accurate genotype calling using the Illumina Infinium HumanExome BeadChip. We present comparison results and a statistical summary of our genotype data sets. Our data set comprises 14,647 Korean samples. To solve the limitation of automated clustering, we performed manual genotype clustering for the targeted identification of 46,076 variants that were identified using GenomeStudio software. To evaluate the effects of applying custom cluster files, we tested cluster files using 804 independent Korean samples and the same platform. Our study firstly suggests practical guidelines for exome chip quality control in Asian populations and provides valuable insight into an association study using exome chip.

  20. Allen's big-eared bat (Idionycteris phyllotis) documented in colorado based on recordings of its distinctive echolocation call

    Science.gov (United States)

    Hayes, M.A.; Navo, K.W.; Bonewell, L.; Mosch, C.J.; Adams, Rick A.

    2009-01-01

    Allen's big-eared bat (Idionycteris phyllotis) inhabits much of the southwestern USA, but has not been documented in Colorado. We recorded echolocation calls consistent with I. phyllotis near La Sal Creek, Montrose County, Colorado. Based on characteristics of echolocation calls and flight behavior, we conclude that the echolocation calls described here were emitted by I. phyllotis and that they represent the first documentation of this species in Colorado.

  1. The Affordable Care Act: the ethical call for value-based leadership to transform quality.

    Science.gov (United States)

    Piper, Llewellyn E

    2013-01-01

    Hospitals in America face a daunting and historical challenge starting in 2013 as leadership navigates their organizations toward a new port of call-the Patient Protection and Affordable Care Act. Known as the Affordable Care Act (ACA) was signed into law in March 2010 and held in abeyance waiting on 2 pivotal points-the Supreme Court's June 2012 ruling upholding the constitutionality of the ACA and the 2012 presidential election of Barack Obama bringing to reality to health care organizations that leadership now must implement the mandates of health care delivery under the ACA. This article addresses the need for value-based leadership to transform the culture of health care organizations in order to be successful in navigating uncharted waters under the unprecedented challenges for change in the delivery of quality health care.

  2. Automation of Network-Based Scientific Workflows

    Energy Technology Data Exchange (ETDEWEB)

    Altintas, I. [University of California, La Jolla; Barreto, R. [Oak Ridge National Laboratory (ORNL); Blondin, J. M. [North Carolina State University; Cheng, Z. [North Carolina State University; Critchlow, T. [Lawrence Livermore National Laboratory (LLNL); Khan, A. [University of Utah; Klasky, Scott A [ORNL; Ligon, J. [North Carolina State University; Ludaescher, B. [University of California, Davis; Mouallem, P. A. [North Carolina State University; Parker, S. [University of Utah; Podhorszki, Norbert [University of California, Davis; Shoshani, A. [Lawrence Berkeley National Laboratory (LBNL); Silva, C. [University of Utah; Vouk, M. A. [North Carolina State University

    2007-01-01

    Comprehensive, end-to-end, data and workflow management solutions are needed to handle the increasing complexity of processes and data volumes associated with modern distributed scientific problem solving, such as ultra-scale simulations and high-throughput experiments. The key to the solution is an integrated network-based framework that is functional, dependable, fault-tolerant, and supports data and process provenance. Such a framework needs to make development and use of application workflows dramatically easier so that scientists' efforts can shift away from data management and utility software development to scientific research and discovery An integrated view of these activities is provided by the notion of scientific workflows - a series of structured activities and computations that arise in scientific problem-solving. An information technology framework that supports scientific workflows is the Ptolemy II based environment called Kepler. This paper discusses the issues associated with practical automation of scientific processes and workflows and illustrates this with workflows developed using the Kepler framework and tools.

  3. A random network based, node attraction facilitated network evolution method

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-03-01

    Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.

  4. Community Based Networks and 5G

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2016-01-01

    . The findings indicate that 5G connectivity can be extended to rural areas by these networks, via heterogenous networks. Hence the delivery of 5G data rates delivery via Wireless WAN in rural areas can be achieved by utilizing the causal factors of the identified models for Community Based Networks.......The deployment of previous wireless standards has provided more benefits for urban dwellers than rural dwellers. 5G deployment may not be different. This paper identifies that Community Based Networks as carriers that deserve recognition as potential 5G providers may change this. The argument...... is hinged on a research aimed at understanding how and why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out inductively using Grounded Theory. Six cases were investigated.Two Community Based Network Mobilization models were identified...

  5. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, M.

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more

  6. Using Pill Identification Calls to Poison Centers as a Marker of Drug Abuse at Three Texas Military Bases.

    Science.gov (United States)

    Ng, Patrick C; Maddry, Joseph K; Sessions, Daniel; Borys, Douglas J; Bebarta, Vikhyat S

    2017-11-01

    Opioid abuse is a growing problem in civilian communities, and it has developed in the military as well. Telephone calls to poison centers requesting pill identification (ID) is a marker of drug abuse. This study identifies the number of pill ID calls made to the poison centers from areas containing and surrounding three Texas military bases during an 8-year period. We performed a retrospective observational study identifying calls to certified poison centers in Texas from 2002 to 2009 that identified hydrocodone tablets and other pain medications. We noted the calls made from ZIP codes containing and surrounding the three largest military bases in Texas. We reviewed 75,537 drug ID calls for any drug from the ZIP codes of interest. Total drug ID calls increased 105% and the number of calls for hydrocodone increased 463%. In our study most of the drug ID calls from military communities in Texas were for hydrocodone. The rate of calls for hydrocodone increased more than the rate of calls for other analgesics from 2002 to 2009. Using drug ID calls as a surrogate of drug abuse, our results suggest that hydrocodone abuse has increased within military communities and that poison center data can be a reliable surrogate for prescription drug abuse near military bases. Future studies are needed to further understand the extent of this problem in military and civilian communities. We can use this information to heighten awareness, influence prescription practices, establish practice guidelines, and develop educational programs to mitigate the increasing rate of prescription analgesic abuse in the United States.

  7. Cloud-based Networked Visual Servo Control

    DEFF Research Database (Denmark)

    Wu, Haiyan; Lu, Lei; Chen, Chih-Chung

    2013-01-01

    The performance of vision-based control systems, in particular of highly dynamic vision-based motion control systems, is often limited by the low sampling rate of the visual feedback caused by the long image processing time. In order to overcome this problem, the networked visual servo control...... feedback, ii) a stabilizing control law for the networked visual servo control system with time-varying feedback time delay, and iii) a sending rate scheduling strategy aiming at reducing the communication network load. The performance of the networked visual servo control system with sending rate...

  8. Assessing the Impact of Homophobic Name Calling on Early Adolescent Mental Health: A Longitudinal Social Network Analysis of Competing Peer Influence Effects.

    Science.gov (United States)

    DeLay, Dawn; Hanish, Laura D; Zhang, Linlin; Martin, Carol Lynn

    2017-05-01

    The goal of the current study was to improve our understanding of why adolescence is a critical period for the consideration of declining mental health. We did this by focusing on the impact of homophobic name calling on early adolescent mental health after the transition to middle school. Because we know that homophobic name calling emerges within a dynamic peer group structure, we used longitudinal social network analysis to assess the relation between homophobic name calling, depressive symptoms, and self-esteem while simultaneously limiting bias from alternative peer socialization mechanisms. A sample of adolescents who recently transitioned to a large public middle school (N = 299; 53 % girls; M age  = 11.13 years, SD = 0.48) were assessed. Longitudinal assessments of peer relationship networks, depressive symptoms, and self-esteem were collected during the fall and spring of the academic year. The results suggest that, after accounting for the simultaneous effect of alternative peer socialization processes, adolescent experiences of homophobic name calling in the fall predict higher levels of depressive symptoms and lower levels of self-esteem over the course of the academic year. These findings provide evidence of a significant influence of homophobic name calling on adolescent mental health.

  9. Using scenario-based training to promote information literacy among on-call consultant pediatricians.

    Science.gov (United States)

    Pettersson, Jonas; Bjorkander, Emil; Bark, Sirpa; Holmgren, Daniel; Wekell, Per

    2017-07-01

    Traditionally, teaching hospital staff to search for medical information relies heavily on educator-defined search methods. In contrast, the authors describe our experiences using real-time scenarios to teach on-call consultant pediatricians information literacy skills as part of a two-year continuing professional development program. Two information-searching workshops were held at Sahlgrenska University Hospital in Gothenburg, Sweden. During the workshops, pediatricians were presented with medical scenarios that were closely related to their clinical practice. Participants were initially encouraged to solve the problems using their own preferred search methods, followed by group discussions led by clinical educators and a medical librarian in which search problems were identified and overcome. The workshops were evaluated using questionnaires to assess participant satisfaction and the extent to which participants intended to implement changes in their clinical practice and reported actual change. A scenario-based approach to teaching clinicians how to search for medical information is an attractive alternative to traditional lectures. The relevance of such an approach was supported by a high level of participant engagement during the workshops and high scores for participant satisfaction, intended changes to clinical practice, and reported benefits in actual clinical practice.

  10. Modeling the interdependent network based on two-mode networks

    Science.gov (United States)

    An, Feng; Gao, Xiangyun; Guan, Jianhe; Huang, Shupei; Liu, Qian

    2017-10-01

    Among heterogeneous networks, there exist obviously and closely interdependent linkages. Unlike existing research primarily focus on the theoretical research of physical interdependent network model. We propose a two-layer interdependent network model based on two-mode networks to explore the interdependent features in the reality. Specifically, we construct a two-layer interdependent loan network and develop several dependent features indices. The model is verified to enable us to capture the loan dependent features of listed companies based on loan behaviors and shared shareholders. Taking Chinese debit and credit market as case study, the main conclusions are: (1) only few listed companies shoulder the main capital transmission (20% listed companies occupy almost 70% dependent degree). (2) The control of these key listed companies will be more effective of avoiding the spreading of financial risks. (3) Identifying the companies with high betweenness centrality and controlling them could be helpful to monitor the financial risk spreading. (4) The capital transmission channel among Chinese financial listed companies and Chinese non-financial listed companies are relatively strong. However, under greater pressure of demand of capital transmission (70% edges failed), the transmission channel, which constructed by debit and credit behavior, will eventually collapse.

  11. Distribution network topology identification based on synchrophasor

    Directory of Open Access Journals (Sweden)

    Stefania Conti

    2018-03-01

    Full Text Available A distribution system upgrade moving towards Smart Grid implementation is necessary to face the proliferation of distributed generators and electric vehicles, in order to satisfy the increasing demand for high quality, efficient, secure, reliable energy supply. This perspective requires taking into account system vulnerability to cyber attacks. An effective attack could destroy stored information about network structure, historical data and so on. Countermeasures and network applications could be made impracticable since most of them are based on the knowledge of network topology. Usually, the location of each link between nodes in a network is known. Therefore, the methods used for topology identification determine if a link is open or closed. When no information on the location of the network links is available, these methods become totally unfeasible. This paper presents a method to identify the network topology using only nodal measures obtained by means of phasor measurement units.

  12. Autonomous power networks based power system

    International Nuclear Information System (INIS)

    Jokic, A.; Van den Bosch, P.P.J.

    2006-01-01

    This paper presented the concept of autonomous networks to cope with this increased complexity in power systems while enhancing market-based operation. The operation of future power systems will be more challenging and demanding than present systems because of increased uncertainties, less inertia in the system, replacement of centralized coordinating activities by decentralized parties and the reliance on dynamic markets for both power balancing and system reliability. An autonomous network includes the aggregation of networked producers and consumers in a relatively small area with respect to the overall system. The operation of an autonomous network is coordinated and controlled with one central unit acting as an interface between internal producers/consumers and the rest of the power system. In this study, the power balance problem and system reliability through provision of ancillary services was formulated as an optimization problem for the overall autonomous networks based power system. This paper described the simulation of an optimal autonomous network dispatching in day ahead markets, based on predicted spot prices for real power, and two ancillary services. It was concluded that large changes occur in a power systems structure and operation, most of them adding to the uncertainty and complexity of the system. The introduced concept of an autonomous power network-based power system was shown to be a realistic and consistent approach to formulate and operate a market-based dispatch of both power and ancillary services. 9 refs., 4 figs

  13. Dynamics-based centrality for directed networks.

    Science.gov (United States)

    Masuda, Naoki; Kori, Hiroshi

    2010-11-01

    Determining the relative importance of nodes in directed networks is important in, for example, ranking websites, publications, and sports teams, and for understanding signal flows in systems biology. A prevailing centrality measure in this respect is the PageRank. In this work, we focus on another class of centrality derived from the Laplacian of the network. We extend the Laplacian-based centrality, which has mainly been applied to strongly connected networks, to the case of general directed networks such that we can quantitatively compare arbitrary nodes. Toward this end, we adopt the idea used in the PageRank to introduce global connectivity between all the pairs of nodes with a certain strength. Numerical simulations are carried out on some networks. We also offer interpretations of the Laplacian-based centrality for general directed networks in terms of various dynamical and structural properties of networks. Importantly, the Laplacian-based centrality defined as the stationary density of the continuous-time random walk with random jumps is shown to be equivalent to the absorption probability of the random walk with sinks at each node but without random jumps. Similarly, the proposed centrality represents the importance of nodes in dynamics on the original network supplied with sinks but not with random jumps.

  14. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Science.gov (United States)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  15. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    OpenAIRE

    Rosenberg, Ishai; Shabtai, Asaf; Rokach, Lior; Elovici, Yuval

    2017-01-01

    In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such...

  16. Building a Network Based Laboratory Environment

    Directory of Open Access Journals (Sweden)

    Sea Shuan Luo

    2009-12-01

    Full Text Available This paper presents a comparative study about the development of a network based laboratory environment in the “Unix introduction” course for the undergraduate students. The study results and the response from the students from 2005 to 2006 will be used to better understand what kind of method is more suitable for students. We also use the data collected to adjust our teaching strategy and try to build up a network based laboratory environment.

  17. The voice of bats: how greater mouse-eared bats recognize individuals based on their echolocation calls.

    Science.gov (United States)

    Yovel, Yossi; Melcon, Mariana Laura; Franz, Matthias O; Denzinger, Annette; Schnitzler, Hans-Ulrich

    2009-06-01

    Echolocating bats use the echoes from their echolocation calls to perceive their surroundings. The ability to use these continuously emitted calls, whose main function is not communication, for recognition of individual conspecifics might facilitate many of the social behaviours observed in bats. Several studies of individual-specific information in echolocation calls found some evidence for its existence but did not quantify or explain it. We used a direct paradigm to show that greater mouse-eared bats (Myotis myotis) can easily discriminate between individuals based on their echolocation calls and that they can generalize their knowledge to discriminate new individuals that they were not trained to recognize. We conclude that, despite their high variability, broadband bat-echolocation calls contain individual-specific information that is sufficient for recognition. An analysis of the call spectra showed that formant-related features are suitable cues for individual recognition. As a model for the bat's decision strategy, we trained nonlinear statistical classifiers to reproduce the behaviour of the bats, namely to repeat correct and incorrect decisions of the bats. The comparison of the bats with the model strongly implies that the bats are using a prototype classification approach: they learn the average call characteristics of individuals and use them as a reference for classification.

  18. The voice of bats: how greater mouse-eared bats recognize individuals based on their echolocation calls.

    Directory of Open Access Journals (Sweden)

    Yossi Yovel

    2009-06-01

    Full Text Available Echolocating bats use the echoes from their echolocation calls to perceive their surroundings. The ability to use these continuously emitted calls, whose main function is not communication, for recognition of individual conspecifics might facilitate many of the social behaviours observed in bats. Several studies of individual-specific information in echolocation calls found some evidence for its existence but did not quantify or explain it. We used a direct paradigm to show that greater mouse-eared bats (Myotis myotis can easily discriminate between individuals based on their echolocation calls and that they can generalize their knowledge to discriminate new individuals that they were not trained to recognize. We conclude that, despite their high variability, broadband bat-echolocation calls contain individual-specific information that is sufficient for recognition. An analysis of the call spectra showed that formant-related features are suitable cues for individual recognition. As a model for the bat's decision strategy, we trained nonlinear statistical classifiers to reproduce the behaviour of the bats, namely to repeat correct and incorrect decisions of the bats. The comparison of the bats with the model strongly implies that the bats are using a prototype classification approach: they learn the average call characteristics of individuals and use them as a reference for classification.

  19. Network-based Database Course

    DEFF Research Database (Denmark)

    Nielsen, J.N.; Knudsen, Morten; Nielsen, Jens Frederik Dalsgaard

    A course in database design and implementation has been de- signed, utilizing existing network facilities. The course is an elementary course for students of computer engineering. Its purpose is to give the students a theoretical database knowledge as well as practical experience with design...... and implementation. A tutorial relational database and the students self-designed databases are implemented on the UNIX system of Aalborg University, thus giving the teacher the possibility of live demonstrations in the lecture room, and the students the possibility of interactive learning in their working rooms...

  20. 78 FR 18594 - Notice of Cancelation for Call of the President's Advisory Council on Faith-Based and...

    Science.gov (United States)

    2013-03-27

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Notice of Cancelation for Call of the President's Advisory Council on Faith-Based and Neighborhood Partnerships Notice of Cancelation: This notice was published in...: March 21, 2013. Ben O'Dell, Associate Director for Center for Faith-based and Neighborhood Partnerships...

  1. OccuPeak: ChIP-Seq peak calling based on internal background modelling

    NARCIS (Netherlands)

    de Boer, Bouke A.; van Duijvenboden, Karel; van den Boogaard, Malou; Christoffels, Vincent M.; Barnett, Phil; Ruijter, Jan M.

    2014-01-01

    ChIP-seq has become a major tool for the genome-wide identification of transcription factor binding or histone modification sites. Most peak-calling algorithms require input control datasets to model the occurrence of background reads to account for local sequencing and GC bias. However, the

  2. Community-Based Art Education and Performance: Pointing to a Place Called Home

    Science.gov (United States)

    Washington, G. E.

    2011-01-01

    Can art make a difference? This is a call for a new sense of interconnectivity among visual art programs in and out of schools. This common ground will be found in the embodiment of performance, critical reflection, and social change within art learning. One goal of this article is to encourage educators to use the "verbs of art" for…

  3. NASDA knowledge-based network planning system

    Science.gov (United States)

    Yamaya, K.; Fujiwara, M.; Kosugi, S.; Yambe, M.; Ohmori, M.

    1993-01-01

    One of the SODS (space operation and data system) sub-systems, NP (network planning) was the first expert system used by NASDA (national space development agency of Japan) for tracking and control of satellite. The major responsibilities of the NP system are: first, the allocation of network and satellite control resources and, second, the generation of the network operation plan data (NOP) used in automated control of the stations and control center facilities. Up to now, the first task of network resource scheduling was done by network operators. NP system automatically generates schedules using its knowledge base, which contains information on satellite orbits, station availability, which computer is dedicated to which satellite, and how many stations must be available for a particular satellite pass or a certain time period. The NP system is introduced.

  4. Identifying network public opinion leaders based on Markov Logic Networks.

    Science.gov (United States)

    Zhang, Weizhe; Li, Xiaoqiang; He, Hui; Wang, Xing

    2014-01-01

    Public opinion emergencies have important effect on social activities. Recognition of special communities like opinion leaders can contribute to a comprehensive understanding of the development trend of public opinion. In this paper, a network opinion leader recognition method based on relational data was put forward, and an opinion leader recognition system integrating public opinion data acquisition module, data characteristic selection, and fusion module as well as opinion leader discovery module based on Markov Logic Networks was designed. The designed opinion leader recognition system not only can overcome the incomplete data acquisition and isolated task of traditional methods, but also can recognize opinion leaders comprehensively with considerations to multiple problems by using the relational model. Experimental results demonstrated that, compared with the traditional methods, the proposed method can provide a more accurate opinion leader recognition and has good noise immunity.

  5. Designing Network-based Business Model Ontology

    DEFF Research Database (Denmark)

    Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz

    2015-01-01

    is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....

  6. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  7. [Signaling network-based functional cell design].

    Science.gov (United States)

    Ju, Jianqi; Wei, Ping

    2017-03-25

    Cellular signaling networks act as the central processor to deal with environmental signals and regulate cell function, and determine cell fate. Using synthetic biology approach to engineer cell signaling networks is crucial for ultimately constructing man-made "cell machines". Cellular signaling networks can encode sophisticated cell information by processing quantitatively signaling dynamics, which enables multi-dimensional regulation of functional sub-circuits. Here, we first review the research progresses on the signaling coding mechanisms; and then elaborate the methodologies and applications of cells signaling engineering; finally, we envision that signaling-based cell engineering are important for the increasingly-complicated next generation synthetic biology.

  8. Toward Measuring Network Aesthetics Based on Symmetry

    Directory of Open Access Journals (Sweden)

    Zengqiang Chen

    2017-05-01

    Full Text Available In this exploratory paper, we discuss quantitative graph-theoretical measures of network aesthetics. Related work in this area has typically focused on geometrical features (e.g., line crossings or edge bendiness of drawings or visual representations of graphs which purportedly affect an observer’s perception. Here we take a very different approach, abandoning reliance on geometrical properties, and apply information-theoretic measures to abstract graphs and networks directly (rather than to their visual representaions as a means of capturing classical appreciation of structural symmetry. Examples are used solely to motivate the approach to measurement, and to elucidate our symmetry-based mathematical theory of network aesthetics.

  9. The development of a hassle-based diagnostic scale for predicting burnout in call centres

    Directory of Open Access Journals (Sweden)

    Willie A. Visser

    2009-08-01

    Full Text Available The aim of this study was to develop a brief daily hassle diagnostic questionnaire that could be used to identify daily hassles for customer service representatives within a call centre environment, and to investigate the relationship between daily hassles and burnout. A crosssectional survey was used with an accidental sample (N = 394 taken from a service and sales call centre. An exploratory factor analysis of the data resulted in a six-factor model of daily hassles consisting of daily demands, continuous change, co-worker hassles, demotivating work environment, transportation hassles and personal concerns. The internal consistency of one factor, namely personal concerns, was low. Exhaustion was best predicted by four categories of daily hassles, namely daily demands, continuous change, a demotivating work environment, and transportation hassles.

  10. Functional networks inference from rule-based machine learning models.

    Science.gov (United States)

    Lazzarini, Nicola; Widera, Paweł; Williamson, Stuart; Heer, Rakesh; Krasnogor, Natalio; Bacardit, Jaume

    2016-01-01

    Functional networks play an important role in the analysis of biological processes and systems. The inference of these networks from high-throughput (-omics) data is an area of intense research. So far, the similarity-based inference paradigm (e.g. gene co-expression) has been the most popular approach. It assumes a functional relationship between genes which are expressed at similar levels across different samples. An alternative to this paradigm is the inference of relationships from the structure of machine learning models. These models are able to capture complex relationships between variables, that often are different/complementary to the similarity-based methods. We propose a protocol to infer functional networks from machine learning models, called FuNeL. It assumes, that genes used together within a rule-based machine learning model to classify the samples, might also be functionally related at a biological level. The protocol is first tested on synthetic datasets and then evaluated on a test suite of 8 real-world datasets related to human cancer. The networks inferred from the real-world data are compared against gene co-expression networks of equal size, generated with 3 different methods. The comparison is performed from two different points of view. We analyse the enriched biological terms in the set of network nodes and the relationships between known disease-associated genes in a context of the network topology. The comparison confirms both the biological relevance and the complementary character of the knowledge captured by the FuNeL networks in relation to similarity-based methods and demonstrates its potential to identify known disease associations as core elements of the network. Finally, using a prostate cancer dataset as a case study, we confirm that the biological knowledge captured by our method is relevant to the disease and consistent with the specialised literature and with an independent dataset not used in the inference process. The

  11. A Feature-Based Call Graph Distance Measure for Program Similarity Analysis

    OpenAIRE

    Linkola, Simo

    2016-01-01

    A measurement for how similar (or distant) two computer programs are has a wide range of possible applications. For example, they can be applied to malware analysis or analysis of university students' programming exercises. However, as programs may be arbitrarily structured, capturing the similarity of two non-trivial programs is a complex task. By extracting call graphs (graphs of caller-callee relationships of the program's functions, where nodes denote functions and directed edges denote f...

  12. EFFICIENT LANE DETECTION BASED ON ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    F. Arce

    2017-09-01

    Full Text Available Lane detection is a problem that has attracted in the last years the attention of the computer vision community. Most of approaches used until now to face this problem combine conventional image processing, image analysis and pattern classification techniques. In this paper, we propose a methodology based on so-called Ellipsoidal Neural Networks with Dendritic Processing (ENNDPs as a new approach to provide a solution to this important problem. The functioning and performance of the proposed methodology is validated with a real video taken by a camera mounted on a car circulating on urban highway of Mexico City.

  13. Efficient Lane Detection Based on Artificial Neural Networks

    Science.gov (United States)

    Arce, F.; Zamora, E.; Hernández, G.; Sossa, H.

    2017-09-01

    Lane detection is a problem that has attracted in the last years the attention of the computer vision community. Most of approaches used until now to face this problem combine conventional image processing, image analysis and pattern classification techniques. In this paper, we propose a methodology based on so-called Ellipsoidal Neural Networks with Dendritic Processing (ENNDPs) as a new approach to provide a solution to this important problem. The functioning and performance of the proposed methodology is validated with a real video taken by a camera mounted on a car circulating on urban highway of Mexico City.

  14. Artificial Neural Network Based State Estimators Integrated into Kalmtool

    DEFF Research Database (Denmark)

    Bayramoglu, Enis; Ravn, Ole; Poulsen, Niels Kjølstad

    2012-01-01

    In this paper we present a toolbox enabling easy evaluation and comparison of dierent ltering algorithms. The toolbox is called Kalmtool and is a set of MATLAB tools for state estimation of nonlinear systems. The toolbox now contains functions for Articial Neural Network Based State Estimation...... as well as for DD1 lter and the DD2 lter, as well as functions for Unscented Kalman lters and several versions of particle lters. The toolbox requires MATLAB version 7, but no additional toolboxes are required....

  15. Consensus-based methodology for detection communities in multilayered networks

    Science.gov (United States)

    Karimi-Majd, Amir-Mohsen; Fathian, Mohammad; Makrehchi, Masoud

    2018-03-01

    Finding groups of network users who are densely related with each other has emerged as an interesting problem in the area of social network analysis. These groups or so-called communities would be hidden behind the behavior of users. Most studies assume that such behavior could be understood by focusing on user interfaces, their behavioral attributes or a combination of these network layers (i.e., interfaces with their attributes). They also assume that all network layers refer to the same behavior. However, in real-life networks, users' behavior in one layer may differ from their behavior in another one. In order to cope with these issues, this article proposes a consensus-based community detection approach (CBC). CBC finds communities among nodes at each layer, in parallel. Then, the results of layers should be aggregated using a consensus clustering method. This means that different behavior could be detected and used in the analysis. As for other significant advantages, the methodology would be able to handle missing values. Three experiments on real-life and computer-generated datasets have been conducted in order to evaluate the performance of CBC. The results indicate superiority and stability of CBC in comparison to other approaches.

  16. An emergency call system for patients in locked-in state using an SSVEP-based brain switch.

    Science.gov (United States)

    Lim, Jeong-Hwan; Kim, Yong-Wook; Lee, Jun-Hak; An, Kwang-Ok; Hwang, Han-Jeong; Cha, Ho-Seung; Han, Chang-Hee; Im, Chang-Hwan

    2017-11-01

    Patients in a locked-in state (LIS) due to severe neurological disorders such as amyotrophic lateral sclerosis (ALS) require seamless emergency care by their caregivers or guardians. However, it is a difficult job for the guardians to continuously monitor the patients' state, especially when direct communication is not possible. In the present study, we developed an emergency call system for such patients using a steady-state visual evoked potential (SSVEP)-based brain switch. Although there have been previous studies to implement SSVEP-based brain switch system, they have not been applied to patients in LIS, and thus their clinical value has not been validated. In this study, we verified whether the SSVEP-based brain switch system can be practically used as an emergency call system for patients in LIS. The brain switch used for our system adopted a chromatic visual stimulus, which proved to be visually less stimulating than conventional checkerboard-type stimuli but could generate SSVEP responses strong enough to be used for brain-computer interface (BCI) applications. To verify the feasibility of our emergency call system, 14 healthy participants and 3 patients with severe ALS took part in online experiments. All three ALS patients successfully called their guardians to their bedsides in about 6.56 seconds. Furthermore, additional experiments with one of these patients demonstrated that our emergency call system maintains fairly good performance even up to 4 weeks after the first experiment without renewing initial calibration data. Our results suggest that our SSVEP-based emergency call system might be successfully used in practical scenarios. © 2017 Society for Psychophysiological Research.

  17. Constructing an Evidence-Base for Future CALL Design with "Engineering Power": The Need for More Basic Research and Instrumental Replication

    Science.gov (United States)

    Handley, Zöe

    2014-01-01

    This paper argues that the goal of Computer-Assisted Language Learning (CALL) research should be to construct a reliable evidence-base with "engineering power" and generality upon which the design of future CALL software and activities can be based. In order to establish such an evidence base for future CALL design, it suggests that CALL…

  18. BELIEF dashboard - a web-based curation interface to support generation of BEL networks

    OpenAIRE

    Madan, Sumit; Hodapp, Sven; Fluck, Juliane

    2015-01-01

    The relevance of network-based approaches in systems biology to achieve a better understanding of biological mechanisms has increased enormously. The Biological Expression Language (BEL) is well designed to collate findings from scientific literature into biological network models. To facilitate encoding and biocuration of such findings in BEL, a free and user-friendly web-based curation interface called BELIEF Dashboard has been developed. The interface incorporates an information extraction...

  19. Network-based analysis of complex diseases.

    Science.gov (United States)

    Liu, Z-P; Wang, Y; Zhang, X-S; Chen, L

    2012-02-01

    Complex diseases are commonly believed to be caused by the breakdown of several correlated genes rather than individual genes. The availability of genome-wide data of high-throughput experiments provides us with new opportunity to explore this hypothesis by analysing the disease-related biomolecular networks, which are expected to bridge genotypes and disease phenotypes and further reveal the biological mechanisms of complex diseases. In this study, the authors review the existing network biology efforts to study complex diseases, such as breast cancer, diabetes and Alzheimer's disease, using high-throughput data and computational tools. Specifically, the authors categorise these existing methods into several classes based on the research topics, that is, disease genes, dysfunctional pathways, network signatures and drug-target networks. The authors also summarise the pros and cons of those methods from both computation and application perspectives, and further discuss research trends and future topics of this promising field.

  20. INTEGRATING CORPUS-BASED RESOURCES AND NATURAL LANGUAGE PROCESSING TOOLS INTO CALL

    Directory of Open Access Journals (Sweden)

    Pascual Cantos Gomez

    2002-06-01

    Full Text Available This paper ainis at presenting a survey of computational linguistic tools presently available but whose potential has been neither fully considered not exploited to its full in modern CALL. It starts with a discussion on the rationale of DDL to language learning, presenting typical DDL-activities. DDL-software and potential extensions of non-typical DDL-software (electronic dictionaries and electronic dictionary facilities to DDL . An extended section is devoted to describe NLP-technology and how it can be integrated into CALL, within already existing software or as stand alone resources. A range of NLP-tools is presentcd (MT programs, taggers, lemn~atizersp, arsers and speech technologies with special emphasis on tagged concordancing. The paper finishes with a number of reflections and ideas on how language technologies can be used efficiently within the language learning context and how extensive exploration and integration of these technologies might change and extend both modern CAI,I, and the present language learning paradigiii..

  1. FPGA-based network intrusion detection for IEC 61850-based industrial network

    Directory of Open Access Journals (Sweden)

    Junsik Kim

    2018-03-01

    Full Text Available This paper proposes an FPGA-based network intrusion detection system for the IEC 61850-based industrial network that is specially designed for substation automation. The proposed system uses the Shift-And algorithm for detecting malicious network packets within IEC 61850 messages. To implement a complex rule matching module with a limited memory size of FPGA, a specially designed rule matching module was proposed in this paper. For feasibility evaluation, a prototype with 265 regular expression matching modules was implemented using Xilinx Zynq-7030 FPGA and its performance is presented in this paper. Keywords: Network intrusion detection system (NIDS, IEC 61850, Regular expression, Substation automation, FPGA

  2. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    destination.  Wormhole attack: A group of cooperating malicious nodes can pretend to connect two distant points in the network with a low-latency...communication link called wormhole link, causing disruptions in normal traffic load and flow.  Black hole attack: A malicious node, the so called

  3. Location-based Forwarding in Vehicular Networks

    NARCIS (Netherlands)

    Klein Wolterink, W.

    2013-01-01

    In this thesis we focus on location-based message forwarding in vehicular networks to support intelligent transportation systems (ITSs). ITSs are transport systems that utilise information and communication technologies to increase their level of automation, in this way levering the performance of

  4. Authentication Based on Multilayer Clustering in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Suh Heyi-Sook

    2005-01-01

    Full Text Available In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN, designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH using a new concept of control cluster head (CCH scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

  5. Inferring Trust Relationships in Web-Based Social Networks

    National Research Council Canada - National Science Library

    Golbeck, Jennifer; Hendler, James

    2006-01-01

    The growth of web-based social networking and the properties of those networks have created great potential for producing intelligent software that integrates a user's social network and preferences...

  6. Development of a CCD based system called DIGITRACK for automatic track counting and evaluation

    International Nuclear Information System (INIS)

    Molnar, J.; Somogyi, G.; Szilagyi, S.; Sepsy, K.

    1984-01-01

    We have developed, to the best of our knowledge, the first automatic track analysis system (DIGITRACK) in which the video signals are processed by a new type of video-receiver called charge-coupled device (CCD). The photosensitive semi-conductor device is a 2.5 cm long line imager of type Fairchild CCD 121HC which converts one row of the picture seen through a low magnification microscope into 1728 binary signals by a thresholding logic. The picture elements are analysed by a microcomputer equipped with two INTEL 8080 microprocessors and interfaced to a PDP-11/40 computer. The microcomputer also controls the motion of the stage of microscope. For pattern recognition and analysis a software procedure is developed which is able to differentiate between overlapping tracks and to determine the number, surface opening and x-y coordinates of the tracks occurring in a given detector area. The distribution of track densities and spot areas on the detector surface can be visualized on a graphic display. The DIGITRACK system has been tested for analysis of alpha-tracks registered in CR-39 and LR-115 detectors. (author)

  7. HEPES activates a MiT/TFE-dependent lysosomal-autophagic gene network in cultured cells: A call for caution.

    Science.gov (United States)

    Tol, Marc J; van der Lienden, Martijn J C; Gabriel, Tanit L; Hagen, Jacob J; Scheij, Saskia; Veenendaal, Tineke; Klumperman, Judith; Donker-Koopman, Wilma E; Verhoeven, Arthur J; Overkleeft, Hermen; Aerts, Johannes M; Argmann, Carmen A; van Eijk, Marco

    2018-02-17

    In recent years, the lysosome has emerged as a highly dynamic, transcriptionally regulated organelle that is integral to nutrient-sensing and metabolic rewiring. This is coordinated by a lysosome-to-nucleus signaling nexus in which MTORC1 controls the subcellular distribution of the microphthalmia-transcription factor E (MiT/TFE) family of "master lysosomal regulators". Yet, despite the importance of the lysosome in cellular metabolism, the impact of traditional in vitro culture media on lysosomal dynamics and/or MiT/TFE localization has not been fully appreciated. Here, we identify HEPES, a chemical buffering agent that is broadly applied in cell culture, as a potent inducer of lysosome biogenesis. Supplementation of HEPES to cell growth media is sufficient to decouple the MiT/TFE family members-TFEB, TFE3 and MITF-from regulatory mechanisms that control their cytosolic retention. Increased MiT/TFE nuclear import in turn drives the expression of a global network of lysosomal-autophagic and innate host-immune response genes, altering lysosomal dynamics, proteolytic capacity, autophagic flux, and inflammatory signaling. In addition, siRNA-mediated MiT/TFE knockdown effectively blunted HEPES-induced lysosome biogenesis and gene expression profiles. Mechanistically, we show that MiT/TFE activation in response to HEPES requires its macropinocytic ingestion and aberrant lysosomal storage/pH, but is independent of MTORC1 signaling. Altogether, our data underscore the cautionary use of chemical buffering agents in cell culture media due to their potentially confounding effects on experimental results.

  8. Research calls for preventive approach to gender-based violence in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-05-04

    May 4, 2016 ... Despite laws and a constitution that guarantees gender equality, women in Senegal still experience high rates of violence. Critics point to an ... Need for a paradigm shift from current strategies addressing gender-based violence that are based on repression, reparation, and victimization. Instead, promote a ...

  9. Network Based High Speed Product Innovation

    DEFF Research Database (Denmark)

    Lindgren, Peter

    to be of ever-increasing importance to many different kinds of companies. This happens at the same times as the share of new products of total turnover and earnings is increasing at unprecedented speed in many firms and industries. The latter results in the need for very fast innovation and product development......In the first decade of the 21st century, New Product Development has undergone major changes in the way NPD is managed and organised. This is due to changes in technology, market demands, and in the competencies of companies. As a result NPD organised in different forms of networks is predicted...... - a need that can almost only be resolved by organising NPD in some form of network configuration. The work of Peter Lindgren is on several aspects of network based high speed product innovation and contributes to a descriptive understanding of this phenomenon as well as with normative theory on how NPD...

  10. Quantum networks based on cavity QED

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, Stephan; Bochmann, Joerg; Figueroa, Eden; Hahn, Carolin; Kalb, Norbert; Muecke, Martin; Neuzner, Andreas; Noelleke, Christian; Reiserer, Andreas; Uphoff, Manuel; Rempe, Gerhard [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Strasse 1, 85748 Garching (Germany)

    2014-07-01

    Quantum repeaters require an efficient interface between stationary quantum memories and flying photons. Single atoms in optical cavities are ideally suited as universal quantum network nodes that are capable of sending, storing, retrieving, and even processing quantum information. We demonstrate this by presenting an elementary version of a quantum network based on two identical nodes in remote, independent laboratories. The reversible exchange of quantum information and the creation of remote entanglement are achieved by exchange of a single photon. Quantum teleportation is implemented using a time-resolved photonic Bell-state measurement. Quantum control over all degrees of freedom of the single atom also allows for the nondestructive detection of flying photons and the implementation of a quantum gate between the spin state of the atom and the polarization of a photon upon its reflection from the cavity. Our approach to quantum networking offers a clear perspective for scalability and provides the essential components for the realization of a quantum repeater.

  11. Service Desk Calls in a Home-based Clinical Informatics Study: Supporting End Users in the Field.

    Science.gov (United States)

    Valdez, Rs; Burke, Lj; Casper, Gr; Sturgeon, Ba; Rosmait, C; Palzkill, D; Hamann, D; Murphy, J; Brennan, Pf

    2012-01-01

    Home-based clinical informatics technologies are being developed to facilitate health care provision and management. Given the novelty of these technologies, end users such as patients and their formal and informal caregivers may require support during use. This paper presents a case study within the United States of the service desk calls generated over a 31-month period by patients enrolled in a large randomized field experiment, HeartCare II. This case study provides future deployers of home-based clinical information technologies with an understanding of the types of support that may be required during use. Our analysis reveals that calls to the service desk originated as a result of user problems, hardware problems, software problems, and internal communication problems among individuals involved in the delivery and use of the technology. Implications of these needs for support during use are also discussed.

  12. Dynamic social networks based on movement

    Science.gov (United States)

    Scharf, Henry; Hooten, Mevin B.; Fosdick, Bailey K.; Johnson, Devin S.; London, Joshua M.; Durban, John W.

    2016-01-01

    Network modeling techniques provide a means for quantifying social structure in populations of individuals. Data used to define social connectivity are often expensive to collect and based on case-specific, ad hoc criteria. Moreover, in applications involving animal social networks, collection of these data is often opportunistic and can be invasive. Frequently, the social network of interest for a given population is closely related to the way individuals move. Thus, telemetry data, which are minimally invasive and relatively inexpensive to collect, present an alternative source of information. We develop a framework for using telemetry data to infer social relationships among animals. To achieve this, we propose a Bayesian hierarchical model with an underlying dynamic social network controlling movement of individuals via two mechanisms: an attractive effect and an aligning effect. We demonstrate the model and its ability to accurately identify complex social behavior in simulation, and apply our model to telemetry data arising from killer whales. Using auxiliary information about the study population, we investigate model validity and find the inferred dynamic social network is consistent with killer whale ecology and expert knowledge.

  13. Neural network based multiscale image restoration approach

    Science.gov (United States)

    de Castro, Ana Paula A.; da Silva, José D. S.

    2007-02-01

    This paper describes a neural network based multiscale image restoration approach. Multilayer perceptrons are trained with artificial images of degraded gray level circles, in an attempt to make the neural network learn inherent space relations of the degraded pixels. The present approach simulates the degradation by a low pass Gaussian filter blurring operation and the addition of noise to the pixels at pre-established rates. The training process considers the degraded image as input and the non-degraded image as output for the supervised learning process. The neural network thus performs an inverse operation by recovering a quasi non-degraded image in terms of least squared. The main difference of the approach to existing ones relies on the fact that the space relations are taken from different scales, thus providing relational space data to the neural network. The approach is an attempt to come up with a simple method that leads to an optimum solution to the problem. Considering different window sizes around a pixel simulates the multiscale operation. In the generalization phase the neural network is exposed to indoor, outdoor, and satellite degraded images following the same steps use for the artificial circle image.

  14. Wavelet Network Model Based on Multiple Criteria Decision Making for Forecasting Temperature Time Series

    OpenAIRE

    Zhang, Jian; Yang, Xiao-hua; Chen, Xiao-juan

    2015-01-01

    Due to nonlinear and multiscale characteristics of temperature time series, a new model called wavelet network model based on multiple criteria decision making (WNMCDM) has been proposed, which combines the advantage of wavelet analysis, multiple criteria decision making, and artificial neural network. One case for forecasting extreme monthly maximum temperature of Miyun Reservoir has been conducted to examine the performance of WNMCDM model. Compared with nearest neighbor bootstrapping regr...

  15. ReSeg: A Recurrent Neural Network-based Model for Semantic Segmentation

    OpenAIRE

    Visin, Francesco; Ciccone, Marco; Romero, Adriana; Kastner, Kyle; Cho, Kyunghyun; Bengio, Yoshua; Matteucci, Matteo; Courville, Aaron

    2015-01-01

    We propose a structured prediction architecture, which exploits the local generic features extracted by Convolutional Neural Networks and the capacity of Recurrent Neural Networks (RNN) to retrieve distant dependencies. The proposed architecture, called ReSeg, is based on the recently introduced ReNet model for image classification. We modify and extend it to perform the more challenging task of semantic segmentation. Each ReNet layer is composed of four RNN that sweep the image horizontally ...

  16. Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection

    OpenAIRE

    Chen, Tong; Wu, Lin; Li, Xue; Zhang, Jun; Yin, Hongzhi; Wang, Yang

    2017-01-01

    The proliferation of social media in communication and information dissemination has made it an ideal platform for spreading rumors. Automatically debunking rumors at their stage of diffusion is known as \\textit{early rumor detection}, which refers to dealing with sequential posts regarding disputed factual claims with certain variations and highly textual duplication over time. Thus, identifying trending rumors demands an efficient yet flexible model that is able to capture long-range depend...

  17. An SDN based approach for the ATLAS data acquisition network

    CERN Document Server

    Blikra, Espen; The ATLAS collaboration

    2016-01-01

    ATLAS is a high energy physics experiment in the Large Hadron Collider located at CERN. During the so called Long Shutdown 2 period scheduled for late 2019, ATLAS will undergo several modifications and upgrades on its data acquisition system in order to cope with the higher luminosity requirements. As part of these activities, a new read-out chain will be built for the New Small Wheel muon detector and the one of the Liquid Argon calorimeter will be upgraded. The subdetector specific electronic boards will be replaced with new commodity-server-based systems and instead of the custom serial-link-based communication, the new system will make use of a yet to be chosen commercial network technology. The new network will be used as a data acquisition network and at the same time it is intended to allow communication for the control, calibration and monitoring of the subdetectors. Therefore several types of traffic with different bandwidth requirements and different criticality will be competing for the same underl...

  18. Quantitative learning strategies based on word networks

    Science.gov (United States)

    Zhao, Yue-Tian-Yi; Jia, Zi-Yang; Tang, Yong; Xiong, Jason Jie; Zhang, Yi-Cheng

    2018-02-01

    Learning English requires a considerable effort, but the way that vocabulary is introduced in textbooks is not optimized for learning efficiency. With the increasing population of English learners, learning process optimization will have significant impact and improvement towards English learning and teaching. The recent developments of big data analysis and complex network science provide additional opportunities to design and further investigate the strategies in English learning. In this paper, quantitative English learning strategies based on word network and word usage information are proposed. The strategies integrate the words frequency with topological structural information. By analyzing the influence of connected learned words, the learning weights for the unlearned words and dynamically updating of the network are studied and analyzed. The results suggest that quantitative strategies significantly improve learning efficiency while maintaining effectiveness. Especially, the optimized-weight-first strategy and segmented strategies outperform other strategies. The results provide opportunities for researchers and practitioners to reconsider the way of English teaching and designing vocabularies quantitatively by balancing the efficiency and learning costs based on the word network.

  19. EMERGENCY CALLS

    CERN Multimedia

    2001-01-01

    IN URGENT NEED OF A DOCTOR GENEVA EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME, open 24h/24h 748-49-50 Association Of Geneva Doctors Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin EMERGENCIES 719-61-11 URGENCES PEDIATRIQUES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112 FRANCE EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ANTI-POISONS CENTRE Open 24h/24h 04-72-11-69-11 All doctors ...

  20. House Calls: The Impact of Home-Based Care for Older Adults With Alzheimer's and Dementia.

    Science.gov (United States)

    Wilson, Kasey; Bachman, Sara S

    2015-01-01

    Older adults with Alzheimer's/dementia have high health care costs; they may benefit from home-based care, but few have home visits. This article describes a home-based care program for frail elders, including those with Alzheimer's/dementia. Descriptive statistics are provided for Medicare-enrolled program participants and matched controls with Alzheimer's/dementia on expenditures along six services: skilled nursing facility, inpatient acute, physician, home health, hospice, and social services. Cases with dementia were significantly more likely to have home health and hospice expenditures than controls, suggesting potential for the program to improve end-of-life care. Very few cases or controls had any social service expenditures. Social workers should advocate for the expanded role of home-based care for older adults with dementia and for increased Medicare reimbursement of social work services.

  1. Comparison analysis on vulnerability of metro networks based on complex network

    Science.gov (United States)

    Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan

    2018-04-01

    This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.

  2. Networking activities in technology-based entrepreneurial teams

    DEFF Research Database (Denmark)

    Neergaard, Helle

    2005-01-01

    Based on social network theoy, this article investigates the distribution of networking roles and responsibilities in entrepreneurial founding teams. Its focus is on the team as a collection of individuals, thus allowing the research to address differences in networking patterns. It identifies six...... central networking activities and shows that not all founding team members are equally active 'networkers'. The analyses show that team members prioritize different networking activities and that one member in particular has extensive networking activities whereas other memebrs of the team are more...... limited in their networking, while some even reject the notion of networking as a useful activity....

  3. Research calls for preventive approach to gender-based violence in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Their research looked at the root causes and impacts of violence against women and also assessed the effectiveness of existing strategies to prevent and combat gender-based violence. Their work has identified key strategies to strengthen civil society and public organizations engaged in preventing violence against ...

  4. Prediction of oncogenic interactions and cancer-related signaling networks based on network topology.

    Directory of Open Access Journals (Sweden)

    Marcio Luis Acencio

    Full Text Available Cancer has been increasingly recognized as a systems biology disease since many investigators have demonstrated that this malignant phenotype emerges from abnormal protein-protein, regulatory and metabolic interactions induced by simultaneous structural and regulatory changes in multiple genes and pathways. Therefore, the identification of oncogenic interactions and cancer-related signaling networks is crucial for better understanding cancer. As experimental techniques for determining such interactions and signaling networks are labor-intensive and time-consuming, the development of a computational approach capable to accomplish this task would be of great value. For this purpose, we present here a novel computational approach based on network topology and machine learning capable to predict oncogenic interactions and extract relevant cancer-related signaling subnetworks from an integrated network of human genes interactions (INHGI. This approach, called graph2sig, is twofold: first, it assigns oncogenic scores to all interactions in the INHGI and then these oncogenic scores are used as edge weights to extract oncogenic signaling subnetworks from INHGI. Regarding the prediction of oncogenic interactions, we showed that graph2sig is able to recover 89% of known oncogenic interactions with a precision of 77%. Moreover, the interactions that received high oncogenic scores are enriched in genes for which mutations have been causally implicated in cancer. We also demonstrated that graph2sig is potentially useful in extracting oncogenic signaling subnetworks: more than 80% of constructed subnetworks contain more than 50% of original interactions in their corresponding oncogenic linear pathways present in the KEGG PATHWAY database. In addition, the potential oncogenic signaling subnetworks discovered by graph2sig are supported by experimental evidence. Taken together, these results suggest that graph2sig can be a useful tool for investigators involved

  5. Network-based recommendation algorithms: A review

    Science.gov (United States)

    Yu, Fei; Zeng, An; Gillard, Sébastien; Medo, Matúš

    2016-06-01

    Recommender systems are a vital tool that helps us to overcome the information overload problem. They are being used by most e-commerce web sites and attract the interest of a broad scientific community. A recommender system uses data on users' past preferences to choose new items that might be appreciated by a given individual user. While many approaches to recommendation exist, the approach based on a network representation of the input data has gained considerable attention in the past. We review here a broad range of network-based recommendation algorithms and for the first time compare their performance on three distinct real datasets. We present recommendation topics that go beyond the mere question of which algorithm to use-such as the possible influence of recommendation on the evolution of systems that use it-and finally discuss open research directions and challenges.

  6. Data base of dose coefficients called ecrin-V1-internet reference handbook

    International Nuclear Information System (INIS)

    Perrin, M.L.

    2003-07-01

    The objective of this data base is to dispose on a only computer medium the values of radiation doses allowing to guarantee the tracing and the coherence of radiation doses received by man. These data are usable to evaluate the risks in the frame of studies or expertise. They include the doses coming from external irradiations, internal contamination by inhalation or ingestion and receive by workers or public. The definitions and reference values come from international publications (the list is given). (N.C.)

  7. Research on Network Scanning Strategy Based on Information Granularity

    Science.gov (United States)

    Qin, Futong; Shi, Pengfei; Du, Jing; Cheng, Ruosi; Zhou, Yunyan

    2017-10-01

    As the basic mean to obtain the information of the targets network, network scanning is often used to discover the security risks and vulnerabilities existing on the network. However, with the development of network technology, the scale of network is more and more large, and the network scanning efficiency put forward higher requirements. In this paper, the concept of network scanning information granularity is proposed, and the design method of network scanning strategy based on information granularity is proposed. Based on single information granularity and hybrid information granularity, four network scanning strategies were designed and verified experimentally. Experiments show that the network scanning strategies based on hybrid information granularity can improve the efficiency of network scanning.

  8. Community detection based on network communicability

    Science.gov (United States)

    Estrada, Ernesto

    2011-03-01

    We propose a new method for detecting communities based on the concept of communicability between nodes in a complex network. This method, designated as N-ComBa K-means, uses a normalized version of the adjacency matrix to build the communicability matrix and then applies K-means clustering to find the communities in a graph. We analyze how this method performs for some pathological cases found in the analysis of the detection limit of communities and propose some possible solutions on the basis of the analysis of the ratio of local to global densities in graphs. We use four different quality criteria for detecting the best clustering and compare the new approach with the Girvan-Newman algorithm for the analysis of two "classical" networks: karate club and bottlenose dolphins. Finally, we analyze the more challenging case of homogeneous networks with community structure, for which the Girvan-Newman completely fails in detecting any clustering. The N-ComBa K-means approach performs very well in these situations and we applied it to detect the community structure in an international trade network of miscellaneous manufactures of metal having these characteristics. Some final remarks about the general philosophy of community detection are also discussed.

  9. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  10. Attention and Motivated Response to Simulated Male Advertisement Call Activates Forebrain Dopaminergic and Social Decision-Making Network Nuclei in Female Midshipman Fish.

    Science.gov (United States)

    Forlano, Paul M; Licorish, Roshney R; Ghahramani, Zachary N; Timothy, Miky; Ferrari, Melissa; Palmer, William C; Sisneros, Joseph A

    2017-10-01

    Little is known regarding the coordination of audition with decision-making and subsequent motor responses that initiate social behavior including mate localization during courtship. Using the midshipman fish model, we tested the hypothesis that the time spent by females attending and responding to the advertisement call is correlated with the activation of a specific subset of catecholaminergic (CA) and social decision-making network (SDM) nuclei underlying auditory- driven sexual motivation. In addition, we quantified the relationship of neural activation between CA and SDM nuclei in all responders with the goal of providing a map of functional connectivity of the circuitry underlying a motivated state responsive to acoustic cues during mate localization. In order to make a baseline qualitative comparison of this functional brain map to unmotivated females, we made a similar correlative comparison of brain activation in females who were unresponsive to the advertisement call playback. Our results support an important role for dopaminergic neurons in the periventricular posterior tuberculum and ventral thalamus, putative A11 and A13 tetrapod homologues, respectively, as well as the posterior parvocellular preoptic area and dorsomedial telencephalon, (laterobasal amygdala homologue) in auditory attention and appetitive sexual behavior in fishes. These findings may also offer insights into the function of these highly conserved nuclei in the context of auditory-driven reproductive social behavior across vertebrates. © The Author 2017. Published by Oxford University Press on behalf of the Society for Integrative and Comparative Biology. All rights reserved. For permissions please email: journals.permissions@oup.com.

  11. Research of ad hoc network based on SINCGARS network

    Science.gov (United States)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  12. Posttraumatic stress disorder in incarcerated women: A call for evidence-based treatment.

    Science.gov (United States)

    Harner, Holly M; Budescu, Mia; Gillihan, Seth J; Riley, Suzanne; Foa, Edna B

    2015-01-01

    The majority of women who enter the criminal justice system, most of whom are poor and women of color, have suffered from significant lifetime trauma exposure that can lead to posttraumatic stress disorder (PTSD). It is essential to identify the prevalence of PTSD among this population in order to identify treatment needs. Most studies on PTSD among incarcerated women have focused on PTSD in jailed populations, including women awaiting trial. Using a cross-sectional study design, we estimated the prevalence of PTSD and comorbid physical and mental health conditions in 387 incarcerated women sentenced to a maximum-security prison in the United States. Almost half (44%) of our sample met the diagnostic criteria for PTSD. Women with moderate to severe PTSD symptoms were more likely to report several comorbid physical and mental health conditions than were women without PTSD. Women with the most severe symptoms were most likely to report receiving mental health treatment in prison; women with moderate to severe symptoms were less likely to report receiving similar mental health care. Our findings add support to the link between PTSD and comorbid physical and mental health conditions and suggest that many women with PTSD are not receiving mental health treatment that is likely to benefit them. Because prison has become the mental health safety net for some of the nation's most vulnerable women, it is imperative that prisons provide evidence-based PTSD treatment during incarceration. (c) 2015 APA, all rights reserved).

  13. Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network

    Science.gov (United States)

    Gilani, Syed Sherjeel Ahmad; Zubair, Muhammad; Khan, Zeeshan Shafi

    Infrastructure-based Wireless Mesh Networks are emerging as an affordable, robust, flexible and scalable technology. With the advent of Wireless Mesh Networks (WMNs) the dream of connecting multiple technology based networks seems to come true. A fully secure WMN is still a challenge for the researchers. In infrastructure-based WMNs almost all types of existing Wireless Networks like Wi-Fi, Cellular, WiMAX, and Sensor etc can be connected through Wireless Mesh Routers (WMRs). This situation can lead to a security problem. Some nodes can be part of the network with high processing power, large memory and least energy issues while others may belong to a network having low processing power, small memory and serious energy limitations. The later type of the nodes is very much vulnerable to targeted attacks. In our research we have suggested to set some rules on the WMR to mitigate these kinds of targeted flooding attacks. The WMR will then share those set of rules with other WMRs for Effective Utilization of Resources.

  14. Management and services for large-scale virtual 3D urban model data based on network

    Science.gov (United States)

    He, Zhengwei; Chen, Jing; Wu, Huayi

    2008-10-01

    The buildings in modern city are complex and diverse, and the quantity is huge. These bring very big challenge for constructing 3D GIS under network circumstance and eventually realizing the Digital Earth. After analyzed the characteristic of network service about massive 3D urban building model data, this paper focuses on the organization and management of spatial data and the network services strategy, proposes a progressive network transmission schema based on the spatial resolution and the component elements of 3D building model data. Next, this paper put forward multistage-link three-dimensional spatial data organization model and encoding method of spatial index based on fully level quadtree structure. Then, a virtual earth platform, called GeoGlobe, was developed using above theory. Experimental results show that above 3D spatial data management model and service theory can availably provide network services for large-scale 3D urban model data. The application results and user experience good .

  15. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  16. Hyperbolic mapping of complex networks based on community information

    Science.gov (United States)

    Wang, Zuxi; Li, Qingguang; Jin, Fengdong; Xiong, Wei; Wu, Yao

    2016-08-01

    To improve the hyperbolic mapping methods both in terms of accuracy and running time, a novel mapping method called Community and Hyperbolic Mapping (CHM) is proposed based on community information in this paper. Firstly, an index called Community Intimacy (CI) is presented to measure the adjacency relationship between the communities, based on which a community ordering algorithm is introduced. According to the proposed Community-Sector hypothesis, which supposes that most nodes of one community gather in a same sector in hyperbolic space, CHM maps the ordered communities into hyperbolic space, and then the angular coordinates of nodes are randomly initialized within the sector that they belong to. Therefore, all the network nodes are so far mapped to hyperbolic space, and then the initialized angular coordinates can be optimized by employing the information of all nodes, which can greatly improve the algorithm precision. By applying the proposed dual-layer angle sampling method in the optimization procedure, CHM reduces the time complexity to O(n2) . The experiments show that our algorithm outperforms the state-of-the-art methods.

  17. Network-based analysis of proteomic profiles

    KAUST Repository

    Wong, Limsoon

    2016-01-26

    Mass spectrometry (MS)-based proteomics is a widely used and powerful tool for profiling systems-wide protein expression changes. It can be applied for various purposes, e.g. biomarker discovery in diseases and study of drug responses. Although RNA-based high-throughput methods have been useful in providing glimpses into the underlying molecular processes, the evidences they provide are indirect. Furthermore, RNA and corresponding protein levels have been known to have poor correlation. On the other hand, MS-based proteomics tend to have consistency issues (poor reproducibility and inter-sample agreement) and coverage issues (inability to detect the entire proteome) that need to be urgently addressed. In this talk, I will discuss how these issues can be addressed by proteomic profile analysis techniques that use biological networks (especially protein complexes) as the biological context. In particular, I will describe several techniques that we have been developing for network-based analysis of proteomics profile. And I will present evidence that these techniques are useful in identifying proteomics-profile analysis results that are more consistent, more reproducible, and more biologically coherent, and that these techniques allow expansion of the detected proteome to uncover and/or discover novel proteins.

  18. Random and directed walk-based top-(k) queries in wireless sensor networks.

    Science.gov (United States)

    Fu, Jun-Song; Liu, Yun

    2015-05-26

    In wireless sensor networks, filter-based top-  query approaches are the state-of-the-art solutions and have been extensively researched in the literature, however, they are very sensitive to the network parameters, including the size of the network, dynamics of the sensors' readings and declines in the overall range of all the readings. In this work, a random walk-based top-  query approach called RWTQ and a directed walk-based top-  query approach called DWTQ are proposed. At the beginning of a top-  query, one or several tokens are sent to the specific node(s) in the network by the base station. Then, each token walks in the network independently to record and process the readings in a random or directed way. A strategy of choosing the "right" way in DWTQ is carefully designed for the token(s) to arrive at the high-value regions as soon as possible. When designing the walking strategy for DWTQ, the spatial correlations of the readings are also considered. Theoretical analysis and simulation results indicate that RWTQ and DWTQ both are very robust against these parameters discussed previously. In addition, DWTQ outperforms TAG, FILA and EXTOK in transmission cost, energy consumption and network lifetime.

  19. Computing distance-based topological descriptors of complex chemical networks: New theoretical techniques

    Science.gov (United States)

    Hayat, Sakander

    2017-11-01

    Structure-based topological descriptors/indices of complex chemical networks enable prediction of physico-chemical properties and the bioactivities of these compounds through QSAR/QSPR methods. In this paper, we have developed a rigorous computational and theoretical technique to compute various distance-based topological indices of complex chemical networks. A fullerene is called the IPR (Isolated-Pentagon-Rule) fullerene, if every pentagon in it is surrounded by hexagons only. To ensure the applicability of our technique, we compute certain distance-based indices of an infinite family of IPR fullerenes. Our results show that the proposed technique is more diverse and bears less algorithmic and combinatorial complexity.

  20. Insulator recognition based on convolution neural network

    Directory of Open Access Journals (Sweden)

    Yang Yanli

    2017-01-01

    Full Text Available Insulator fault detection plays an important role in maintaining the safety of transmission lines. Insulator recognition is a prerequisite for its fault detection. An insulator recognition algorithm based on convolution neural network (CNN is proposed. A dataset is established to train the constructed CNN. The correct rate is 98.52% for 1220 training samples and the accuracy rate of testing is 89.04% on 1305 samples. The classification result of the CNN is further used to segment the insulator image. The test results show that the proposed method can realize the effective segmentation of insulators.

  1. WEB BASED LEARNING OF COMPUTER NETWORK COURSE

    Directory of Open Access Journals (Sweden)

    Hakan KAPTAN

    2004-04-01

    Full Text Available As a result of developing on Internet and computer fields, web based education becomes one of the area that many improving and research studies are done. In this study, web based education materials have been explained for multimedia animation and simulation aided Computer Networks course in Technical Education Faculties. Course content is formed by use of university course books, web based education materials and technology web pages of companies. Course content is formed by texts, pictures and figures to increase motivation of students and facilities of learning some topics are supported by animations. Furthermore to help working principles of routing algorithms and congestion control algorithms simulators are constructed in order to interactive learning

  2. Curation-Based Network Marketing: Strategies for Network Growth and Electronic Word-of-Mouth Diffusion

    Science.gov (United States)

    Church, Earnie Mitchell, Jr.

    2013-01-01

    In the last couple of years, a new aspect of online social networking has emerged, in which the strength of social network connections is based not on social ties but mutually shared interests. This dissertation studies these "curation-based" online social networks (CBN) and their suitability for the diffusion of electronic word-of-mouth…

  3. CUFID-query: accurate network querying through random walk based network flow estimation.

    Science.gov (United States)

    Jeong, Hyundoo; Qian, Xiaoning; Yoon, Byung-Jun

    2017-12-28

    Functional modules in biological networks consist of numerous biomolecules and their complicated interactions. Recent studies have shown that biomolecules in a functional module tend to have similar interaction patterns and that such modules are often conserved across biological networks of different species. As a result, such conserved functional modules can be identified through comparative analysis of biological networks. In this work, we propose a novel network querying algorithm based on the CUFID (Comparative network analysis Using the steady-state network Flow to IDentify orthologous proteins) framework combined with an efficient seed-and-extension approach. The proposed algorithm, CUFID-query, can accurately detect conserved functional modules as small subnetworks in the target network that are expected to perform similar functions to the given query functional module. The CUFID framework was recently developed for probabilistic pairwise global comparison of biological networks, and it has been applied to pairwise global network alignment, where the framework was shown to yield accurate network alignment results. In the proposed CUFID-query algorithm, we adopt the CUFID framework and extend it for local network alignment, specifically to solve network querying problems. First, in the seed selection phase, the proposed method utilizes the CUFID framework to compare the query and the target networks and to predict the probabilistic node-to-node correspondence between the networks. Next, the algorithm selects and greedily extends the seed in the target network by iteratively adding nodes that have frequent interactions with other nodes in the seed network, in a way that the conductance of the extended network is maximally reduced. Finally, CUFID-query removes irrelevant nodes from the querying results based on the personalized PageRank vector for the induced network that includes the fully extended network and its neighboring nodes. Through extensive

  4. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    Science.gov (United States)

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.

  5. Modeling online social networks based on preferential linking

    International Nuclear Information System (INIS)

    Hu Hai-Bo; Chen Jun; Guo Jin-Li

    2012-01-01

    We study the phenomena of preferential linking in a large-scale evolving online social network and find that the linear preference holds for preferential creation, preferential acceptance, and preferential attachment. Based on the linear preference, we propose an analyzable model, which illustrates the mechanism of network growth and reproduces the process of network evolution. Our simulations demonstrate that the degree distribution of the network produced by the model is in good agreement with that of the real network. This work provides a possible bridge between the micro-mechanisms of network growth and the macrostructures of online social networks

  6. Paper-based Synthetic Gene Networks

    Science.gov (United States)

    Pardee, Keith; Green, Alexander A.; Ferrante, Tom; Cameron, D. Ewen; DaleyKeyser, Ajay; Yin, Peng; Collins, James J.

    2014-01-01

    Synthetic gene networks have wide-ranging uses in reprogramming and rewiring organisms. To date, there has not been a way to harness the vast potential of these networks beyond the constraints of a laboratory or in vivo environment. Here, we present an in vitro paper-based platform that provides a new venue for synthetic biologists to operate, and a much-needed medium for the safe deployment of engineered gene circuits beyond the lab. Commercially available cell-free systems are freeze-dried onto paper, enabling the inexpensive, sterile and abiotic distribution of synthetic biology-based technologies for the clinic, global health, industry, research and education. For field use, we create circuits with colorimetric outputs for detection by eye, and fabricate a low-cost, electronic optical interface. We demonstrate this technology with small molecule and RNA actuation of genetic switches, rapid prototyping of complex gene circuits, and programmable in vitro diagnostics, including glucose sensors and strain-specific Ebola virus sensors. PMID:25417167

  7. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  8. Artificial organic networks artificial intelligence based on carbon networks

    CERN Document Server

    Ponce-Espinosa, Hiram; Molina, Arturo

    2014-01-01

    This monograph describes the synthesis and use of biologically-inspired artificial hydrocarbon networks (AHNs) for approximation models associated with machine learning and a novel computational algorithm with which to exploit them. The reader is first introduced to various kinds of algorithms designed to deal with approximation problems and then, via some conventional ideas of organic chemistry, to the creation and characterization of artificial organic networks and AHNs in particular. The advantages of using organic networks are discussed with the rules to be followed to adapt the network to its objectives. Graph theory is used as the basis of the necessary formalism. Simulated and experimental examples of the use of fuzzy logic and genetic algorithms with organic neural networks are presented and a number of modeling problems suitable for treatment by AHNs are described: ·        approximation; ·        inference; ·        clustering; ·        control; ·        class...

  9. Rumor diffusion in an interests-based dynamic social network.

    Science.gov (United States)

    Tang, Mingsheng; Mao, Xinjun; Guessoum, Zahia; Zhou, Huiping

    2013-01-01

    To research rumor diffusion in social friend network, based on interests, a dynamic friend network is proposed, which has the characteristics of clustering and community, and a diffusion model is also proposed. With this friend network and rumor diffusion model, based on the zombie-city model, some simulation experiments to analyze the characteristics of rumor diffusion in social friend networks have been conducted. The results show some interesting observations: (1) positive information may evolve to become a rumor through the diffusion process that people may modify the information by word of mouth; (2) with the same average degree, a random social network has a smaller clustering coefficient and is more beneficial for rumor diffusion than the dynamic friend network; (3) a rumor is spread more widely in a social network with a smaller global clustering coefficient than in a social network with a larger global clustering coefficient; and (4) a network with a smaller clustering coefficient has a larger efficiency.

  10. EEG signal classification based on artificial neural networks and amplitude spectra features

    Science.gov (United States)

    Chojnowski, K.; FrÄ czek, J.

    BCI (called Brain-Computer Interface) is an interface that allows direct communication between human brain and an external device. It bases on EEG signal collection, processing and classification. In this paper a complete BCI system is presented which classifies EEG signal using artificial neural networks. For this purpose we used a multi-layered perceptron architecture trained with the RProp algorithm. Furthermore a simple multi-threaded method for automatic network structure optimizing was shown. We presented the results of our system in the opening and closing eyes recognition task. We also showed how our system could be used for controlling devices basing on imaginary hand movements.

  11. Link predication based on matrix factorization by fusion of multi class organizations of the network.

    Science.gov (United States)

    Jiao, Pengfei; Cai, Fei; Feng, Yiding; Wang, Wenjun

    2017-08-21

    Link predication aims at forecasting the latent or unobserved edges in the complex networks and has a wide range of applications in reality. Almost existing methods and models only take advantage of one class organization of the networks, which always lose important information hidden in other organizations of the network. In this paper, we propose a link predication framework which makes the best of the structure of networks in different level of organizations based on nonnegative matrix factorization, which is called NMF 3 here. We first map the observed network into another space by kernel functions, which could get the different order organizations. Then we combine the adjacency matrix of the network with one of other organizations, which makes us obtain the objective function of our framework for link predication based on the nonnegative matrix factorization. Third, we derive an iterative algorithm to optimize the objective function, which converges to a local optimum, and we propose a fast optimization strategy for large networks. Lastly, we test the proposed framework based on two kernel functions on a series of real world networks under different sizes of training set, and the experimental results show the feasibility, effectiveness, and competitiveness of the proposed framework.

  12. Network-Based and Binless Frequency Analyses.

    Directory of Open Access Journals (Sweden)

    Sybil Derrible

    Full Text Available We introduce and develop a new network-based and binless methodology to perform frequency analyses and produce histograms. In contrast with traditional frequency analysis techniques that use fixed intervals to bin values, we place a range ±ζ around each individual value in a data set and count the number of values within that range, which allows us to compare every single value of a data set with one another. In essence, the methodology is identical to the construction of a network, where two values are connected if they lie within a given a range (±ζ. The value with the highest degree (i.e., most connections is therefore assimilated to the mode of the distribution. To select an optimal range, we look at the stability of the proportion of nodes in the largest cluster. The methodology is validated by sampling 12 typical distributions, and it is applied to a number of real-world data sets with both spatial and temporal components. The methodology can be applied to any data set and provides a robust means to uncover meaningful patterns and trends. A free python script and a tutorial are also made available to facilitate the application of the method.

  13. Computerized tongue diagnosis based on Bayesian networks.

    Science.gov (United States)

    Pang, Bo; Zhang, David; Li, Naimin; Wang, Kuanquan

    2004-10-01

    Tongue diagnosis is an important diagnostic method in traditional Chinese medicine (TCM). However, due to its qualitative, subjective and experience-based nature, traditional tongue diagnosis has a very limited-application in clinical medicine. Moreover, traditional tongue diagnosis is always concerned with the identification of syndromes rather than with the connection between tongue abnormal appearances and diseases. This is not well understood in Western medicine, thus greatly obstruct its wider use in the world. In this paper, we present a novel computerized tongue inspection method aiming to address these problems. First, two kinds of quantitative features, chromatic and textural measures, are extracted from tongue images by using popular digital image processing techniques. Then, Bayesian networks are employed to model the relationship between these quantitative features and diseases. The effectiveness of the method is tested on a group of 455 patients affected by 13 common diseases as well as other 70 healthy volunteers, and the diagnostic results predicted by the previously trained Bayesian network classifiers are reported.

  14. Communication Network Architectures Based on Ethernet Passive Optical Network for Offshore Wind Power Farms

    Directory of Open Access Journals (Sweden)

    Mohamed A. Ahmed

    2016-03-01

    Full Text Available Nowadays, with large-scale offshore wind power farms (WPFs becoming a reality, more efforts are needed to maintain a reliable communication network for WPF monitoring. Deployment topologies, redundancy, and network availability are the main items to enhance the communication reliability between wind turbines (WTs and control centers. Traditional communication networks for monitoring and control (i.e., supervisory control and data acquisition (SCADA systems using switched gigabit Ethernet will not be sufficient for the huge amount of data passing through the network. In this paper, the optical power budget, optical path loss, reliability, and network cost of the proposed Ethernet Passive Optical Network (EPON-based communication network for small-size offshore WPFs have been evaluated for five different network architectures. The proposed network model consists of an optical network unit device (ONU deployed on the WT side for collecting data from different internal networks. All ONUs from different WTs are connected to a central optical line terminal (OLT, placed in the control center. There are no active electronic elements used between the ONUs and the OLT, which reduces the costs and complexity of maintenance and deployment. As fiber access networks without any protection are characterized by poor reliability, three different protection schemes have been configured, explained, and discussed. Considering the cost of network components, the total implementation expense of different architectures with, or without, protection have been calculated and compared. The proposed network model can significantly contribute to the communication network architecture for next generation WPFs.

  15. Mobile Agent-Based Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kwon Taekyoung

    2007-01-01

    Full Text Available In the environments where the source nodes are close to one another and generate a lot of sensory data traffic with redundancy, transmitting all sensory data by individual nodes not only wastes the scarce wireless bandwidth, but also consumes a lot of battery energy. Instead of each source node sending sensory data to its sink for aggregation (the so-called client/server computing, Qi et al. in 2003 proposed a mobile agent (MA-based distributed sensor network (MADSN for collaborative signal and information processing, which considerably reduces the sensory data traffic and query latency as well. However, MADSN is based on the assumption that the operation of mobile agent is only carried out within one hop in a clustering-based architecture. This paper considers MA in multihop environments and adopts directed diffusion (DD to dispatch MA. The gradient in DD gives a hint to efficiently forward the MA among target sensors. The mobile agent paradigm in combination with the DD framework is dubbed mobile agent-based directed diffusion (MADD. With appropriate parameters set, extensive simulation shows that MADD exhibits better performance than original DD (in the client/server paradigm in terms of packet delivery ratio, energy consumption, and end-to-end delivery latency.

  16. Location-Based Self-Adaptive Routing Algorithm for Wireless Sensor Networks in Home Automation

    Directory of Open Access Journals (Sweden)

    Hong SeungHo

    2011-01-01

    Full Text Available The use of wireless sensor networks in home automation (WSNHA is attractive due to their characteristics of self-organization, high sensing fidelity, low cost, and potential for rapid deployment. Although the AODVjr routing algorithm in IEEE 802.15.4/ZigBee and other routing algorithms have been designed for wireless sensor networks, not all are suitable for WSNHA. In this paper, we propose a location-based self-adaptive routing algorithm for WSNHA called WSNHA-LBAR. It confines route discovery flooding to a cylindrical request zone, which reduces the routing overhead and decreases broadcast storm problems in the MAC layer. It also automatically adjusts the size of the request zone using a self-adaptive algorithm based on Bayes' theorem. This makes WSNHA-LBAR more adaptable to the changes of the network state and easier to implement. Simulation results show improved network reliability as well as reduced routing overhead.

  17. Computer network management based on TMN

    Science.gov (United States)

    Li, Yanpeng; Li, Xiang; Zhuang, Zhaowen

    2002-09-01

    Computer Network Management is the most important work of the computer network. Two problems in managing of a professional network must be solved, one is to standardize the relationship between the professional network and the management network, and the other is to ensure the security of the network. The first problem will be discussed here. We put forward a new idea here, that is, to build standard computer management network and standard professional network. First, we give a standard model of the relationship between the management network and its subordinate professional network. This model is different with the TMN. It distinguishes the management network and the subordinate professional network clearly in the notion, the place and the property of all the sockets is determined. Subsequently, the corresponding function structure and physical architecture are given together. For each kind of architecture, we define the related rules respectively. These rules are: the relationship between the function module, the standard of the interface, protocol architecture. Then, the procedure of communication signal processing is analyzed. The requirements of all the programming sockets are explained. Finally, we explain some related topics briefly.

  18. Analysis of neural networks through base functions

    NARCIS (Netherlands)

    van der Zwaag, B.J.; Slump, Cornelis H.; Spaanenburg, L.

    Problem statement. Despite their success-story, neural networks have one major disadvantage compared to other techniques: the inability to explain comprehensively how a trained neural network reaches its output; neural networks are not only (incorrectly) seen as a "magic tool" but possibly even more

  19. Personalized Network-Based Treatments in Oncology

    DEFF Research Database (Denmark)

    Robin, Xavier; Creixell, Pau; Radetskaya, Oxana

    2013-01-01

    Network medicine aims at unraveling cell signaling networks to propose personalized treatments for patients suffering from complex diseases. In this short review, we show the relevance of network medicine to cancer treatment by outlining the potential convergence points of the most recent technol...

  20. NM-Net Gigabit-based Implementation on Core Network Facilities and Network Design Hierarchy

    International Nuclear Information System (INIS)

    Raja Murzaferi Raja Moktar; Mohd Fauzi Haris; Siti Nurbahyah Hamdan

    2011-01-01

    Nuclear Malaysia computing network or NM the main backbone of internet working on operational staffs. Main network operating center or NOC is situated in Block 15 and linkup via fiber cabling to adjacent main network blocks (18, 29, 11 connections. Pre 2009 infrastructure; together to form the core networking switch. of the core network infrastructure were limited by the up link between core switches that is the Pair (UTP) Category 6 Cable. Furthermore, majority of the networking infrastructure throughout the agency were mainly built with Fast Ethernet Based specifications to date. With current research and operational tasks highly dependent on IT infrastructure that is being enabled through NM-Net, the performance NM-Net implementing gigabit-based networking system achieve optimal performance of internet networking services in the agency thus catalyze initiative. (author)

  1. Network analysis based on large deviation statistics

    Science.gov (United States)

    Miyazaki, Syuji

    2007-07-01

    A chaotic piecewise linear map whose statistical properties are identical to those of a random walk on directed graphs such as the world wide web (WWW) is constructed, and the dynamic quantity is analyzed in the framework of large deviation statistics. Gibbs measures include the weight factor appearing in the weighted average of the dynamic quantity, which can also quantitatively measure the importance of web sites. Currently used levels of importance in the commercial search engines are independent of search terms, which correspond to the stationary visiting frequency of each node obtained from a random walk on the network or equivalent chaotic dynamics. Levels of importance based on the Gibbs measure depend on each search term which is specified by the searcher. The topological conjugate transformation between one dynamical system with a Gibbs measure and another dynamical system whose standard invariant probability measure is identical to the Gibbs measure is also discussed.

  2. School-Based Mental Health Professionals' Bullying Assessment Practices: A Call for Evidence-Based Bullying Assessment Guidelines

    Science.gov (United States)

    Blake, Jamilia; Banks, Courtney S.; Patience, Brenda A.; Lund, Emily M.

    2014-01-01

    A sample of 483 school-based mental health professionals completed a survey about the training they have received related to conducting bullying assessments in schools, competence in conducting an assessment of bullying, and the bullying assessment methods they used. Results indicate that school counselors were usually informed about incidents of…

  3. Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks

    Directory of Open Access Journals (Sweden)

    Laisen Nie

    2018-01-01

    Full Text Available Wireless mesh network is prevalent for providing a decentralized access for users and other intelligent devices. Meanwhile, it can be employed as the infrastructure of the last few miles connectivity for various network applications, for example, Internet of Things (IoT and mobile networks. For a wireless mesh backbone network, it has obtained extensive attention because of its large capacity and low cost. Network traffic prediction is important for network planning and routing configurations that are implemented to improve the quality of service for users. This paper proposes a network traffic prediction method based on a deep learning architecture and the Spatiotemporal Compressive Sensing method. The proposed method first adopts discrete wavelet transform to extract the low-pass component of network traffic that describes the long-range dependence of itself. Then, a prediction model is built by learning a deep architecture based on the deep belief network from the extracted low-pass component. Otherwise, for the remaining high-pass component that expresses the gusty and irregular fluctuations of network traffic, the Spatiotemporal Compressive Sensing method is adopted to predict it. Based on the predictors of two components, we can obtain a predictor of network traffic. From the simulation, the proposed prediction method outperforms three existing methods.

  4. The voice of bats: how greater mouse-eared bats recognize individuals based on their echolocation calls.

    OpenAIRE

    Yossi Yovel; Mariana Laura Melcon; Matthias O Franz; Annette Denzinger; Hans-Ulrich Schnitzler

    2009-01-01

    Echolocating bats use the echoes from their echolocation calls to perceive their surroundings. The ability to use these continuously emitted calls, whose main function is not communication, for recognition of individual conspecifics might facilitate many of the social behaviours observed in bats. Several studies of individual-specific information in echolocation calls found some evidence for its existence but did not quantify or explain it. We used a direct paradigm to show that greater mouse...

  5. Behavior-based network management: a unique model-based approach to implementing cyber superiority

    Science.gov (United States)

    Seng, Jocelyn M.

    2016-05-01

    Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.

  6. Study on Information Security of Distributed Sensor Networks Based on RBAC’s Resource Conflict

    Directory of Open Access Journals (Sweden)

    Su Yu

    2014-08-01

    Full Text Available Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received more attention. There exists a need for multilevel access control in these types of networks, in order to give authorization based on a node’s role – this is also called role-based access control (RBAC. SOD of RBAC is a good way to solve the problem of resource allocation and right management for improving the security of the system. According to the needs of the MVC-based information management system security, this paper first researches separation of duties (SOD in Role-Based Access Control, as well as its application in practice, and then gives a program to implement RBAC model as the framework of SSH. Finally, this paper describes how to realize the RBAC in a specific information management system.

  7. Graphlet-based Characterization of Directed Networks

    Science.gov (United States)

    Sarajlić, Anida; Malod-Dognin, Noël; Yaveroğlu, Ömer Nebil; Pržulj, Nataša

    2016-10-01

    We are flooded with large-scale, dynamic, directed, networked data. Analyses requiring exact comparisons between networks are computationally intractable, so new methodologies are sought. To analyse directed networks, we extend graphlets (small induced sub-graphs) and their degrees to directed data. Using these directed graphlets, we generalise state-of-the-art network distance measures (RGF, GDDA and GCD) to directed networks and show their superiority for comparing directed networks. Also, we extend the canonical correlation analysis framework that enables uncovering the relationships between the wiring patterns around nodes in a directed network and their expert annotations. On directed World Trade Networks (WTNs), our methodology allows uncovering the core-broker-periphery structure of the WTN, predicting the economic attributes of a country, such as its gross domestic product, from its wiring patterns in the WTN for up-to ten years in the future. It does so by enabling us to track the dynamics of a country’s positioning in the WTN over years. On directed metabolic networks, our framework yields insights into preservation of enzyme function from the network wiring patterns rather than from sequence data. Overall, our methodology enables advanced analyses of directed networked data from any area of science, allowing domain-specific interpretation of a directed network’s topology.

  8. Reverse engineering Boolean networks: from Bernoulli mixture models to rule based systems.

    Directory of Open Access Journals (Sweden)

    Mehreen Saeed

    Full Text Available A Boolean network is a graphical model for representing and analyzing the behavior of gene regulatory networks (GRN. In this context, the accurate and efficient reconstruction of a Boolean network is essential for understanding the gene regulation mechanism and the complex relations that exist therein. In this paper we introduce an elegant and efficient algorithm for the reverse engineering of Boolean networks from a time series of multivariate binary data corresponding to gene expression data. We call our method ReBMM, i.e., reverse engineering based on Bernoulli mixture models. The time complexity of most of the existing reverse engineering techniques is quite high and depends upon the indegree of a node in the network. Due to the high complexity of these methods, they can only be applied to sparsely connected networks of small sizes. ReBMM has a time complexity factor, which is independent of the indegree of a node and is quadratic in the number of nodes in the network, a big improvement over other techniques and yet there is little or no compromise in accuracy. We have tested ReBMM on a number of artificial datasets along with simulated data derived from a plant signaling network. We also used this method to reconstruct a network from real experimental observations of microarray data of the yeast cell cycle. Our method provides a natural framework for generating rules from a probabilistic model. It is simple, intuitive and illustrates excellent empirical results.

  9. Network Medicine: A Network-based Approach to Human Disease

    Science.gov (United States)

    Barabási, Albert-László; Gulbahce, Natali; Loscalzo, Joseph

    2011-01-01

    Given the functional interdependencies between the molecular components in a human cell, a disease is rarely a consequence of an abnormality in a single gene, but reflects the perturbations of the complex intracellular network. The emerging tools of network medicine offer a platform to explore systematically not only the molecular complexity of a particular disease, leading to the identification of disease modules and pathways, but also the molecular relationships between apparently distinct (patho)phenotypes. Advances in this direction are essential to identify new diseases genes, to uncover the biological significance of disease-associated mutations identified by genome-wide association studies and full genome sequencing, and to identify drug targets and biomarkers for complex diseases. PMID:21164525

  10. Classification of complex networks based on similarity of topological network features

    Science.gov (United States)

    Attar, Niousha; Aliakbary, Sadegh

    2017-09-01

    Over the past few decades, networks have been widely used to model real-world phenomena. Real-world networks exhibit nontrivial topological characteristics and therefore, many network models are proposed in the literature for generating graphs that are similar to real networks. Network models reproduce nontrivial properties such as long-tail degree distributions or high clustering coefficients. In this context, we encounter the problem of selecting the network model that best fits a given real-world network. The need for a model selection method reveals the network classification problem, in which a target-network is classified into one of the candidate network models. In this paper, we propose a novel network classification method which is independent of the network size and employs an alignment-free metric of network comparison. The proposed method is based on supervised machine learning algorithms and utilizes the topological similarities of networks for the classification task. The experiments show that the proposed method outperforms state-of-the-art methods with respect to classification accuracy, time efficiency, and robustness to noise.

  11. Novel Ethernet Based Optical Local Area Networks for Computer Interconnection

    NARCIS (Netherlands)

    Radovanovic, Igor; van Etten, Wim; Taniman, R.O.; Kleinkiskamp, Ronny

    2003-01-01

    In this paper we present new optical local area networks for fiber-to-the-desk application. Presented networks are expected to bring a solution for having optical fibers all the way to computers. To bring the overall implementation costs down we have based our networks on short-wavelength optical

  12. Document categorization using multilingual associative networks based on Wikipedia

    NARCIS (Netherlands)

    Bloom, Niels; Theune, Mariet; de Jong, Franciska M.G.

    Associative networks are a connectionist language model with the ability to categorize large sets of documents. In this research we combine monolingual associative networks based on Wikipedia to create a larger, multilingual associative network, using the cross-lingual connections between Wikipedia

  13. Survey-Based Measurement of Public Management and Policy Networks

    Science.gov (United States)

    Henry, Adam Douglas; Lubell, Mark; McCoy, Michael

    2012-01-01

    Networks have become a central concept in the policy and public management literature; however, theoretical development is hindered by a lack of attention to the empirical properties of network measurement methods. This paper compares three survey-based methods for measuring organizational networks: the roster, the free-recall name generator, and…

  14. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  15. A Cascade-Based Emergency Model for Water Distribution Network

    Directory of Open Access Journals (Sweden)

    Qing Shuang

    2015-01-01

    Full Text Available Water distribution network is important in the critical physical infrastructure systems. The paper studies the emergency resource strategies on water distribution network with the approach of complex network and cascading failures. The model of cascade-based emergency for water distribution network is built. The cascade-based model considers the network topology analysis and hydraulic analysis to provide a more realistic result. A load redistribution function with emergency recovery mechanisms is established. From the aspects of uniform distribution, node betweenness, and node pressure, six recovery strategies are given to reflect the network topology and the failure information, respectively. The recovery strategies are evaluated with the complex network indicators to describe the failure scale and failure velocity. The proposed method is applied by an illustrative example. The results showed that the recovery strategy considering the node pressure can enhance the network robustness effectively. Besides, this strategy can reduce the failure nodes and generate the least failure nodes per time.

  16. Optimising TCP for cloud-based mobile networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Christiansen, Henrik Lehrmann

    2016-01-01

    protocols should therefore be adjusted to cope with the peculiarities of these networks. In this paper, we investigate an optimized design of the Transmission Control Protocol (TCP), as it plays a central role in all-IP mobile networks to ensure optimal performances for application-layer services. TCP......Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network...... implementations of 3 popular operating systems are investigated in our network model. The results on the most influential parameters are used to design an optimized TCP for cloud-based mobile networks....

  17. Arresting Strategy Based on Dynamic Criminal Networks Changing over Time

    Directory of Open Access Journals (Sweden)

    Junqing Yuan

    2013-01-01

    Full Text Available We investigate a sequence of dynamic criminal networks on a time series based on the dynamic network analysis (DNA. According to the change of networks’ structure, networks’ variation trend is analyzed to forecast its future structure. Finally, an optimal arresting time and priority list are designed based on our analysis. Better results can be expected than that based on social network analysis (SNA.

  18. Global exponential stability of neural networks with time-varying delay based on free-matrix-based integral inequality.

    Science.gov (United States)

    He, Yong; Ji, Meng-Di; Zhang, Chuan-Ke; Wu, Min

    2016-05-01

    This paper is concerned with global exponential stability problem for a class of neural networks with time-varying delays. Using a new proposed inequality called free-matrix-based integral inequality, a less conservative criterion is proposed, which is expressed by linear matrix inequalities. Two numerical examples are given to show the effectiveness and superiority of the obtained criterion. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Evolution of RNA-Based Networks.

    Science.gov (United States)

    Stadler, Peter F

    2016-01-01

    RNA molecules have served for decades as a paradigmatic example of molecular evolution that is tractable both in in vitro experiments and in detailed computer simulation. The adaptation of RNA sequences to external selection pressures is well studied and well understood. The de novo innovation or optimization of RNA aptamers and riboswitches in SELEX experiments serves as a case in point. Likewise, fitness landscapes building upon the efficiently computable RNA secondary structures have been a key toward understanding realistic fitness landscapes. Much less is known, however, on models in which multiple RNAs interact with each other, thus actively influencing the selection pressures acting on them. From a computational perspective, RNA-RNA interactions can be dealt with by same basic methods as the folding of a single RNA molecule, although many details become more complicated. RNA-RNA interactions are frequently employed in cellular regulation networks, e.g., as miRNA bases mRNA silencing or in the modulation of bacterial mRNAs by small, often highly structured sRNAs. In this chapter, we summarize the key features of networks of replicators. We highlight the differences between quasispecies-like models describing templates copied by an external replicase and hypercycle similar to autocatalytic replicators. Two aspects are of importance: the dynamics of selection within a population, usually described by conventional dynamical systems, and the evolution of replicating species in the space of chemical types. Product inhibition plays a key role in modulating selection dynamics from survival of the fittest to extinction of unfittest. The sequence evolution of replicators is rather well understood as approximate optimization in a fitness landscape for templates that is shaped by the sequence-structure map of RNA. Some of the properties of this map, in particular shape space covering and extensive neutral networks, give rise to evolutionary patterns such as drift

  20. Call Center Capacity Planning

    DEFF Research Database (Denmark)

    Nielsen, Thomas Bang

    is known as skills-based routing. It involves designing the routing policies in a way that results in customers receiving a desired service level such as the waiting time they experience. The emphasis of this thesis is on the design of these policies. The first paper, Queues with waiting time dependent...... infrastructure allows customers to be divided into classes depending on their requests or their value to the call center operator. The agents working in call centers can in the same way be split into groups based on their skills. The discipline of matching calls from different customer classes to agent groups...... service, introduces a novel approach to analyzing queueing systems. This involves using the waiting time of the first customer in line as the primary variable on which the analysis is based. The legacy approach has been to use the number of customers in queue. The new approach facilitates exact analysis...

  1. Resource Discovery in Activity-Based Sensor Networks

    DEFF Research Database (Denmark)

    Bucur, Doina; Bardram, Jakob

    This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networks...... (ABSNs) knowledge about their usage even at the network layer. ABSN redesigns classical network-level service discovery protocols to include and use this logical structuring of the network for a more practically applicable service discovery scheme. Noting that in practical settings activity-based sensor...

  2. Community Based Networks and 5G Wi-Fi

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2018-01-01

    This paper argues on why Community Based Networks should be recognized as potential 5G providers using 5G Wi-Fi. The argument is hinged on findings in a research to understand why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out...... inductively using Grounded Theory. Six cases were investigated. Two Community Based Network Mobilization Models were identified. The findings indicate that 5G Wi-Fi deployment by Community Based Networks is possible if policy initiatives and the 5G Wi-Fi standards are developed to facilitate the causal...

  3. Ontology- and graph-based similarity assessment in biological networks.

    Science.gov (United States)

    Wang, Haiying; Zheng, Huiru; Azuaje, Francisco

    2010-10-15

    A standard systems-based approach to biomarker and drug target discovery consists of placing putative biomarkers in the context of a network of biological interactions, followed by different 'guilt-by-association' analyses. The latter is typically done based on network structural features. Here, an alternative analysis approach in which the networks are analyzed on a 'semantic similarity' space is reported. Such information is extracted from ontology-based functional annotations. We present SimTrek, a Cytoscape plugin for ontology-based similarity assessment in biological networks. http://rosalind.infj.ulst.ac.uk/SimTrek.html francisco.azuaje@crp-sante.lu Supplementary data are available at Bioinformatics online.

  4. Community Detection for Multiplex Social Networks Based on Relational Bayesian Networks

    DEFF Research Database (Denmark)

    Jiang, Jiuchuan; Jaeger, Manfred

    2014-01-01

    Many techniques have been proposed for community detection in social networks. Most of these techniques are only designed for networks defined by a single relation. However, many real networks are multiplex networks that contain multiple types of relations and different attributes on the nodes...... to express different models capturing different aspects of community detection in multiplex networks in a coherent manner, and to use a single inference mechanism for all models........ In this paper we propose to use relational Bayesian networks for the specification of probabilistic network models, and develop inference techniques that solve the community detection problem based on these models. The use of relational Bayesian networks as a flexible high-level modeling framework enables us...

  5. Virtual network embedding in cross-domain network based on topology and resource attributes

    Science.gov (United States)

    Zhu, Lei; Zhang, Zhizhong; Feng, Linlin; Liu, Lilan

    2018-03-01

    Aiming at the network architecture ossification and the diversity of access technologies issues, this paper researches the cross-domain virtual network embedding algorithm. By analysing the topological attribute from the local and global perspective of nodes in the virtual network and the physical network, combined with the local network resource property, we rank the embedding priority of the nodes with PCA and TOPSIS methods. Besides, the link load distribution is considered. Above all, We proposed an cross-domain virtual network embedding algorithm based on topology and resource attributes. The simulation results depicts that our algorithm increases the acceptance rate of multi-domain virtual network requests, compared with the existing virtual network embedding algorithm.

  6. Network-based production quality control

    Science.gov (United States)

    Kwon, Yongjin; Tseng, Bill; Chiou, Richard

    2007-09-01

    This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.

  7. Neural network based system for equipment surveillance

    Science.gov (United States)

    Vilim, R.B.; Gross, K.C.; Wegerich, S.W.

    1998-04-28

    A method and system are disclosed for performing surveillance of transient signals of an industrial device to ascertain the operating state. The method and system involves the steps of reading into a memory training data, determining neural network weighting values until achieving target outputs close to the neural network output. If the target outputs are inadequate, wavelet parameters are determined to yield neural network outputs close to the desired set of target outputs and then providing signals characteristic of an industrial process and comparing the neural network output to the industrial process signals to evaluate the operating state of the industrial process. 33 figs.

  8. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qian Xiao

    2012-09-01

    Full Text Available To provide security for data gathering based on network coding in wireless sensor networks (WSNs, a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPPaamp;PP protocol using network coding is designed. DPPaamp;PP makes use of a new proposed pollution symbol selection and pollution (PSSP scheme based on a new obfuscation idea to pollute existing symbols. Analyses of DPPaamp;PP show that it not only requires low overhead on computation and communication, but also provides high security on resisting brute-force attacks.

  9. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  10. Complex networks-based energy-efficient evolution model for wireless sensor networks

    International Nuclear Information System (INIS)

    Zhu Hailin; Luo Hong; Peng Haipeng; Li Lixiang; Luo Qun

    2009-01-01

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  11. The guitar chord-generating algorithm based on complex network

    Science.gov (United States)

    Ren, Tao; Wang, Yi-fan; Du, Dan; Liu, Miao-miao; Siddiqi, Awais

    2016-02-01

    This paper aims to generate chords for popular songs automatically based on complex network. Firstly, according to the characteristics of guitar tablature, six chord networks of popular songs by six pop singers are constructed and the properties of all networks are concluded. By analyzing the diverse chord networks, the accompaniment regulations and features are shown, with which the chords can be generated automatically. Secondly, in terms of the characteristics of popular songs, a two-tiered network containing a verse network and a chorus network is constructed. With this network, the verse and chorus can be composed respectively with the random walk algorithm. Thirdly, the musical motif is considered for generating chords, with which the bad chord progressions can be revised. This method can make the accompaniments sound more melodious. Finally, a popular song is chosen for generating chords and the new generated accompaniment sounds better than those done by the composers.

  12. Dynamics of subway networks based on vehicles operation timetable

    Science.gov (United States)

    Xiao, Xue-mei; Jia, Li-min; Wang, Yan-hui

    2017-05-01

    In this paper, a subway network is represented as a dynamic, directed and weighted graph, in which vertices represent subway stations and weights of edges represent the number of vehicles passing through the edges by considering vehicles operation timetable. Meanwhile the definitions of static and dynamic metrics which can represent vertices' and edges' local and global attributes are proposed. Based on the model and metrics, standard deviation is further introduced to study the dynamic properties (heterogeneity and vulnerability) of subway networks. Through a detailed analysis of the Beijing subway network, we conclude that with the existing network structure, the heterogeneity and vulnerability of the Beijing subway network varies over time when the vehicle operation timetable is taken into consideration, and the distribution of edge weights affects the performance of the network. In other words, although the vehicles operation timetable is restrained by the physical structure of the network, it determines the performances and properties of the Beijing subway network.

  13. Network-Based Community Brings forth Sustainable Society

    Science.gov (United States)

    Kikuchi, Toshiko

    It has already been shown that an artificial society based on the three relations of social configuration (market, communal, and obligatory relations) functioning in balance with each other formed a sustainable society which the social reproduction is possible. In this artificial society model, communal relations exist in a network-based community with alternating members rather than a conventional community with cooperative mutual assistance practiced in some agricultural communities. In this paper, using the comparison between network-based communities with alternating members and conventional communities with fixed members, the significance of a network-based community is considered. In concrete terms, the difference in appearance rate for sustainable society, economic activity and asset inequality between network-based communities and conventional communities is analyzed. The appearance rate for a sustainable society of network-based community is higher than that of conventional community. Moreover, most of network-based communities had a larger total number of trade volume than conventional communities. But, the value of Gini coefficient in conventional community is smaller than that of network-based community. These results show that communal relations based on a network-based community is significant for the social reproduction and economic efficiency. However, in such an artificial society, the inequality is sacrificed.

  14. Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Husam Kareem Farhan

    2017-01-01

    Full Text Available Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs. A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorithm that combines the full advantages of both cluster and chain techniques such as CCM (Chain-Cluster based Mixed routing. In this paper, introduce a routing algorithm relying on CCM algorithm called (Enhanced Chain-Cluster based Mixed routing algorithm E-CCM. Simulation results show that E-CCM algorithm improves the performance of CCM algorithm in terms of three performance metrics which are: energy consumption, network lifetime, and (FND and LND. MATLAB program is used to develop and test the simulation process in a computer with the following specifications: windows 7 (32-operating system, core i5, RAM 4 GB, hard 512 GB.

  15. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Directory of Open Access Journals (Sweden)

    Maha Abdelhaq

    Full Text Available A mobile ad hoc network (MANET is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  16. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.

    Science.gov (United States)

    Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat

    2015-01-01

    A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.

  17. Neural Network Classifier Based on Growing Hyperspheres

    Czech Academy of Sciences Publication Activity Database

    Jiřina Jr., Marcel; Jiřina, Marcel

    2000-01-01

    Roč. 10, č. 3 (2000), s. 417-428 ISSN 1210-0552. [Neural Network World 2000. Prague, 09.07.2000-12.07.2000] Grant - others:MŠMT ČR(CZ) VS96047; MPO(CZ) RP-4210 Institutional research plan: AV0Z1030915 Keywords : neural network * classifier * hyperspheres * big -dimensional data Subject RIV: BA - General Mathematics

  18. Community-Based Networks for Challenged Environments

    Science.gov (United States)

    Vigil-Hayes, Morgan Ashlee

    2017-01-01

    The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…

  19. Optimization-based topology identification of complex networks

    International Nuclear Information System (INIS)

    Tang Sheng-Xue; Chen Li; He Yi-Gang

    2011-01-01

    In many cases, the topological structures of a complex network are unknown or uncertain, and it is of significance to identify the exact topological structure. An optimization-based method of identifying the topological structure of a complex network is proposed in this paper. Identification of the exact network topological structure is converted into a minimal optimization problem by using the estimated network. Then, an improved quantum-behaved particle swarm optimization algorithm is used to solve the optimization problem. Compared with the previous adaptive synchronization-based method, the proposed method is simple and effective and is particularly valid to identify the topological structure of synchronization complex networks. In some cases where the states of a complex network are only partially observable, the exact topological structure of a network can also be identified by using the proposed method. Finally, numerical simulations are provided to show the effectiveness of the proposed method. (general)

  20. Network Anomaly Detection Based on Wavelet Analysis

    Directory of Open Access Journals (Sweden)

    Ali A. Ghorbani

    2008-11-01

    Full Text Available Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  1. A Concept of Location-Based Social Network Marketing

    DEFF Research Database (Denmark)

    Tussyadiah, Iis

    2012-01-01

    A stimulus-response model of location-based social network marketing is conceptualized based on an exploratory investigation. Location-based social network applications are capable of generating marketing stimuli from merchant, competition-based, and connection-based rewards resulted from relevan...... implies changes in patterns of mobility, making this marketing approach particularly relevant for tourism and hospitality businesses. Managerial implications and recommendations for further studies are provided.......A stimulus-response model of location-based social network marketing is conceptualized based on an exploratory investigation. Location-based social network applications are capable of generating marketing stimuli from merchant, competition-based, and connection-based rewards resulted from relevance...

  2. STRait Razor: a length-based forensic STR allele-calling tool for use with second generation sequencing data.

    Science.gov (United States)

    Warshauer, David H; Lin, David; Hari, Kumar; Jain, Ravi; Davis, Carey; Larue, Bobby; King, Jonathan L; Budowle, Bruce

    2013-07-01

    Recent studies have demonstrated the capability of second generation sequencing (SGS) to provide coverage of short tandem repeats (STRs) found within the human genome. However, there are relatively few bioinformatic software packages capable of detecting these markers in the raw sequence data. The extant STR-calling tools are sophisticated, but are not always applicable to the analysis of the STR loci commonly used in forensic analyses. STRait Razor is a newly developed Perl-based software tool that runs on the Linux/Unix operating system and is designed to detect forensically-relevant STR alleles in FASTQ sequence data, based on allelic length. It is capable of analyzing STR loci with repeat motifs ranging from simple to complex without the need for extensive allelic sequence data. STRait Razor is designed to interpret both single-end and paired-end data and relies on intelligent parallel processing to reduce analysis time. Users are presented with a number of customization options, including variable mismatch detection parameters, as well as the ability to easily allow for the detection of alleles at new loci. In its current state, the software detects alleles for 44 autosomal and Y-chromosome STR loci. The study described herein demonstrates that STRait Razor is capable of detecting STR alleles in data generated by multiple library preparation methods and two Illumina(®) sequencing instruments, with 100% concordance. The data also reveal noteworthy concepts related to the effect of different preparation chemistries and sequencing parameters on the bioinformatic detection of STR alleles. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  3. Intelligent Networks Data Fusion Web-based Services for Ad-hoc Integrated WSNs-RFID

    Directory of Open Access Journals (Sweden)

    Falah Alshahrany

    2016-01-01

    Full Text Available The use of variety of data fusion tools and techniques for big data processing poses the problem of the data and information integration called data fusion having objectives which can differ from one application to another. The design of network data fusion systems aimed at meeting these objectives, need to take into account of the necessary synergy that can result from distributed data processing within the data networks and data centres, involving increased computation and communication. This papers reports on how this processing distribution is functionally structured as configurable integrated web-based support services, in the context of an ad-hoc wireless sensor network used for sensing and tracking, in the context of distributed detection based on complete observations to support real rime decision making. The interrelated functional and hardware RFID-WSN integration is an essential aspect of the data fusion framework that focuses on multi-sensor collaboration as an innovative approach to extend the heterogeneity of the devices and sensor nodes of ad-hoc networks generating a huge amount of heterogeneous soft and hard raw data. The deployment and configuration of these networks require data fusion processing that includes network and service management and enhances the performance and reliability of networks data fusion support systems providing intelligent capabilities for real-time control access and fire detection.

  4. Cancer classification based on gene expression using neural networks.

    Science.gov (United States)

    Hu, H P; Niu, Z J; Bai, Y P; Tan, X H

    2015-12-21

    Based on gene expression, we have classified 53 colon cancer patients with UICC II into two groups: relapse and no relapse. Samples were taken from each patient, and gene information was extracted. Of the 53 samples examined, 500 genes were considered proper through analyses by S-Kohonen, BP, and SVM neural networks. Classification accuracy obtained by S-Kohonen neural network reaches 91%, which was more accurate than classification by BP and SVM neural networks. The results show that S-Kohonen neural network is more plausible for classification and has a certain feasibility and validity as compared with BP and SVM neural networks.

  5. Index : A Rule Based Expert System For Computer Network Maintenance

    Science.gov (United States)

    Chaganty, Srinivas; Pitchai, Anandhi; Morgan, Thomas W.

    1988-03-01

    Communications is an expert intensive discipline. The application of expert systems for maintenance of large and complex networks, mainly as an aid in trouble shooting, can simplify the task of network management. The important steps involved in troubleshooting are fault detection, fault reporting, fault interpretation and fault isolation. At present, Network Maintenance Facilities are capable of detecting and reporting the faults to network personnel. Fault interpretation refers to the next step in the process, which involves coming up with reasons for the failure. Fault interpretation can be characterized in two ways. First, it involves such a diversity of facts that it is difficult to predict. Secondly, it embodies a wealth of knowledge in the form of network management personnel. The application of expert systems in these interpretive tasks is an important step towards automation of network maintenance. In this paper, INDEX (Intelligent Network Diagnosis Expediter), a rule based production system for computer network alarm interpretation is described. It acts as an intelligent filter for people analyzing network alarms. INDEX analyzes the alarms in the network and identifies proper maintenance action to be taken.The important feature of this production system is that it is data driven. Working memory is the principal data repository of production systems and its contents represent the current state of the problem. Control is based upon which productions match the constantly changing working memory elements. Implementation of the prototype is in OPS83. Major issues in rule based system development such as rule base organization, implementation and efficiency are discussed.

  6. Static Three-Dimensional Fuzzy Routing Based on the Receiving Probability in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sohrab Khanmohammadi

    2013-11-01

    Full Text Available A Wireless Sensor Network (WSN is a collection of low-cost, low-power and large-scale wireless sensor nodes. Routing protocols are an important topic in WSN. Every sensor node should use a proper mechanism to transmit the generated packets to its destination, usually a base station. In previous works, routing protocols use the global information of the network that causes the redundant packets to be increased. Moreover, it leads to an increase in the network traffic, to a decrease in the delivery ratio of data packets, and to a reduction in network life. In this paper, we propose a new inferential routing protocol called SFRRP (Static Three-Dimensional Fuzzy Routing based on the Receiving Probability. The proposed protocol solves the above mentioned problems considerably. The data packets are transmitted by hop-to-hop delivery to the base station. It uses a fuzzy procedure to transmit the sensed data or the buffered data packets to one of the neighbors called selected node. In the proposed fuzzy system, the distance and number of neighbors are input variables, while the receiving probability is the output variable. SFRRP just uses the local neighborhood information to forward the packets and is not needed by any redundant packet for route discovery. The proposed protocol has some advantages such as a high delivery ratio, less delay time, high network life, and less network traffic. The performance of the proposed protocol surpasses the performance of the Flooding routing protocol in terms of delivery ratio, delay time and network lifetime.

  7. Neural Network Based Intelligent Sootblowing System

    Energy Technology Data Exchange (ETDEWEB)

    Mark Rhode

    2005-04-01

    . Due to the composition of coal, particulate matter is also a by-product of coal combustion. Modern day utility boilers are usually fitted with electrostatic precipitators to aid in the collection of particulate matter. Although extremely efficient, these devices are sensitive to rapid changes in inlet mass concentration as well as total mass loading. Traditionally, utility boilers are equipped with devices known as sootblowers, which use, steam, water or air to dislodge and clean the surfaces within the boiler and are operated based upon established rule or operator's judgment. Poor sootblowing regimes can influence particulate mass loading to the electrostatic precipitators. The project applied a neural network intelligent sootblowing system in conjunction with state-of-the-art controls and instruments to optimize the operation of a utility boiler and systematically control boiler slagging/fouling. This optimization process targeted reduction of NOx of 30%, improved efficiency of 2% and a reduction in opacity of 5%. The neural network system proved to be a non-invasive system which can readily be adapted to virtually any utility boiler. Specific conclusions from this neural network application are listed below. These conclusions should be used in conjunction with the specific details provided in the technical discussions of this report to develop a thorough understanding of the process.

  8. Improving Student Engagement Using Course-Based Social Networks

    Science.gov (United States)

    Imlawi, Jehad Mohammad

    2013-01-01

    This study proposes an engagement model that supports use of course-based online social networks for engaging student, and hence, improving their educational outcomes. This research demonstrates that instructors who create course-based online social networks to communicate with students can increase the student engagement in these online social…

  9. SOFM Neural Network Based Hierarchical Topology Control for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2014-01-01

    Full Text Available Well-designed network topology provides vital support for routing, data fusion, and target tracking in wireless sensor networks (WSNs. Self-organization feature map (SOFM neural network is a major branch of artificial neural networks, which has self-organizing and self-learning features. In this paper, we propose a cluster-based topology control algorithm for WSNs, named SOFMHTC, which uses SOFM neural network to form a hierarchical network structure, completes cluster head selection by the competitive learning among nodes, and takes the node residual energy and the distance to the neighbor nodes into account in the clustering process. In addition, the approach of dynamically adjusting the transmitting power of the cluster head nodes is adopted to optimize the network topology. Simulation results show that SOFMHTC may get a better energy-efficient performance and make more balanced energy consumption compared with some existing algorithms in WSNs.

  10. Acoustic mechanisms of a species-based discrimination of the chick-a-dee call in sympatric black-capped (Poecile atricapillus and mountain chickadees (P. gambeli

    Directory of Open Access Journals (Sweden)

    Lauren M Guillette

    2010-12-01

    Full Text Available Previous perceptual research with black-capped and mountain chickadees has demonstrated that these species treat each other’s namesake chick-a-dee calls as belonging to separate, open-ended categories. Further, the terminal dee portion of the call has been implicated as the most prominent species marker. However, statistical classification using acoustic summary features suggests that all note-types contained within the chick-a-dee call should be sufficient for species classification. The current study seeks to better understand the note-type based mechanisms underlying species-based classification of the chick-a-dee call by black-capped and mountain chickadees. In two, complimentary, operant discrimination experiments, both species were trained to discriminate the species of the signaller using either entire chick-a-dee calls, or individual note-types from chick-a-dee calls. In agreement with previous perceptual work we find that the D note had significant stimulus control over species based discrimination. However, in line with statistical classifications, we find that all note-types carry species information. We discuss reasons why the most easily discriminated note-types are likely candidates to carry species based cues.

  11. RAM-based neural networks for data mining applications

    Science.gov (United States)

    Agehed, Kenneth I.; Eide, Age J.; Lindblad, Thomas; Lindsey, Clark S.; Szekely, Geza; Waldemark, Joakim T. A.; Waldemark, Karina E.

    1999-03-01

    We discuss possible new hardware and software techniques for handling very large databases such as image archives. In particular, we investigate how high capacity solid-state `disks' could be used to speed the database processing by algorithms that require considerably memory space. One such algorithm, for example, called the RAM neural network, or weightless neural network, needs a number of large lookup tables to perform most efficiently. The solid state disks could provide fast storage both for the algorithm and the data. We also briefly discuss development of an algorithm to cluster images of similar objects. This algorithm could also benefit from a large cache of fast memory storage.

  12. Image-Based Structural Modeling of the Cardiac Purkinje Network

    Directory of Open Access Journals (Sweden)

    Benjamin R. Liu

    2015-01-01

    Full Text Available The Purkinje network is a specialized conduction system within the heart that ensures the proper activation of the ventricles to produce effective contraction. Its role during ventricular arrhythmias is less clear, but some experimental studies have suggested that the Purkinje network may significantly affect the genesis and maintenance of ventricular arrhythmias. Despite its importance, few structural models of the Purkinje network have been developed, primarily because current physical limitations prevent examination of the intact Purkinje network. In previous modeling efforts Purkinje-like structures have been developed through either automated or hand-drawn procedures, but these networks have been created according to general principles rather than based on real networks. To allow for greater realism in Purkinje structural models, we present a method for creating three-dimensional Purkinje networks based directly on imaging data. Our approach uses Purkinje network structures extracted from photographs of dissected ventricles and projects these flat networks onto realistic endocardial surfaces. Using this method, we create models for the combined ventricle-Purkinje system that can fully activate the ventricles through a stimulus delivered to the Purkinje network and can produce simulated activation sequences that match experimental observations. The combined models have the potential to help elucidate Purkinje network contributions during ventricular arrhythmias.

  13. Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Wang, Yu

    2017-01-01

    With the increasing digitization of the healthcare industry, a wide range of medical devices are Internet- and inter-connected. Mobile devices (e.g., smartphones) are one common facility used in the healthcare industry to improve the quality of service and experience for both patients...... and healthcare personnel. The underlying network architecture to support such devices is also referred to as medical smartphone networks (MSNs). Similar to other networks, MSNs also suffer from various attacks like insider attacks (e.g., leakage of sensitive patient information by a malicious insider......). In this work, we focus on MSNs and design a trust-based intrusion detection approach through Euclidean distance-based behavioral profiling to detect malicious devices (or called nodes). In the evaluation, we collaborate with healthcare organizations and implement our approach in a real simulated MSN...

  14. Multi-AUV Hunting Algorithm Based on Bio-inspired Neural Network in Unknown Environments

    Directory of Open Access Journals (Sweden)

    Daqi Zhu

    2015-11-01

    Full Text Available The multi-AUV hunting problem is one of the key issues in multi-robot system research. In order to hunt the target efficiently a new hunting algorithm based on a bio-inspired neural network has been proposed in this paper. Firstly, the AUV's working environment can be represented, based on the biological-inspired neural network model. There is one-to-one correspondence between each neuron in the neural network and the position of the grid map in the underwater environment. The activity values of biological neurons then guide the AUV's sailing path and finally the target is surrounded by AUVs. In addition, a method called negotiation is used to solve the AUV's allocation of hunting points. The simulation results show that the algorithm used in the paper can provide rapid and highly efficient path planning in the unknown environment with obstacles and non-obstacles.

  15. Credit scoring based on social network data

    OpenAIRE

    MASYUTIN A.A.

    2015-01-01

    Social networks accumulate huge amounts of information, which can provide valuable insights on people s behavior. In this paper, we use social data from Vkontakte, Russias most popular social network, to discriminate between the solvent and delinquent debtors of credit organizations. Firstly, we present the datacenter architecture for social data retrieval. It has several functions, such as client matching, user profile parsing, API communication and data storing. Secondly, we develop two cre...

  16. Quartet-net: a quartet-based method to reconstruct phylogenetic networks.

    Science.gov (United States)

    Yang, Jialiang; Grünewald, Stefan; Wan, Xiu-Feng

    2013-05-01

    Phylogenetic networks can model reticulate evolutionary events such as hybridization, recombination, and horizontal gene transfer. However, reconstructing such networks is not trivial. Popular character-based methods are computationally inefficient, whereas distance-based methods cannot guarantee reconstruction accuracy because pairwise genetic distances only reflect partial information about a reticulate phylogeny. To balance accuracy and computational efficiency, here we introduce a quartet-based method to construct a phylogenetic network from a multiple sequence alignment. Unlike distances that only reflect the relationship between a pair of taxa, quartets contain information on the relationships among four taxa; these quartets provide adequate capacity to infer a more accurate phylogenetic network. In applications to simulated and biological data sets, we demonstrate that this novel method is robust and effective in reconstructing reticulate evolutionary events and it has the potential to infer more accurate phylogenetic distances than other conventional phylogenetic network construction methods such as Neighbor-Joining, Neighbor-Net, and Split Decomposition. This method can be used in constructing phylogenetic networks from simple evolutionary events involving a few reticulate events to complex evolutionary histories involving a large number of reticulate events. A software called "Quartet-Net" is implemented and available at http://sysbio.cvm.msstate.edu/QuartetNet/.

  17. Call Forecasting for Inbound Call Center

    Directory of Open Access Journals (Sweden)

    Peter Vinje

    2009-01-01

    Full Text Available In a scenario of inbound call center customer service, the ability to forecast calls is a key element and advantage. By forecasting the correct number of calls a company can predict staffing needs, meet service level requirements, improve customer satisfaction, and benefit from many other optimizations. This project will show how elementary statistics can be used to predict calls for a specific company, forecast the rate at which calls are increasing/decreasing, and determine if the calls may stop at some point.

  18. Assessing call centers’ success:

    Directory of Open Access Journals (Sweden)

    Hesham A. Baraka

    2013-07-01

    This paper introduces a model to evaluate the performance of call centers based on the Delone and McLean Information Systems success model. A number of indicators are identified to track the call center’s performance. Mapping of the proposed indicators to the six dimensions of the D&M model is presented. A Weighted Call Center Performance Index is proposed to assess the call center performance; the index is used to analyze the effect of the identified indicators. Policy-Weighted approach was used to assume the weights with an analysis of different weights for each dimension. The analysis of the different weights cases gave priority to the User satisfaction and net Benefits dimension as the two outcomes from the system. For the input dimensions, higher priority was given to the system quality and the service quality dimension. Call centers decision makers can use the tool to tune the different weights in order to reach the objectives set by the organization. Multiple linear regression analysis was used in order to provide a linear formula for the User Satisfaction dimension and the Net Benefits dimension in order to be able to forecast the values for these two dimensions as function of the other dimensions

  19. Mining human mobility in location-based social networks

    CERN Document Server

    Gao, Huiji

    2015-01-01

    In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook Places, which have attracted an increasing number of users and greatly enriched their urban experience. Typical location-based social networking sites allow a user to ""check in"" at a real-world POI (point of interest, e.g., a hotel, restaurant, theater, etc.), leave tips toward the POI, and share the check-in with their online friends. The check-in action bridges the gap between real world and online social networks, resulting in a new type of social networks, namely l

  20. Threshold based AntNet algorithm for dynamic traffic routing of road networks

    Directory of Open Access Journals (Sweden)

    Ayman M. Ghazy

    2012-07-01

    Full Text Available Dynamic routing algorithms play an important role in road traffic routing to avoid congestion and to direct vehicles to better routes. AntNet routing algorithms have been applied, extensively and successfully, in data communication network. However, its application for dynamic routing on road networks is still considerably limited. This paper presents a modified version of the AntNet routing algorithm, called “Threshold based AntNet”, that has the ability to efficiently utilize a priori information of dynamic traffic routing, especially, for road networks. The modification exploits the practical and pre-known information for most road traffic networks, namely, the good travel times between sources and destinations. The values of those good travel times are manipulated as threshold values. This approach has proven to conserve tracking of good routes. According to the dynamic nature of the problem, the presented approach guards the agility of rediscovering a good route. Attaining the thresholds (good reported travel times, of a given source to destination route, permits for a better utilization of the computational resources, that, leads to better accommodation for the network changes. The presented algorithm introduces a new type of ants called “check ants”. It assists in preserving good routes and, better yet, exposes and discards the degraded ones. The threshold AntNet algorithm presents a new strategy for updating the routing information, supported by the backward ants.

  1. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  2. Time Series Prediction based on Hybrid Neural Networks

    Directory of Open Access Journals (Sweden)

    S. A. Yarushev

    2016-01-01

    Full Text Available In this paper, we suggest to use hybrid approach to time series forecasting problem. In first part of paper, we create a literature review of time series forecasting methods based on hybrid neural networks and neuro-fuzzy approaches. Hybrid neural networks especially effective for specific types of applications such as forecasting or classification problem, in contrast to traditional monolithic neural networks. These classes of problems include problems with different characteristics in different modules. The main part of paper create a detailed overview of hybrid networks benefits, its architectures and performance under traditional neural networks. Hybrid neural networks models for time series forecasting are discussed in the paper. Experiments with modular neural networks are given.

  3. Underwater Sensor Network Redeployment Algorithm Based on Wolf Search.

    Science.gov (United States)

    Jiang, Peng; Feng, Yang; Wu, Feng

    2016-10-21

    This study addresses the optimization of node redeployment coverage in underwater wireless sensor networks. Given that nodes could easily become invalid under a poor environment and the large scale of underwater wireless sensor networks, an underwater sensor network redeployment algorithm was developed based on wolf search. This study is to apply the wolf search algorithm combined with crowded degree control in the deployment of underwater wireless sensor networks. The proposed algorithm uses nodes to ensure coverage of the events, and it avoids the prematurity of the nodes. The algorithm has good coverage effects. In addition, considering that obstacles exist in the underwater environment, nodes are prevented from being invalid by imitating the mechanism of avoiding predators. Thus, the energy consumption of the network is reduced. Comparative analysis shows that the algorithm is simple and effective in wireless sensor network deployment. Compared with the optimized artificial fish swarm algorithm, the proposed algorithm exhibits advantages in network coverage, energy conservation, and obstacle avoidance.

  4. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  5. Cointegration-based financial networks study in Chinese stock market

    Science.gov (United States)

    Tu, Chengyi

    2014-05-01

    We propose a method based on cointegration instead of correlation to construct financial complex network in Chinese stock market. The network is obtained starting from the matrix of p-value calculated by Engle-Granger cointegration test between all pairs of stocks. Then some tools for filtering information in complex network are implemented to prune the complete graph described by the above matrix, such as setting a level of statistical significance as a threshold and Planar Maximally Filtered Graph. We also calculate Partial Correlation Planar Graph of these stocks to compare the above networks. Last, we analyze these directed, weighted and non-symmetric networks by using standard methods of network analysis, including degree centrality, PageRank, HITS, local clustering coefficient, K-shell and strongly and weakly connected components. The results shed a new light on the underlying mechanisms and driving forces in a financial market and deepen our understanding of financial complex network.

  6. Dynamical complexity in the perception-based network formation model

    Science.gov (United States)

    Jo, Hang-Hyun; Moon, Eunyoung

    2016-12-01

    Many link formation mechanisms for the evolution of social networks have been successful to reproduce various empirical findings in social networks. However, they have largely ignored the fact that individuals make decisions on whether to create links to other individuals based on cost and benefit of linking, and the fact that individuals may use perception of the network in their decision making. In this paper, we study the evolution of social networks in terms of perception-based strategic link formation. Here each individual has her own perception of the actual network, and uses it to decide whether to create a link to another individual. An individual with the least perception accuracy can benefit from updating her perception using that of the most accurate individual via a new link. This benefit is compared to the cost of linking in decision making. Once a new link is created, it affects the accuracies of other individuals' perceptions, leading to a further evolution of the actual network. As for initial actual networks, we consider both homogeneous and heterogeneous cases. The homogeneous initial actual network is modeled by Erdős-Rényi (ER) random networks, while we take a star network for the heterogeneous case. In any cases, individual perceptions of the actual network are modeled by ER random networks with controllable linking probability. Then the stable link density of the actual network is found to show discontinuous transitions or jumps according to the cost of linking. As the number of jumps is the consequence of the dynamical complexity, we discuss the effect of initial conditions on the number of jumps to find that the dynamical complexity strongly depends on how much individuals initially overestimate or underestimate the link density of the actual network. For the heterogeneous case, the role of the highly connected individual as an information spreader is also discussed.

  7. Finite-sample based learning algorithms for feedforward networks

    Energy Technology Data Exchange (ETDEWEB)

    Rao, N.S.V.; Protopopescu, V.; Mann, R.C.; Oblow, E.M. [Oak Ridge National Lab., TN (United States); Iyengar, S.S. [Louisiana State Univ., Baton Rouge, LA (United States). Dept. of Computer Science

    1995-04-01

    We discuss two classes of convergent algorithms for learning continuous functions (and also regression functions) that are represented by FeedForward Networks (FFN). The first class of algorithms, applicable to networks with unknown weights located only in the output layer, is obtained by utilizing the potential function methods of Aizerman et al. The second class, applicable to general feedforward networks, is obtained by utilizing the classical Robbins-Monro style stochastic approximation methods. Conditions relating the sample sizes to the error bounds are derived for both classes of algorithms using martingale-type inequalities. For concreteness, the discussion is presented in terms of neural networks, but the results are applicable to general feedforward networks, in particular to wavelet networks. The algorithms can also be directly applied to concept learning problems. A main distinguishing feature of the this work is that the sample sizes are based on explicit algorithms rather than information-based methods.

  8. Reconstruction of biological networks based on life science data integration

    Directory of Open Access Journals (Sweden)

    Kormeier Benjamin

    2010-06-01

    Full Text Available For the implementation of the virtual cell, the fundamental question is how to model and simulate complex biological networks. Therefore, based on relevant molecular database and information systems, biological data integration is an essential step in constructing biological networks. In this paper, we will motivate the applications BioDWH - an integration toolkit for building life science data warehouses, CardioVINEdb - a information system for biological data in cardiovascular-disease and VANESA- a network editor for modeling and simulation of biological networks. Based on this integration process, the system supports the generation of biological network models. A case study of a cardiovascular-disease related gene-regulated biological network is also presented.

  9. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  10. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  11. A random spatial network model based on elementary postulates

    Science.gov (United States)

    Karlinger, Michael R.; Troutman, Brent M.

    1989-01-01

    A model for generating random spatial networks that is based on elementary postulates comparable to those of the random topology model is proposed. In contrast to the random topology model, this model ascribes a unique spatial specification to generated drainage networks, a distinguishing property of some network growth models. The simplicity of the postulates creates an opportunity for potential analytic investigations of the probabilistic structure of the drainage networks, while the spatial specification enables analyses of spatially dependent network properties. In the random topology model all drainage networks, conditioned on magnitude (number of first-order streams), are equally likely, whereas in this model all spanning trees of a grid, conditioned on area and drainage density, are equally likely. As a result, link lengths in the generated networks are not independent, as usually assumed in the random topology model. For a preliminary model evaluation, scale-dependent network characteristics, such as geometric diameter and link length properties, and topologic characteristics, such as bifurcation ratio, are computed for sets of drainage networks generated on square and rectangular grids. Statistics of the bifurcation and length ratios fall within the range of values reported for natural drainage networks, but geometric diameters tend to be relatively longer than those for natural networks.

  12. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  13. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  14. Competence–Based Support of Interaction between Business Network Members

    OpenAIRE

    Smirnov, Alexander; Kashevnik, Alexey; Shilov, Nikolay

    2008-01-01

    In a complicated business network finding a supplier can be a very time consuming task. The technology of competence management is aimed to support such kind of tasks. The paper presents an approach to support interaction between business network members based on such technologies as competence management and knowledge management. The conceptual models of the context-driven competence management system and production network member competence profile are described. The usage of th...

  15. Traffic allocation strategies in WSS-based dynamic optical networks

    OpenAIRE

    Shakeri, Ali; Garrich, Miquel; Bravalheri, Anderson; Careglio, Davide; Solé Pareta, Josep; Fumagalli, Andrea

    2017-01-01

    Elastic optical networking (EON) is a viable solution to meet future dynamic capacity requirements of Internet service provider and inter-datacenter networks. At the core of EON, wavelength selective switches (WSSs) are applied to individually route optical circuits, while assigning an arbitrary bandwidth to each circuit. Critically, the WSS control scheme and configuration time may delay the creation time of each circuit in the network. In this paper, we first detail the WSS-based optical da...

  16. A Neural Network-Based Interval Pattern Matcher

    Directory of Open Access Journals (Sweden)

    Jing Lu

    2015-07-01

    Full Text Available One of the most important roles in the machine learning area is to classify, and neural networks are very important classifiers. However, traditional neural networks cannot identify intervals, let alone classify them. To improve their identification ability, we propose a neural network-based interval matcher in our paper. After summarizing the theoretical construction of the model, we take a simple and a practical weather forecasting experiment, which show that the recognizer accuracy reaches 100% and that is promising.

  17. "I'll See You on IM, Text, or Call You": A Social Network Approach of Adolescents' Use of Communication Media

    Science.gov (United States)

    Van Cleemput, Katrien

    2010-01-01

    This study explores some possibilities of social network analysis for studying adolescents' communication patterns. A full network analysis was conducted on third-grade high school students (15 year olds, 137 students) in Belgium. The results pointed out that face-to-face communication was still the most prominent way for information to flow…

  18. A simple network agreement-based approach for combining evidences in a heterogeneous sensor network

    Directory of Open Access Journals (Sweden)

    Raúl Eusebio-Grande

    2015-12-01

    Full Text Available In this research we investigate how the evidences provided by both static and mobile nodes that are part of a heterogenous sensor network can be combined to have trustworthy results. A solution relying on a network agreement-based approach was implemented and tested.

  19. A Self-Organizing Incremental Neural Network based on local distribution learning.

    Science.gov (United States)

    Xing, Youlu; Shi, Xiaofeng; Shen, Furao; Zhou, Ke; Zhao, Jinxi

    2016-12-01

    In this paper, we propose an unsupervised incremental learning neural network based on local distribution learning, which is called Local Distribution Self-Organizing Incremental Neural Network (LD-SOINN). The LD-SOINN combines the advantages of incremental learning and matrix learning. It can automatically discover suitable nodes to fit the learning data in an incremental way without a priori knowledge such as the structure of the network. The nodes of the network store rich local information regarding the learning data. The adaptive vigilance parameter guarantees that LD-SOINN is able to add new nodes for new knowledge automatically and the number of nodes will not grow unlimitedly. While the learning process continues, nodes that are close to each other and have similar principal components are merged to obtain a concise local representation, which we call a relaxation data representation. A denoising process based on density is designed to reduce the influence of noise. Experiments show that the LD-SOINN performs well on both artificial and real-word data. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN

    Directory of Open Access Journals (Sweden)

    LAHEEB MOHAMMAD IBRAHIM

    2010-12-01

    Full Text Available In this research, a hierarchical off-line anomaly network intrusion detection system based on Distributed Time-Delay Artificial Neural Network is introduced. This research aims to solve a hierarchical multi class problem in which the type of attack (DoS, U2R, R2L and Probe attack detected by dynamic neural network. The results indicate that dynamic neural nets (Distributed Time-Delay Artificial Neural Network can achieve a high detection rate, where the overall accuracy classification rate average is equal to 97.24%.

  1. Anomaly-based Network Intrusion Detection Methods

    Directory of Open Access Journals (Sweden)

    Pavel Nevlud

    2013-01-01

    Full Text Available The article deals with detection of network anomalies. Network anomalies include everything that is quite different from the normal operation. For detection of anomalies were used machine learning systems. Machine learning can be considered as a support or a limited type of artificial intelligence. A machine learning system usually starts with some knowledge and a corresponding knowledge organization so that it can interpret, analyse, and test the knowledge acquired. There are several machine learning techniques available. We tested Decision tree learning and Bayesian networks. The open source data-mining framework WEKA was the tool we used for testing the classify, cluster, association algorithms and for visualization of our results. The WEKA is a collection of machine learning algorithms for data mining tasks.

  2. A novel interacting multiple model based network intrusion detection scheme

    Science.gov (United States)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  3. A Video-Based CALL Program for Proficient and Less-Proficient L2 Learners' Comprehension Ability, Incidental Vocabulary Acquisition

    Science.gov (United States)

    Lin, Lu-Fang

    2010-01-01

    This study investigates first whether news video in a computer-assisted language learning (CALL) program can foster second language (L2) comprehension and incidental acquisition of adjectives, nouns, and verbs. Second, this study examines the relationship between the participants' vocabulary acquisition and their video comprehension. The…

  4. Forecasting business cycle with chaotic time series based on neural network with weighted fuzzy membership functions

    International Nuclear Information System (INIS)

    Chai, Soo H.; Lim, Joon S.

    2016-01-01

    This study presents a forecasting model of cyclical fluctuations of the economy based on the time delay coordinate embedding method. The model uses a neuro-fuzzy network called neural network with weighted fuzzy membership functions (NEWFM). The preprocessed time series of the leading composite index using the time delay coordinate embedding method are used as input data to the NEWFM to forecast the business cycle. A comparative study is conducted using other methods based on wavelet transform and Principal Component Analysis for the performance comparison. The forecasting results are tested using a linear regression analysis to compare the approximation of the input data against the target class, gross domestic product (GDP). The chaos based model captures nonlinear dynamics and interactions within the system, which other two models ignore. The test results demonstrated that chaos based method significantly improved the prediction capability, thereby demonstrating superior performance to the other methods.

  5. Transmission network expansion planning based on hybridization model of neural networks and harmony search algorithm

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Ameli

    2012-01-01

    Full Text Available Transmission Network Expansion Planning (TNEP is a basic part of power network planning that determines where, when and how many new transmission lines should be added to the network. So, the TNEP is an optimization problem in which the expansion purposes are optimized. Artificial Intelligence (AI tools such as Genetic Algorithm (GA, Simulated Annealing (SA, Tabu Search (TS and Artificial Neural Networks (ANNs are methods used for solving the TNEP problem. Today, by using the hybridization models of AI tools, we can solve the TNEP problem for large-scale systems, which shows the effectiveness of utilizing such models. In this paper, a new approach to the hybridization model of Probabilistic Neural Networks (PNNs and Harmony Search Algorithm (HSA was used to solve the TNEP problem. Finally, by considering the uncertain role of the load based on a scenario technique, this proposed model was tested on the Garver’s 6-bus network.

  6. Target recognition based on convolutional neural network

    Science.gov (United States)

    Wang, Liqiang; Wang, Xin; Xi, Fubiao; Dong, Jian

    2017-11-01

    One of the important part of object target recognition is the feature extraction, which can be classified into feature extraction and automatic feature extraction. The traditional neural network is one of the automatic feature extraction methods, while it causes high possibility of over-fitting due to the global connection. The deep learning algorithm used in this paper is a hierarchical automatic feature extraction method, trained with the layer-by-layer convolutional neural network (CNN), which can extract the features from lower layers to higher layers. The features are more discriminative and it is beneficial to the object target recognition.

  7. Resting State fMRI Functional Connectivity-Based Classification Using a Convolutional Neural Network Architecture

    Directory of Open Access Journals (Sweden)

    Regina J. Meszlényi

    2017-10-01

    Full Text Available Machine learning techniques have become increasingly popular in the field of resting state fMRI (functional magnetic resonance imaging network based classification. However, the application of convolutional networks has been proposed only very recently and has remained largely unexplored. In this paper we describe a convolutional neural network architecture for functional connectome classification called connectome-convolutional neural network (CCNN. Our results on simulated datasets and a publicly available dataset for amnestic mild cognitive impairment classification demonstrate that our CCNN model can efficiently distinguish between subject groups. We also show that the connectome-convolutional network is capable to combine information from diverse functional connectivity metrics and that models using a combination of different connectivity descriptors are able to outperform classifiers using only one metric. From this flexibility follows that our proposed CCNN model can be easily adapted to a wide range of connectome based classification or regression tasks, by varying which connectivity descriptor combinations are used to train the network.

  8. Cooperation in memory-based prisoner's dilemma game on interdependent networks

    Science.gov (United States)

    Luo, Chao; Zhang, Xiaolin; Liu, Hong; Shao, Rui

    2016-05-01

    Memory or so-called experience normally plays the important role to guide the human behaviors in real world, that is essential for rational decisions made by individuals. Hence, when the evolutionary behaviors of players with bounded rationality are investigated, it is reasonable to make an assumption that players in system are with limited memory. Besides, in order to unravel the intricate variability of complex systems in real world and make a highly integrative understanding of their dynamics, in recent years, interdependent networks as a comprehensive network structure have obtained more attention in this community. In this article, the evolution of cooperation in memory-based prisoner's dilemma game (PDG) on interdependent networks composed by two coupled square lattices is studied. Herein, all or part of players are endowed with finite memory ability, and we focus on the mutual influence of memory effect and interdependent network reciprocity on cooperation of spatial PDG. We show that the density of cooperation can be significantly promoted within an optimal region of memory length and interdependent strength. Furthermore, distinguished by whether having memory ability/external links or not, each kind of players on networks would have distinct evolutionary behaviors. Our work could be helpful to understand the emergence and maintenance of cooperation under the evolution of memory-based players on interdependent networks.

  9. Resting State fMRI Functional Connectivity-Based Classification Using a Convolutional Neural Network Architecture

    Science.gov (United States)

    Meszlényi, Regina J.; Buza, Krisztian; Vidnyánszky, Zoltán

    2017-01-01

    Machine learning techniques have become increasingly popular in the field of resting state fMRI (functional magnetic resonance imaging) network based classification. However, the application of convolutional networks has been proposed only very recently and has remained largely unexplored. In this paper we describe a convolutional neural network architecture for functional connectome classification called connectome-convolutional neural network (CCNN). Our results on simulated datasets and a publicly available dataset for amnestic mild cognitive impairment classification demonstrate that our CCNN model can efficiently distinguish between subject groups. We also show that the connectome-convolutional network is capable to combine information from diverse functional connectivity metrics and that models using a combination of different connectivity descriptors are able to outperform classifiers using only one metric. From this flexibility follows that our proposed CCNN model can be easily adapted to a wide range of connectome based classification or regression tasks, by varying which connectivity descriptor combinations are used to train the network. PMID:29089883

  10. Accurate recapture identification for genetic mark–recapture studies with error-tolerant likelihood-based match calling and sample clustering

    Science.gov (United States)

    Sethi, Suresh; Linden, Daniel; Wenburg, John; Lewis, Cara; Lemons, Patrick R.; Fuller, Angela K.; Hare, Matthew P.

    2016-01-01

    Error-tolerant likelihood-based match calling presents a promising technique to accurately identify recapture events in genetic mark–recapture studies by combining probabilities of latent genotypes and probabilities of observed genotypes, which may contain genotyping errors. Combined with clustering algorithms to group samples into sets of recaptures based upon pairwise match calls, these tools can be used to reconstruct accurate capture histories for mark–recapture modelling. Here, we assess the performance of a recently introduced error-tolerant likelihood-based match-calling model and sample clustering algorithm for genetic mark–recapture studies. We assessed both biallelic (i.e. single nucleotide polymorphisms; SNP) and multiallelic (i.e. microsatellite; MSAT) markers using a combination of simulation analyses and case study data on Pacific walrus (Odobenus rosmarus divergens) and fishers (Pekania pennanti). A novel two-stage clustering approach is demonstrated for genetic mark–recapture applications. First, repeat captures within a sampling occasion are identified. Subsequently, recaptures across sampling occasions are identified. The likelihood-based matching protocol performed well in simulation trials, demonstrating utility for use in a wide range of genetic mark–recapture studies. Moderately sized SNP (64+) and MSAT (10–15) panels produced accurate match calls for recaptures and accurate non-match calls for samples from closely related individuals in the face of low to moderate genotyping error. Furthermore, matching performance remained stable or increased as the number of genetic markers increased, genotyping error notwithstanding.

  11. Ethernet-Based Services for Next Generation Networks

    Science.gov (United States)

    Hernandez-Valencia, Enrique

    Over the last few years, Ethernet technology and services have emerged as an indispensable component of the broadband networking and telecommunications infrastructure, both for network operators and service providers. As an example, Worldwide Enterprise customer demand for Ethernet services by itself is expected to hit the 30B US mark by year 2012. Use of Ethernet technology in the feeder networks that support residential applications, such as "triple play" voice, data, and video services, is equally on the rise. As the synergies between packet-aware transport and service oriented equipment continue to be exploited in the path toward transport convergence. Ethernet technology is expected to play a critical part in the evolution toward converged Optical/Packet Transport networks. Here we discuss the main business motivations, services, and technologies driving the specifications of so-called carrier Ethernet and highlight challenges associated with delivering the expectations for low implementation complexity, easy of use, provisioning and management of networks and network elements embracing this technology.

  12. Self-organized topology of recurrence-based complex networks

    International Nuclear Information System (INIS)

    Yang, Hui; Liu, Gang

    2013-01-01

    With the rapid technological advancement, network is almost everywhere in our daily life. Network theory leads to a new way to investigate the dynamics of complex systems. As a result, many methods are proposed to construct a network from nonlinear time series, including the partition of state space, visibility graph, nearest neighbors, and recurrence approaches. However, most previous works focus on deriving the adjacency matrix to represent the complex network and extract new network-theoretic measures. Although the adjacency matrix provides connectivity information of nodes and edges, the network geometry can take variable forms. The research objective of this article is to develop a self-organizing approach to derive the steady geometric structure of a network from the adjacency matrix. We simulate the recurrence network as a physical system by treating the edges as springs and the nodes as electrically charged particles. Then, force-directed algorithms are developed to automatically organize the network geometry by minimizing the system energy. Further, a set of experiments were designed to investigate important factors (i.e., dynamical systems, network construction methods, force-model parameter, nonhomogeneous distribution) affecting this self-organizing process. Interestingly, experimental results show that the self-organized geometry recovers the attractor of a dynamical system that produced the adjacency matrix. This research addresses a question, i.e., “what is the self-organizing geometry of a recurrence network?” and provides a new way to reproduce the attractor or time series from the recurrence plot. As a result, novel network-theoretic measures (e.g., average path length and proximity ratio) can be achieved based on actual node-to-node distances in the self-organized network topology. The paper brings the physical models into the recurrence analysis and discloses the spatial geometry of recurrence networks

  13. Self-organized topology of recurrence-based complex networks.

    Science.gov (United States)

    Yang, Hui; Liu, Gang

    2013-12-01

    With the rapid technological advancement, network is almost everywhere in our daily life. Network theory leads to a new way to investigate the dynamics of complex systems. As a result, many methods are proposed to construct a network from nonlinear time series, including the partition of state space, visibility graph, nearest neighbors, and recurrence approaches. However, most previous works focus on deriving the adjacency matrix to represent the complex network and extract new network-theoretic measures. Although the adjacency matrix provides connectivity information of nodes and edges, the network geometry can take variable forms. The research objective of this article is to develop a self-organizing approach to derive the steady geometric structure of a network from the adjacency matrix. We simulate the recurrence network as a physical system by treating the edges as springs and the nodes as electrically charged particles. Then, force-directed algorithms are developed to automatically organize the network geometry by minimizing the system energy. Further, a set of experiments were designed to investigate important factors (i.e., dynamical systems, network construction methods, force-model parameter, nonhomogeneous distribution) affecting this self-organizing process. Interestingly, experimental results show that the self-organized geometry recovers the attractor of a dynamical system that produced the adjacency matrix. This research addresses a question, i.e., "what is the self-organizing geometry of a recurrence network?" and provides a new way to reproduce the attractor or time series from the recurrence plot. As a result, novel network-theoretic measures (e.g., average path length and proximity ratio) can be achieved based on actual node-to-node distances in the self-organized network topology. The paper brings the physical models into the recurrence analysis and discloses the spatial geometry of recurrence networks.

  14. Image Restoration Technology Based on Discrete Neural network

    Directory of Open Access Journals (Sweden)

    Zhou Duoying

    2015-01-01

    Full Text Available With the development of computer science and technology, the development of artificial intelligence advances rapidly in the field of image restoration. Based on the MATLAB platform, this paper constructs a kind of image restoration technology of artificial intelligence based on the discrete neural network and feedforward network, and carries out simulation and contrast of the restoration process by the use of the bionic algorithm. Through the application of simulation restoration technology, this paper verifies that the discrete neural network has a good convergence and identification capability in the image restoration technology with a better effect than that of the feedforward network. The restoration technology based on the discrete neural network can provide a reliable mathematical model for this field.

  15. Connected Dominating Set Based Topology Control in Wireless Sensor Networks

    Science.gov (United States)

    He, Jing

    2012-01-01

    Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…

  16. Distributed network generation based on preferential attachment in ABS

    NARCIS (Netherlands)

    K. Azadbakht (Keyvan); N. Bezirgiannis (Nikolaos); F.S. de Boer (Frank)

    2017-01-01

    textabstractGeneration of social networks using Preferential Attachment (PA) mechanism is proposed in the Barabasi-Albert model. In this mechanism, new nodes are introduced to the network sequentially and they attach to the existing nodes preferentially where the preference can be based on the

  17. Machine learning for network-based malware detection

    DEFF Research Database (Denmark)

    Stevanovic, Matija

    using traffic traces from honeypots and malware testing environments as well as operational ISP networks. Based on the evaluation, the novel detection methods provide accurate and efficient identification of malicious network traffic, thus being promising in the light of operational deployment...

  18. A fuzzy art neural network based color image processing and ...

    African Journals Online (AJOL)

    A fuzzy art neural network based color image processing and recognition scheme. ... color image pixels, which enables a Fuzzy ART neural network to process the RGB color images. The application of the algorithm was implemented and tested on a set of RGB color face images. Keywords: Color image processing, RGB, ...

  19. Rate adaptation in ad hoc networks based on pricing

    CSIR Research Space (South Africa)

    Awuor, F

    2011-09-01

    Full Text Available to transmit at high power leading to abnormal interference in the network hence degrades network performance (i.e. low data rates, loss of connectivity among others). In this paper, the authors propose rate adaptation based on pricing (RAP) algorithm...

  20. Based on BP Neural Network Stock Prediction

    Science.gov (United States)

    Liu, Xiangwei; Ma, Xin

    2012-01-01

    The stock market has a high profit and high risk features, on the stock market analysis and prediction research has been paid attention to by people. Stock price trend is a complex nonlinear function, so the price has certain predictability. This article mainly with improved BP neural network (BPNN) to set up the stock market prediction model, and…

  1. Network-Based Models in Molecular Biology

    Science.gov (United States)

    Beyer, Andreas

    Biological systems are characterized by a large number of diverse interactions. Interaction maps have been used to abstract those interactions at all biological scales ranging from food webs at the ecosystem level down to protein interaction networks at the molecular scale.

  2. Epidemic spreading on networks based on stress response

    Science.gov (United States)

    Nian, Fuzhong; Yao, Shuanglong

    2017-06-01

    Based on the stress responses of individuals, the susceptible-infected-susceptible epidemic model was improved on the small-world networks and BA scale-free networks and the simulations were implemented and analyzed. Results indicate that the behaviors of individual’s stress responses could induce the epidemic spreading resistance and adaptation at the network level. This phenomenon showed that networks were learning how to adapt to the disease and the evolution process could improve their immunization to future infectious diseases and would effectively prevent the spreading of infectious diseases.

  3. An image segmentation method based on network clustering model

    Science.gov (United States)

    Jiao, Yang; Wu, Jianshe; Jiao, Licheng

    2018-01-01

    Network clustering phenomena are ubiquitous in nature and human society. In this paper, a method involving a network clustering model is proposed for mass segmentation in mammograms. First, the watershed transform is used to divide an image into regions, and features of the image are computed. Then a graph is constructed from the obtained regions and features. The network clustering model is applied to realize clustering of nodes in the graph. Compared with two classic methods, the algorithm based on the network clustering model performs more effectively in experiments.

  4. Two port network analysis for three impedance based oscillators

    KAUST Repository

    Said, Lobna A.

    2011-12-01

    Two-port network representations are applied to analyze complex networks which can be dissolved into sub-networks connected in series, parallel or cascade. In this paper, the concept of two-port network has been studied for oscillators. Three impedance oscillator based on two port concept has been analyzed using different impedance structures. The effect of each structure on the oscillation condition and the frequency of oscillation have been introduced. Two different implementations using MOS and BJT have been introduced. © 2011 IEEE.

  5. Optical-Correlator Neural Network Based On Neocognitron

    Science.gov (United States)

    Chao, Tien-Hsin; Stoner, William W.

    1994-01-01

    Multichannel optical correlator implements shift-invariant, high-discrimination pattern-recognizing neural network based on paradigm of neocognitron. Selected as basic building block of this neural network because invariance under shifts is inherent advantage of Fourier optics included in optical correlators in general. Neocognitron is conceptual electronic neural-network model for recognition of visual patterns. Multilayer processing achieved by iteratively feeding back output of feature correlator to input spatial light modulator and updating Fourier filters. Neural network trained by use of characteristic features extracted from target images. Multichannel implementation enables parallel processing of large number of selected features.

  6. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  7. Network Diffusion-Based Prioritization of Autism Risk Genes Identifies Significantly Connected Gene Modules

    Directory of Open Access Journals (Sweden)

    Ettore Mosca

    2017-09-01

    Full Text Available Autism spectrum disorder (ASD is marked by a strong genetic heterogeneity, which is underlined by the low overlap between ASD risk gene lists proposed in different studies. In this context, molecular networks can be used to analyze the results of several genome-wide studies in order to underline those network regions harboring genetic variations associated with ASD, the so-called “disease modules.” In this work, we used a recent network diffusion-based approach to jointly analyze multiple ASD risk gene lists. We defined genome-scale prioritizations of human genes in relation to ASD genes from multiple studies, found significantly connected gene modules associated with ASD and predicted genes functionally related to ASD risk genes. Most of them play a role in synapsis and neuronal development and function; many are related to syndromes that can be in comorbidity with ASD and the remaining are involved in epigenetics, cell cycle, cell adhesion and cancer.

  8. Face recognition based on improved BP neural network

    Directory of Open Access Journals (Sweden)

    Yue Gaili

    2017-01-01

    Full Text Available In order to improve the recognition rate of face recognition, face recognition algorithm based on histogram equalization, PCA and BP neural network is proposed. First, the face image is preprocessed by histogram equalization. Then, the classical PCA algorithm is used to extract the features of the histogram equalization image, and extract the principal component of the image. And then train the BP neural network using the trained training samples. This improved BP neural network weight adjustment method is used to train the network because the conventional BP algorithm has the disadvantages of slow convergence, easy to fall into local minima and training process. Finally, the BP neural network with the test sample input is trained to classify and identify the face images, and the recognition rate is obtained. Through the use of ORL database face image simulation experiment, the analysis results show that the improved BP neural network face recognition method can effectively improve the recognition rate of face recognition.

  9. Web-based networking within the framework of ANENT

    International Nuclear Information System (INIS)

    Han, K.W.; Lee, E.J.; Kim, Y.T.; Nam, Y.M.; Kim, H.K.

    2004-01-01

    The Korea Atomic Energy Research Institute (KAERI) is actively participating in the Asian Network for Education in Nuclear Technology (ANENT), which is an IAEA activity to promote nuclear knowledge management. This has led KAERI to conduct a web-based networking for nuclear education and training in Asia. The networking encompasses the establishment of a relevant website and a system for a sustainable operation of the website. The established ANENT website features function as a database providing collected information, a link facilitating a systematic worldwide access to relevant websites, and an activity implementation for supporting the individual tasks of ANENT. The required information is being collected and loaded onto the database, and the website will be improved step by step. Consequently, networking is expected to play an important role, through cooperating with other networks, and thus contributing to a future global network for a sustainable development of nuclear technology. (author)

  10. Rumor Diffusion in an Interests-Based Dynamic Social Network

    Directory of Open Access Journals (Sweden)

    Mingsheng Tang

    2013-01-01

    Full Text Available To research rumor diffusion in social friend network, based on interests, a dynamic friend network is proposed, which has the characteristics of clustering and community, and a diffusion model is also proposed. With this friend network and rumor diffusion model, based on the zombie-city model, some simulation experiments to analyze the characteristics of rumor diffusion in social friend networks have been conducted. The results show some interesting observations: (1 positive information may evolve to become a rumor through the diffusion process that people may modify the information by word of mouth; (2 with the same average degree, a random social network has a smaller clustering coefficient and is more beneficial for rumor diffusion than the dynamic friend network; (3 a rumor is spread more widely in a social network with a smaller global clustering coefficient than in a social network with a larger global clustering coefficient; and (4 a network with a smaller clustering coefficient has a larger efficiency.

  11. A Base Component for Network-Based Service-Oriented C4ISR Systems

    Science.gov (United States)

    2005-12-01

    access service. The main components of the service are given by two software modules, called front-end manager and service manager . A front-end...user, or by means of some installation wizard which downloads the most recent version from a designated network site. A service manager can be thought...of as a mediator between a front-end manager on the one hand and a set of network services on the other hand. A service manager is created by a

  12. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  13. A Call for New Communication Channels for Gynecological Oncology Trainees: A Survey on Social Media Use and Educational Needs by the European Network of Young Gynecological Oncologists.

    Science.gov (United States)

    Zalewski, Kamil; Lindemann, Kristina; Halaska, Michael J; Zapardiel, Ignacio; Laky, Rene; Chereau, Elisabeth; Lindquist, David; Polterauer, Stephan; Sukhin, Vladislav; Dursun, Polat

    2017-03-01

    The aim of the study was to assess patterns in the use of social media (SM) platforms and to identify the training needs among European gynecologic oncology trainees. In 2014, a web-based survey was sent to 633 trainees from the European Network of Young Gynaecological Oncologists (ENYGO) database. The 14-item questionnaire (partially using a 1- to 5-point Likert scale) assessed respondents' use of SM and preference for workshop content and organization. Descriptive analysis was used to describe the mean scores reported for different items, and the internal reliability of the questionnaire was assessed by Cronbach α. In total, 170 ENYGO members (27%) responded to the survey. Of those, 91% said that they use SM platforms, mostly for private purposes. Twenty-three percent used SM professionally and 43% indicated that they would consider SM to be a clinical discussion forum. The respondents said that they would like updates on conferences and professional activities to be shared on SM platforms. Complication management, surgical anatomy, and state of the art in gynecologic oncology were identified as preferred workshops topics. The most frequently indicated hands-on workshops were laparoscopic techniques and surgical anatomy. Consultants attached a higher level of importance to palliative care education and communication training than trainees. The mean duration of the workshop preferred was 2 days. This report highlights the significance of ENYGO trainees' attachment to SM platforms. Most respondents expect ENYGO to use these online channels for promoting educational activities and other updates. Using SM for clinical discussion will require specific guidelines to secure professional and also consumer integrity. This survey confirms surgical management and the state of the art as important knowledge gaps, and ENYGO has tailored its activities according to these results. Future activities will further direct attention and resources to education in palliative care and

  14. The Quake-Catcher Network: An Innovative Community-Based Seismic Network

    Science.gov (United States)

    Saltzman, J.; Cochran, E. S.; Lawrence, J. F.; Christensen, C. M.

    2009-12-01

    The Quake-Catcher Network (QCN) is a volunteer computing seismic network that engages citizen scientists, teachers, and museums to participate in the detection of earthquakes. In less than two years, the network has grown to over 1000 participants globally and continues to expand. QCN utilizes Micro-Electro-Mechanical System (MEMS) accelerometers, in laptops and external to desktop computers, to detect moderate to large earthquakes. One goal of the network is to involve K-12 classrooms and museums by providing sensors and software to introduce participants to seismology and community-based scientific data collection. The Quake-Catcher Network provides a unique opportunity to engage participants directly in the scientific process, through hands-on activities that link activities and outcomes to their daily lives. Partnerships with teachers and museum staff are critical to growth of the Quake Catcher Network. Each participating institution receives a MEMS accelerometer to connect, via USB, to a computer that can be used for hands-on activities and to record earthquakes through a distributed computing system. We developed interactive software (QCNLive) that allows participants to view sensor readings in real time. Participants can also record earthquakes and download earthquake data that was collected by their sensor or other QCN sensors. The Quake-Catcher Network combines research and outreach to improve seismic networks and increase awareness and participation in science-based research in K-12 schools.

  15. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  16. A conceptual framework for an ecosystem services-based assessment of the so-called "emergency stabilization" measures following wildfire

    Science.gov (United States)

    Valente, Sandra; Prats, Sergio; Ribeiro, Cristina; Verheijen, Frank; Fleskens, Luuk; Keizer, Jacob

    2015-04-01

    Wildfires have become a major environmental concern in many Southern European countries over the past few decades. This includes Portugal, where, on average, some 100 000 ha of rural lands are affected by wildfire every year. While policies, laws, plans and public expenditure in Portugal continue to be largely directed towards fire combat and, arguably, to a lesser extent fire prevention, there has only recently been increasing attention for post-fire land management. For example following frequent and several large wildfires during the summer of 2010, so-called emergency stabilization measures were implemented in 16 different burnt areas in northern and central Portugal, using funds of the EU Rural Development Plan in Portugal (PRODER). The measures that were implemented included mulching (i.e. application of a protective layer of organic material), seeding and the construction of log barriers. However, the effectiveness of the implemented measures has not been monitored or otherwise assessed in a systematic manner. In fact, until very recently none of the post-fire emergency stabilization measures contemplated under PRODER seem to have been studied in an exhaustive manner in Portugal, whether under laboratory or field conditions. Prats et al. (2012, 2013, 2014) tested two of these measures by field trials, i.e. hydro-mulching and forest residue mulching. The authors found both measures to be highly effective in terms of reducing overland flow and especially erosion. It remains a challenge, however, to assess the effectiveness of these and other measures in a broader context, not only beyond overland flow and sediment losses but also beyond the spatio-temporal scale that are typical for such field trials (plots and the first two years after fire). This challenge will be addressed in the Portuguese case study of the RECARE project. Nonetheless, the present study wants to be a first attempt at an ecosystem services-based assessment of mulching as a post

  17. Ionic liquid based multifunctional double network gel

    Science.gov (United States)

    Ahmed, Kumkum; Higashihara, Tomoya; Arafune, Hiroyuki; Kamijo, Toshio; Morinaga, Takashi; Sato, Takaya; Furukawa, Hidemitsu

    2015-04-01

    Gels are a promising class of soft and wet materials with diverse application in tissue engineering and bio-medical purpose. In order to accelerate the development of gels, it is required to synthesize multi-functional gels of high mechanical strength, ultra low surface friction and suitable elastic modulus with a variety of methods and new materials. Among many types of gel ionic gel made from ionic liquids (ILs) could be used for diverse applications in electrochemical devices and in the field of tribology. IL, a promising materials for lubrication, is a salt with a melting point lower than 100 °C. As a lubricant, ILs are characterized by an extremely low vapor pressure, high thermal stability and high ion conductivity. In this work a novel approach of making double network DN ionic gel using IL has been made utilizing photo polymerization process. A hydrophobic monomer Methyl methacrylate (MMA) has been used as a first network and a hydrophobic IL monomer, N,N-diethyl-N-(2-mthacryloylethyl)-N-methylammonium bistrifluoromethylsulfonyl)imide (DEMM-TFSI) has been used as a second network using photo initiator benzophenon and crosslinker triethylene glycol dimethacrylate (TEGDMA). The resulting DN ionic gel shows transparency, flexibility, high thermal stability, good mechanical toughness and low friction coefficient value which can be a potential candidate as a gel slider in different mechanical devices and can open a new area in the field of gel tribology.

  18. Flexible optical network components based on densely integrated microring resonators

    NARCIS (Netherlands)

    Geuzebroek, D.H.

    2005-01-01

    This thesis addresses the design, realization and characterization of reconfigurable optical network components based on multiple microring resonators. Since thermally tunable microring resonators can be used as wavelength selective space switches, very compact devices with high complexity and

  19. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  20. The Efficiency of Constraint Based Routing in MPLS Networks

    Directory of Open Access Journals (Sweden)

    Martin Medvecky

    2011-01-01

    Full Text Available The paper presents the simulation results and evaluates the efficiency of constraint base routing algorithms used in MPLS network from the point of their usability in Next Generation Networks. The efficiency of constraint based routing is evaluated according following criteria: optimal path selection, routing priority of traffic flows selected for constraint routing and bandwidth allocation by MAM or RDM bandwidth constraints models.

  1. Image Restoration Technology Based on Discrete Neural network

    OpenAIRE

    Zhou Duoying

    2015-01-01

    With the development of computer science and technology, the development of artificial intelligence advances rapidly in the field of image restoration. Based on the MATLAB platform, this paper constructs a kind of image restoration technology of artificial intelligence based on the discrete neural network and feedforward network, and carries out simulation and contrast of the restoration process by the use of the bionic algorithm. Through the application of simulation restoration technology, ...

  2. Content-Based Multi-Channel Network Coding Algorithm in the Millimeter-Wave Sensor Network.

    Science.gov (United States)

    Lin, Kai; Wang, Di; Hu, Long

    2016-07-01

    With the development of wireless technology, the widespread use of 5G is already an irreversible trend, and millimeter-wave sensor networks are becoming more and more common. However, due to the high degree of complexity and bandwidth bottlenecks, the millimeter-wave sensor network still faces numerous problems. In this paper, we propose a novel content-based multi-channel network coding algorithm, which uses the functions of data fusion, multi-channel and network coding to improve the data transmission; the algorithm is referred to as content-based multi-channel network coding (CMNC). The CMNC algorithm provides a fusion-driven model based on the Dempster-Shafer (D-S) evidence theory to classify the sensor nodes into different classes according to the data content. By using the result of the classification, the CMNC algorithm also provides the channel assignment strategy and uses network coding to further improve the quality of data transmission in the millimeter-wave sensor network. Extensive simulations are carried out and compared to other methods. Our simulation results show that the proposed CMNC algorithm can effectively improve the quality of data transmission and has better performance than the compared methods.

  3. Content-Based Multi-Channel Network Coding Algorithm in the Millimeter-Wave Sensor Network

    Directory of Open Access Journals (Sweden)

    Kai Lin

    2016-07-01

    Full Text Available With the development of wireless technology, the widespread use of 5G is already an irreversible trend, and millimeter-wave sensor networks are becoming more and more common. However, due to the high degree of complexity and bandwidth bottlenecks, the millimeter-wave sensor network still faces numerous problems. In this paper, we propose a novel content-based multi-channel network coding algorithm, which uses the functions of data fusion, multi-channel and network coding to improve the data transmission; the algorithm is referred to as content-based multi-channel network coding (CMNC. The CMNC algorithm provides a fusion-driven model based on the Dempster-Shafer (D-S evidence theory to classify the sensor nodes into different classes according to the data content. By using the result of the classification, the CMNC algorithm also provides the channel assignment strategy and uses network coding to further improve the quality of data transmission in the millimeter-wave sensor network. Extensive simulations are carried out and compared to other methods. Our simulation results show that the proposed CMNC algorithm can effectively improve the quality of data transmission and has better performance than the compared methods.

  4. Design and Simulation Analysis for Integrated Vehicle Chassis-Network Control System Based on CAN Network

    Directory of Open Access Journals (Sweden)

    Wei Yu

    2016-01-01

    Full Text Available Due to the different functions of the system used in the vehicle chassis control, the hierarchical control strategy also leads to many kinds of the network topology structure. According to the hierarchical control principle, this research puts forward the integrated control strategy of the chassis based on supervision mechanism. The purpose is to consider how the integrated control architecture affects the control performance of the system after the intervention of CAN network. Based on the principle of hierarchical control and fuzzy control, a fuzzy controller is designed, which is used to monitor and coordinate the ESP, AFS, and ARS. And the IVC system is constructed with the upper supervisory controller and three subcontrol systems on the Simulink platform. The network topology structure of IVC is proposed, and the IVC communication matrix based on CAN network communication is designed. With the common sensors and the subcontrollers as the CAN network independent nodes, the network induced delay and packet loss rate on the system control performance are studied by simulation. The results show that the simulation method can be used for designing the communication network of the vehicle.

  5. An Initial Load-Based Green Software Defined Network

    Directory of Open Access Journals (Sweden)

    Ying Hu

    2017-05-01

    Full Text Available Software defined network (SDN is a new network architecture in which the control function is decoupled from the data forwarding plane, that is attracting wide attentions from both research and industry sectors. However, SDN still faces the energy waste problem as do traditional networks. At present, research on energy saving in SDN is mainly focused on the static optimization of the network with zero load when new traffic arrives, changing the transmission path of the uncompleted traffic which arrived before the optimization, possibly resulting in route oscillation and other deleterious effects. To avoid this, a dynamical energy saving optimization scheme in which the paths of the uncompleted flows will not be changed when new traffic arrives is designed. To find the optimal solution for energy saving, the problem is modeled as a mixed integer linear programming (MILP problem. As the high complexity of the problem prohibits the optimal solution, an improved heuristic routing algorithm called improved constant weight greedy algorithm (ICWGA is proposed to find a sub-optimal solution. Simulation results show that the energy saving capacity of ICWGA is close to that of the optimal solution, offering desirable improvement in the energy efficiency of the network.

  6. A family of quantization based piecewise linear filter networks

    DEFF Research Database (Denmark)

    Sørensen, John Aasted

    1992-01-01

    A family of quantization-based piecewise linear filter networks is proposed. For stationary signals, a filter network from this family is a generalization of the classical Wiener filter with an input signal and a desired response. The construction of the filter network is based on quantization...... of the input signal x(n) into quantization classes. With each quantization class is associated a linear filter. The filtering at time n is carried out by the filter belonging to the actual quantization class of x(n ) and the filters belonging to the neighbor quantization classes of x(n) (regularization...

  7. Theory of fractional order elements based impedance matching networks

    KAUST Repository

    Radwan, Ahmed G.

    2011-03-01

    Fractional order circuit elements (inductors and capacitors) based impedance matching networks are introduced for the first time. In comparison to the conventional integer based L-type matching networks, fractional matching networks are much simpler and versatile. Any complex load can be matched utilizing a single series fractional element, which generally requires two elements for matching in the conventional approach. It is shown that all the Smith chart circles (resistance and reactance) are actually pairs of completely identical circles. They appear to be single for the conventional integer order case, where the identical circles completely overlap each other. The concept is supported by design equations and impedance matching examples. © 2010 IEEE.

  8. Hybrid Network Defense Model Based on Fuzzy Evaluation

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2014-01-01

    Full Text Available With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network’s existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter’s inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  9. A network-based approach to prioritize results from genome-wide association studies.

    Directory of Open Access Journals (Sweden)

    Nirmala Akula

    Full Text Available Genome-wide association studies (GWAS are a valuable approach to understanding the genetic basis of complex traits. One of the challenges of GWAS is the translation of genetic association results into biological hypotheses suitable for further investigation in the laboratory. To address this challenge, we introduce Network Interface Miner for Multigenic Interactions (NIMMI, a network-based method that combines GWAS data with human protein-protein interaction data (PPI. NIMMI builds biological networks weighted by connectivity, which is estimated by use of a modification of the Google PageRank algorithm. These weights are then combined with genetic association p-values derived from GWAS, producing what we call 'trait prioritized sub-networks.' As a proof of principle, NIMMI was tested on three GWAS datasets previously analyzed for height, a classical polygenic trait. Despite differences in sample size and ancestry, NIMMI captured 95% of the known height associated genes within the top 20% of ranked sub-networks, far better than what could be achieved by a single-locus approach. The top 2% of NIMMI height-prioritized sub-networks were significantly enriched for genes involved in transcription, signal transduction, transport, and gene expression, as well as nucleic acid, phosphate, protein, and zinc metabolism. All of these sub-networks were ranked near the top across all three height GWAS datasets we tested. We also tested NIMMI on a categorical phenotype, Crohn's disease. NIMMI prioritized sub-networks involved in B- and T-cell receptor, chemokine, interleukin, and other pathways consistent with the known autoimmune nature of Crohn's disease. NIMMI is a simple, user-friendly, open-source software tool that efficiently combines genetic association data with biological networks, translating GWAS findings into biological hypotheses.

  10. A Network-Based Approach to Prioritize Results from Genome-Wide Association Studies

    Science.gov (United States)

    Akula, Nirmala; Baranova, Ancha; Seto, Donald; Solka, Jeffrey; Nalls, Michael A.; Singleton, Andrew; Ferrucci, Luigi; Tanaka, Toshiko; Bandinelli, Stefania; Cho, Yoon Shin; Kim, Young Jin; Lee, Jong-Young; Han, Bok-Ghee; McMahon, Francis J.

    2011-01-01

    Genome-wide association studies (GWAS) are a valuable approach to understanding the genetic basis of complex traits. One of the challenges of GWAS is the translation of genetic association results into biological hypotheses suitable for further investigation in the laboratory. To address this challenge, we introduce Network Interface Miner for Multigenic Interactions (NIMMI), a network-based method that combines GWAS data with human protein-protein interaction data (PPI). NIMMI builds biological networks weighted by connectivity, which is estimated by use of a modification of the Google PageRank algorithm. These weights are then combined with genetic association p-values derived from GWAS, producing what we call ‘trait prioritized sub-networks.’ As a proof of principle, NIMMI was tested on three GWAS datasets previously analyzed for height, a classical polygenic trait. Despite differences in sample size and ancestry, NIMMI captured 95% of the known height associated genes within the top 20% of ranked sub-networks, far better than what could be achieved by a single-locus approach. The top 2% of NIMMI height-prioritized sub-networks were significantly enriched for genes involved in transcription, signal transduction, transport, and gene expression, as well as nucleic acid, phosphate, protein, and zinc metabolism. All of these sub-networks were ranked near the top across all three height GWAS datasets we tested. We also tested NIMMI on a categorical phenotype, Crohn’s disease. NIMMI prioritized sub-networks involved in B- and T-cell receptor, chemokine, interleukin, and other pathways consistent with the known autoimmune nature of Crohn’s disease. NIMMI is a simple, user-friendly, open-source software tool that efficiently combines genetic association data with biological networks, translating GWAS findings into biological hypotheses. PMID:21915301

  11. Implementation of Energy Efficiency Based on Time Scheduling to Improve Network Lifetime in Wireless Body Area Network (WBAN

    Directory of Open Access Journals (Sweden)

    Subono .

    2016-04-01

    Full Text Available ZigBee applications of IEEE 802.15.4 Wireless Sensor Network (WSN with Low Rate Wireless Personal Area Network (LR-WPAN can be integrated with e-health technology Wireless Body Area Network (WBAN. WBAN are small size and can communicate quickly making it easier for people to obtain information accurately.WBAN has a variety of functions that can help human life. It can be used in the e-health, military and sports. WBAN has the potential to be the future of wireless communication solutions. WBAN use battery as its primary power source. WBAN has limited energy and must be able to save energy consumption in order to operate for a long time. In this study, we propose a method of time scheduling called cycle sleep period (CSP as WBAN solutions to save energy and improve energy efficiency. The CSP method is implemented in the real hardware testbed using sensor e-health includes temperature body and current sensor. We compared the performance of CSP method with duty cycle management (DCM time scheduling-based and without using time scheduling.From the measurement results, our proposed idea has decreasingenergy consumption. Keywords: WSN, LR-WPAN, WBAN, e-health, Time Scheduling

  12. Grid-Based Hybrid Network Deployment Approach for Energy Efficient Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Haleem Farman

    2016-01-01

    Full Text Available Wireless sensor networks (WSN empower applications for critical decision-making through collaborative computing, communications, and distributed sensing. However, they face several challenges due to their peculiar use in a wide variety of applications. One of the inherent challenges with any battery operated sensor is the efficient consumption of energy and its effect on network lifetime. In this paper, we introduce a novel grid-based hybrid network deployment (GHND framework which ensures energy efficiency and load balancing in wireless sensor networks. This research is particularly focused on the merge and split technique to achieve even distribution of sensor nodes across the grid. Low density neighboring zones are merged together whereas high density zones are strategically split to achieve optimum balance. Extensive simulations reveal that the proposed method outperforms state-of-the-art techniques in terms of load balancing, network lifetime, and total energy consumption.

  13. Topological Embedding Feature Based Resource Allocation in Network Virtualization

    Directory of Open Access Journals (Sweden)

    Hongyan Cui

    2014-01-01

    Full Text Available Virtualization provides a powerful way to run multiple virtual networks on a shared substrate network, which needs accurate and efficient mathematical models. Virtual network embedding is a challenge in network virtualization. In this paper, considering the degree of convergence when mapping a virtual network onto substrate network, we propose a new embedding algorithm based on topology mapping convergence-degree. Convergence-degree means the adjacent degree of virtual network’s nodes when they are mapped onto a substrate network. The contributions of our method are as below. Firstly, we map virtual nodes onto the substrate nodes with the maximum convergence-degree. The simulation results show that our proposed algorithm largely enhances the network utilization efficiency and decreases the complexity of the embedding problem. Secondly, we define the load balance rate to reflect the load balance of substrate links. The simulation results show our proposed algorithm achieves better load balance. Finally, based on the feature of star topology, we further improve our embedding algorithm and make it suitable for application in the star topology. The test result shows it gets better performance than previous works.

  14. The competitive dynamics of network-based businesses.

    Science.gov (United States)

    Coyne, K P; Dye, R

    1998-01-01

    Telecommunications carriers, transportation companies, and banks are among the many network-based businesses--companies that move people, goods, or information from various points to various other points. Managers have long assumed that customers valued all links in these networks equally. It was thought that banking customers, for example, sought access to all of the branches throughout the network or that shipping customers wanted to be able to send packages everywhere. Intuitively, managers thought that many of their customers' needs were, in reality, narrower, but they had no way of knowing which links were most important. New computing power and robust mapping software now make it possible to understand network customers better. In applying this technology, the authors, both consultants from McKinsey & Company, have uncovered three distinct usage patterns: one in which all links are, indeed, valued equally; another in which customers concentrate their use in particular zones; and a third in which customers value only individual links. Each of these patterns requires a different strategy to direct executives in making the decisions fundamental to managing any network-based business: whether to open or close outlets, whether to connect their network to others, and how to organize business units so that they reflect the network's structure. Those who don't spot the patterns or understand their strategic implications will find themselves on the losing end of the network battle.

  15. Scenario-Based Case Study Method and the Functionality of the Section Called "From Production to Consumption" from the Perspective of Primary School Students

    Science.gov (United States)

    Taneri, Ahu

    2018-01-01

    In this research, the aim was showing the evaluation of students on scenario-based case study method and showing the functionality of the studied section called "from production to consumption". Qualitative research method and content analysis were used to reveal participants' experiences and reveal meaningful relations regarding…

  16. Spectral network based on component cells under the SOPHIA European project

    Energy Technology Data Exchange (ETDEWEB)

    Núñez, Rubén, E-mail: ruben.nunez@ies-def.upm.es; Antón, Ignacio; Askins, Steve; Sala, Gabriel [Instituto de Energía Solar - Universidad Politécnica de Madrid, Ciudad Universitaria, 28040 Madrid (Spain); Domínguez, César; Voarino, Philippe [CEA-INES, 50 avenue du Lac Léman, 73375 Le Bourget-du-Lac (France); Steiner, Marc; Siefer, Gerald [Fraunhofer ISE, Heidenhofstr. 2, 79110 Freiburg (Germany); Fucci, Rafaelle; Roca, Franco [ENEA, P.le E.Fermi 1, Località Granatello, 80055 Portici (Italy); Minuto, Alessandro; Morabito, Paolo [RSE, Via Rubattino 54, 20134 Milan (Italy)

    2015-09-28

    In the frame of the European project SOPHIA, a spectral network based on component (also called isotypes) cells has been created. Among the members of this project, several spectral sensors based on component cells and collimating tubes, so-called spectroheliometers, were installed in the last years, allowing the collection of minute-resolution spectral data useful for CPV systems characterization across Europe. The use of spectroheliometers has been proved useful to establish the necessary spectral conditions to perform power rating of CPV modules and systems. If enough data in a given period of time is collected, ideally a year, it is possible to characterize spectrally the place where measurements are taken, in the same way that hours of annual irradiation can be estimated using a pyrheliometer.

  17. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  18. Polyurethane networks based on poly (ethylene oxide)

    International Nuclear Information System (INIS)

    Zulfiqar, S.; Quddos, A.

    1993-01-01

    A wide range of infinite urethane polymer networks were prepared from poly (ethylene glycol) (PEG) and hexamethylene disocyanate (HMDI) using 1,1,1, tris (hydroxymethyl) ethane (THME) as crosslinking agent. Differential scanning calorimetry showed that the hydrate formation depends quantitatively upon the weight fraction on poly(ethylene oxide) in the gel. It has been shown that the crosslinked polyurethanes crystallize only with definite ranges of chain length between the knots. In this range with the increase of the degree of crosslinking and crystallinity on the swelling character of the polymeric materials has also been discussed. (author)

  19. Single Frequency Network Based Distributed Passive Radar Technology

    Directory of Open Access Journals (Sweden)

    Wan Xian-rong

    2015-01-01

    Full Text Available The research and application of passive radar are heading from single transmitter-receiver pair to multiple transmitter-receiver pairs. As an important class of the illuminators of opportunity, most of modern digital broadcasting and television systems work on Single Frequency Network (SFN, which intrinsically determines that the passive radar based on such illuminators must be distributed and networked. In consideration of the remarkable working and processing mode of passive radar under SFN configuration, this paper proposes the concept of SFN-based Distributed Passive Radar (SDPR. The main characteristics and key problems of SDPR are first described. Then several potential solutions are discussed for part of the key technologies. The feasibility of SDPR is demonstrated by preliminary experimental results. Finally, the concept of four network convergence that includes the broadcast based passive radar network is conceived, and its application prospects are discussed.

  20. Passivity-based control and estimation in networked robotics

    CERN Document Server

    Hatanaka, Takeshi; Fujita, Masayuki; Spong, Mark W

    2015-01-01

    Highlighting the control of networked robotic systems, this book synthesizes a unified passivity-based approach to an emerging cross-disciplinary subject. Thanks to this unified approach, readers can access various state-of-the-art research fields by studying only the background foundations associated with passivity. In addition to the theoretical results and techniques,  the authors provide experimental case studies on testbeds of robotic systems  including networked haptic devices, visual robotic systems,  robotic network systems and visual sensor network systems. The text begins with an introduction to passivity and passivity-based control together with the other foundations needed in this book. The main body of the book consists of three parts. The first examines how passivity can be utilized for bilateral teleoperation and demonstrates the inherent robustness of the passivity-based controller against communication delays. The second part emphasizes passivity’s usefulness for visual feedback control ...

  1. The conceptual foundations of network-based diffusion analysis: choosing networks and interpreting results.

    Science.gov (United States)

    Hoppitt, Will

    2017-12-05

    Network-based diffusion analysis (NBDA) is a statistical technique for detecting the social transmission of behavioural innovations in groups of animals, including humans. The strength of social transmission is inferred from the extent to which the diffusion (spread) of the innovation follows a social network. NBDA can have two goals: (a) to establish whether social transmission is occurring and how strong its effects are; and/or (b) to establish the typical pathways of information transfer. The technique has been used in a range of taxa, including primates, cetaceans, birds and fish, using a range of different types of network. Here I investigate the conceptual underpinnings of NBDA, in order to establish the meaning of results using different networks. I develop a model of the social transmission process where each individual observation of the target behaviour affects the rate at which the observer learns that behaviour. I then establish how NBDAs using different networks relate to this underlying process, and thus how we can interpret the results of each. My analysis shows that a different network or networks are appropriate depending on the specific goal or goals of the study, and establishes how the parameter estimates yielded from an NBDA can be interpreted for different networks.This article is part of the themed issue 'Process and pattern in innovations from cells to societies'. © 2017 The Author(s).

  2. Cooperative and Adaptive Network Coding for Gradient Based Routing in Wireless Sensor Networks with Multiple Sinks

    Directory of Open Access Journals (Sweden)

    M. E. Migabo

    2017-01-01

    Full Text Available Despite its low computational cost, the Gradient Based Routing (GBR broadcast of interest messages in Wireless Sensor Networks (WSNs causes significant packets duplications and unnecessary packets transmissions. This results in energy wastage, traffic load imbalance, high network traffic, and low throughput. Thanks to the emergence of fast and powerful processors, the development of efficient network coding strategies is expected to enable efficient packets aggregations and reduce packets retransmissions. For multiple sinks WSNs, the challenge consists of efficiently selecting a suitable network coding scheme. This article proposes a Cooperative and Adaptive Network Coding for GBR (CoAdNC-GBR technique which considers the network density as dynamically defined by the average number of neighbouring nodes, to efficiently aggregate interest messages. The aggregation is performed by means of linear combinations of random coefficients of a finite Galois Field of variable size GF(2S at each node and the decoding is performed by means of Gaussian elimination. The obtained results reveal that, by exploiting the cooperation of the multiple sinks, the CoAdNC-GBR not only improves the transmission reliability of links and lowers the number of transmissions and the propagation latency, but also enhances the energy efficiency of the network when compared to the GBR-network coding (GBR-NC techniques.

  3. Fault Tolerant Mechanism for Multimedia Flows in Wireless Ad Hoc Networks Based on Fast Switching Paths

    Directory of Open Access Journals (Sweden)

    Juan R. Diaz

    2014-01-01

    Full Text Available Multimedia traffic can be forwarded through a wireless ad hoc network using the available resources of the nodes. Several models and protocols have been designed in order to organize and arrange the nodes to improve transmissions along the network. We use a cluster-based framework, called MWAHCA architecture, which optimizes multimedia transmissions over a wireless ad hoc network. It was proposed by us in a previous research work. This architecture is focused on decreasing quality of service (QoS parameters like latency, jitter, and packet loss, but other network features were not developed, like load balance or fault tolerance. In this paper, we propose a new fault tolerance mechanism, using as a base the MWAHCA architecture, in order to recover any multimedia flow crossing the wireless ad hoc network when there is a node failure. The algorithm can run independently for each multimedia flow. The main objective is to keep the QoS parameters as low as possible. To achieve this goal, the convergence time must be controlled and reduced. This paper provides the designed protocol, the analytical model of the algorithm, and a software application developed to test its performance in a real laboratory.

  4. Price-based Energy Control for V2G Networks in the Industrial Smart Grid

    Directory of Open Access Journals (Sweden)

    Rong Yu

    2015-08-01

    Full Text Available The energy crisis and global warming call for a new industrial revolution in production and distribution of renewable energy. Distributed power generation will be well developed in the new smart electricity distribution grid, in which robust power distribution will be the key technology. In this paper, we present a new vehicle-to-grid (V2G network for energy transfer, in which distributed renewable energy helps the power grid balance demand and supply. Plug-in hybrid electric vehicles (PHEVs will act as transporters of electricity for distributed renewable energy dispatching. We formulate and analyze the V2G network within the theoretical framework of complex network. We also employ the generalized synchronization method to study the dynamic behavior of V2G networks. Furthermore, we develop a new price-based energy control method to stimulate the PHEV's behavior of charging and discharging. Simulation results indicate that the V2G network can achieve synchronization and each region is able to balance energy supply and demand through price-based control.

  5. FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Zhan Wei Siew

    2012-12-01

    Full Text Available Wireless sensor networks (WSNs have been vastly developed due to the advances in microelectromechanical systems (MEMS using WSN to study and monitor the environments towards climates changes. In environmental monitoring, sensors are randomly deployed over the interest area to periodically sense the physical environments for a few months or even a year. Therefore, to prolong the network lifetime with limited battery capacity becomes a challenging issue. Low energy adaptive cluster hierarchical (LEACH is the common clustering protocol that aim to reduce the energy consumption by rotating the heavy workload cluster heads (CHs. The CHs election in LEACH is based on probability model which will lead to inefficient in energy consumption due to least desired CHs location in the network. In WSNs, the CHs location can directly influence the network energy consumption and further affect the network lifetime. In this paper, factors which will affect the network lifetime will be presented and the demonstration of fuzzy logic based CH selection conducted in base station (BS will also be carried out. To select suitable CHs that will prolong the network first node dies (FND round and consistent throughput to the BS, energy level and distance to the BS are selected as fuzzy inputs.

  6. CD-Based Indices for Link Prediction in Complex Network.

    Directory of Open Access Journals (Sweden)

    Tao Wang

    Full Text Available Lots of similarity-based algorithms have been designed to deal with the problem of link prediction in the past decade. In order to improve prediction accuracy, a novel cosine similarity index CD based on distance between nodes and cosine value between vectors is proposed in this paper. Firstly, node coordinate matrix can be obtained by node distances which are different from distance matrix and row vectors of the matrix are regarded as coordinates of nodes. Then, cosine value between node coordinates is used as their similarity index. A local community density index LD is also proposed. Then, a series of CD-based indices include CD-LD-k, CD*LD-k, CD-k and CDI are presented and applied in ten real networks. Experimental results demonstrate the effectiveness of CD-based indices. The effects of network clustering coefficient and assortative coefficient on prediction accuracy of indices are analyzed. CD-LD-k and CD*LD-k can improve prediction accuracy without considering the assortative coefficient of network is negative or positive. According to analysis of relative precision of each method on each network, CD-LD-k and CD*LD-k indices have excellent average performance and robustness. CD and CD-k indices perform better on positive assortative networks than on negative assortative networks. For negative assortative networks, we improve and refine CD index, referred as CDI index, combining the advantages of CD index and evolutionary mechanism of the network model BA. Experimental results reveal that CDI index can increase prediction accuracy of CD on negative assortative networks.

  7. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  8. GENETIC ALGORITHM BASED CONCEPT DESIGN TO OPTIMIZE NETWORK LOAD BALANCE

    Directory of Open Access Journals (Sweden)

    Ashish Jain

    2012-07-01

    Full Text Available Multiconstraints optimal network load balancing is an NP-hard problem and it is an important part of traffic engineering. In this research we balance the network load using classical method (brute force approach and dynamic programming is used but result shows the limitation of this method but at a certain level we recognized that the optimization of balanced network load with increased number of nodes and demands is intractable using the classical method because the solution set increases exponentially. In such case the optimization techniques like evolutionary techniques can employ for optimizing network load balance. In this paper we analyzed proposed classical algorithm and evolutionary based genetic approach is devise as well as proposed in this paper for optimizing the balance network load.

  9. Incentive-Based Voltage Regulation in Distribution Networks

    Energy Technology Data Exchange (ETDEWEB)

    Dall-Anese, Emiliano [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Baker, Kyri A [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Zhou, Xinyang [University of Colorado; Chen, Lijun [University of Colorado

    2017-07-03

    This paper considers distribution networks fea- turing distributed energy resources, and designs incentive-based mechanisms that allow the network operator and end-customers to pursue given operational and economic objectives, while concurrently ensuring that voltages are within prescribed limits. Two different network-customer coordination mechanisms that require different amounts of information shared between the network operator and end-customers are developed to identify a solution of a well-defined social-welfare maximization prob- lem. Notably, the signals broadcast by the network operator assume the connotation of prices/incentives that induce the end- customers to adjust the generated/consumed powers in order to avoid the violation of the voltage constraints. Stability of the proposed schemes is analytically established and numerically corroborated.

  10. Adaptive Control for Robotic Manipulators Base on RBF Neural Network

    Directory of Open Access Journals (Sweden)

    MA Jing

    2013-09-01

    Full Text Available An adaptive neural network controller is brought forward by the paper to solve trajectory tracking problems of robotic manipulators with uncertainties. The first scheme consists of a PD feedback and a dynamic compensator which is composed by neural network controller and variable structure controller. Neutral network controller is designed to adaptive learn and compensate the unknown uncertainties, variable structure controller is designed to eliminate approach errors of neutral network. The adaptive weight learning algorithm of neural network is designed to ensure online real-time adjustment, offline learning phase is not need; Global asymptotic stability (GAS of system base on Lyapunov theory is analysised to ensure the convergence of the algorithm. The simulation result s show that the kind of the control scheme is effective and has good robustness.

  11. Incentive-Based Voltage Regulation in Distribution Networks: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Xinyang; Chen, Lijun; Dall' Anese, Emiliano; Baker, Kyri

    2017-03-03

    This paper considers distribution networks fea- turing distributed energy resources, and designs incentive-based mechanisms that allow the network operator and end-customers to pursue given operational and economic objectives, while concurrently ensuring that voltages are within prescribed limits. Two different network-customer coordination mechanisms that require different amounts of information shared between the network operator and end-customers are developed to identify a solution of a well-defined social-welfare maximization prob- lem. Notably, the signals broadcast by the network operator assume the connotation of prices/incentives that induce the end- customers to adjust the generated/consumed powers in order to avoid the violation of the voltage constraints. Stability of the proposed schemes is analytically established and numerically corroborated.

  12. Development of Novel Random Network Theory-Based Approaches to Identify Network Interactions among Nitrifying Bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Shi, Cindy

    2015-07-17

    The interactions among different microbial populations in a community could play more important roles in determining ecosystem functioning than species numbers and their abundances, but very little is known about such network interactions at a community level. The goal of this project is to develop novel framework approaches and associated software tools to characterize the network interactions in microbial communities based on high throughput, large scale high-throughput metagenomics data and apply these approaches to understand the impacts of environmental changes (e.g., climate change, contamination) on network interactions among different nitrifying populations and associated microbial communities.

  13. Revisiting random walk based sampling in networks: evasion of burn-in period and frequent regenerations.

    Science.gov (United States)

    Avrachenkov, Konstantin; Borkar, Vivek S; Kadavankandy, Arun; Sreedharan, Jithin K

    2018-01-01

    In the framework of network sampling, random walk (RW) based estimation techniques provide many pragmatic solutions while uncovering the unknown network as little as possible. Despite several theoretical advances in this area, RW based sampling techniques usually make a strong assumption that the samples are in stationary regime, and hence are impelled to leave out the samples collected during the burn-in period. This work proposes two sampling schemes without burn-in time constraint to estimate the average of an arbitrary function defined on the network nodes, for example, the average age of users in a social network. The central idea of the algorithms lies in exploiting regeneration of RWs at revisits to an aggregated super-node or to a set of nodes, and in strategies to enhance the frequency of such regenerations either by contracting the graph or by making the hitting set larger. Our first algorithm, which is based on reinforcement learning (RL), uses stochastic approximation to derive an estimator. This method can be seen as intermediate between purely stochastic Markov chain Monte Carlo iterations and deterministic relative value iterations. The second algorithm, which we call the Ratio with Tours (RT)-estimator, is a modified form of respondent-driven sampling (RDS) that accommodates the idea of regeneration. We study the methods via simulations on real networks. We observe that the trajectories of RL-estimator are much more stable than those of standard random walk based estimation procedures, and its error performance is comparable to that of respondent-driven sampling (RDS) which has a smaller asymptotic variance than many other estimators. Simulation studies also show that the mean squared error of RT-estimator decays much faster than that of RDS with time. The newly developed RW based estimators (RL- and RT-estimators) allow to avoid burn-in period, provide better control of stability along the sample path, and overall reduce the estimation time. Our

  14. Constructing financial network based on PMFG and threshold method

    Science.gov (United States)

    Nie, Chun-Xiao; Song, Fu-Tie

    2018-04-01

    Based on planar maximally filtered graph (PMFG) and threshold method, we introduced a correlation-based network named PMFG-based threshold network (PTN). We studied the community structure of PTN and applied ISOMAP algorithm to represent PTN in low-dimensional Euclidean space. The results show that the community corresponds well to the cluster in the Euclidean space. Further, we studied the dynamics of the community structure and constructed the normalized mutual information (NMI) matrix. Based on the real data in the market, we found that the volatility of the market can lead to dramatic changes in the community structure, and the structure is more stable during the financial crisis.

  15. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  16. A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark

    Directory of Open Access Journals (Sweden)

    Yong Wang

    2016-02-01

    Full Text Available Currently, with the rapid increasing of data scales in network traffic classifications, how to select traffic features efficiently is becoming a big challenge. Although a number of traditional feature selection methods using the Hadoop-MapReduce framework have been proposed, the execution time was still unsatisfactory with numeral iterative computations during the processing. To address this issue, an efficient feature selection method for network traffic based on a new parallel computing framework called Spark is proposed in this paper. In our approach, the complete feature set is firstly preprocessed based on Fisher score, and a sequential forward search strategy is employed for subsets. The optimal feature subset is then selected using the continuous iterations of the Spark computing framework. The implementation demonstrates that, on the precondition of keeping the classification accuracy, our method reduces the time cost of modeling and classification, and improves the execution efficiency of feature selection significantly.

  17. Predictive model for determining the quality of a call

    Science.gov (United States)

    Voznak, M.; Rozhon, J.; Partila, P.; Safarik, J.; Mikulec, M.; Mehic, M.

    2014-05-01

    In this paper the predictive model for speech quality estimation is described. This model allows its user to gain the information about the speech quality in VoIP networks without the need of performing the actual call and the consecutive time consuming sound file evaluation. This rapidly increases usability of the speech quality measurement especially in high load networks, where the actual processing of all calls is rendered difficult or even impossible. This model can reach its results that are highly conformant with the PESQ algorithm only based on the network state parameters that are easily obtainable by the commonly used software tools. Experiments were carried out to investigate whether different languages (English, Czech) have an effect on perceived voice quality for the same network conditions and the language factor was incorporated directly into the model.

  18. Neural Network Based Indexing and Recognition of Power Quality Disturbances

    Directory of Open Access Journals (Sweden)

    Ram Awtar Gupta

    2011-08-01

    Full Text Available Power quality (PQ analysis has become imperative for utilities as well as for consumers due to huge cost burden of poor power quality. Accurate recognition of PQ disturbances is still a challenging task, whereas methods for its indexing are not much investigated yet. This paper expounds a system, which includes generation of unique patterns called signatures of various PQ disturbances using continuous wavelet transform (CWT and recognition of these signatures using feed-forward neural network. It is also corroborated that the size of signatures of PQ disturbances are proportional to its magnitude, so this feature of the signature is used for indexing the level of PQ disturbance in three sub-classes viz. high, medium, and low. Further, the effect of number of neurons used by neural network on the performance of recognition is also analyzed. Almost 100% accuracy of recognition substantiates the effectiveness of the proposed system.

  19. Quantum-dot based photonic quantum networks

    Science.gov (United States)

    Lodahl, Peter

    2018-01-01

    Quantum dots (QDs) embedded in photonic nanostructures have in recent years proven to be a very powerful solid-state platform for quantum optics experiments. The combination of near-unity radiative coupling of a single QD to a photonic mode and the ability to eliminate decoherence processes imply that an unprecedent light-matter interface can be obtained. As a result, high-cooperativity photon-emitter quantum interfaces can be constructed opening a path-way to deterministic photonic quantum gates for quantum-information processing applications. In the present manuscript, I review current state-of-the-art on QD devices and their applications for quantum technology. The overarching long-term goal of the research field is to construct photonic quantum networks where remote entanglement can be distributed over long distances by photons.

  20. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  1. Parrondo's games based on complex networks and the paradoxical effect.

    Directory of Open Access Journals (Sweden)

    Ye Ye

    Full Text Available Parrondo's games were first constructed using a simple tossing scenario, which demonstrates the following paradoxical situation: in sequences of games, a winning expectation may be obtained by playing the games in a random order, although each game (game A or game B in the sequence may result in losing when played individually. The available Parrondo's games based on the spatial niche (the neighboring environment are applied in the regular networks. The neighbors of each node are the same in the regular graphs, whereas they are different in the complex networks. Here, Parrondo's model based on complex networks is proposed, and a structure of game B applied in arbitrary topologies is constructed. The results confirm that Parrondo's paradox occurs. Moreover, the size of the region of the parameter space that elicits Parrondo's paradox depends on the heterogeneity of the degree distributions of the networks. The higher heterogeneity yields a larger region of the parameter space where the strong paradox occurs. In addition, we use scale-free networks to show that the network size has no significant influence on the region of the parameter space where the strong or weak Parrondo's paradox occurs. The region of the parameter space where the strong Parrondo's paradox occurs reduces slightly when the average degree of the network increases.

  2. Parrondo's games based on complex networks and the paradoxical effect.

    Science.gov (United States)

    Ye, Ye; Wang, Lu; Xie, Nenggang

    2013-01-01

    Parrondo's games were first constructed using a simple tossing scenario, which demonstrates the following paradoxical situation: in sequences of games, a winning expectation may be obtained by playing the games in a random order, although each game (game A or game B) in the sequence may result in losing when played individually. The available Parrondo's games based on the spatial niche (the neighboring environment) are applied in the regular networks. The neighbors of each node are the same in the regular graphs, whereas they are different in the complex networks. Here, Parrondo's model based on complex networks is proposed, and a structure of game B applied in arbitrary topologies is constructed. The results confirm that Parrondo's paradox occurs. Moreover, the size of the region of the parameter space that elicits Parrondo's paradox depends on the heterogeneity of the degree distributions of the networks. The higher heterogeneity yields a larger region of the parameter space where the strong paradox occurs. In addition, we use scale-free networks to show that the network size has no significant influence on the region of the parameter space where the strong or weak Parrondo's paradox occurs. The region of the parameter space where the strong Parrondo's paradox occurs reduces slightly when the average degree of the network increases.

  3. Node-Dependence-Based Dynamic Incentive Algorithm in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Ruiyun Yu

    2014-01-01

    Full Text Available Opportunistic networks lack end-to-end paths between source nodes and destination nodes, so the communications are mainly carried out by the “store-carry-forward” strategy. Selfish behaviors of rejecting packet relay requests will severely worsen the network performance. Incentive is an efficient way to reduce selfish behaviors and hence improves the reliability and robustness of the networks. In this paper, we propose the node-dependence-based dynamic gaming incentive (NDI algorithm, which exploits the dynamic repeated gaming to motivate nodes relaying packets for other nodes. The NDI algorithm presents a mechanism of tolerating selfish behaviors of nodes. Reward and punishment methods are also designed based on the node dependence degree. Simulation results show that the NDI algorithm is effective in increasing the delivery ratio and decreasing average latency when there are a lot of selfish nodes in the opportunistic networks.

  4. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self......Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...

  5. Morphometric relations of fractal-skeletal based channel network model

    Directory of Open Access Journals (Sweden)

    B. S. Daya Sagar

    1998-01-01

    Full Text Available A fractal-skeletal based channel network (F-SCN model is proposed. Four regular sided initiator-basins are transformed as second order fractal basins by following a specific generating mechanism with non-random rule. The morphological skeletons, hereafter referred to as channel networks, are extracted from these fractal basins. The morphometric and fractal relationships of these F-SCNs are shown. The fractal dimensions of these fractal basins, channel networks, and main channel lengths (computed through box counting method are compared with those of estimated length–area measures. Certain morphometric order ratios to show fractal relations are also highlighted.

  6. Facial expression recognition based on improved deep belief networks

    Science.gov (United States)

    Wu, Yao; Qiu, Weigen

    2017-08-01

    In order to improve the robustness of facial expression recognition, a method of face expression recognition based on Local Binary Pattern (LBP) combined with improved deep belief networks (DBNs) is proposed. This method uses LBP to extract the feature, and then uses the improved deep belief networks as the detector and classifier to extract the LBP feature. The combination of LBP and improved deep belief networks is realized in facial expression recognition. In the JAFFE (Japanese Female Facial Expression) database on the recognition rate has improved significantly.

  7. Water Pollution Detection Based on Hypothesis Testing in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xu Luo

    2017-01-01

    Full Text Available Water pollution detection is of great importance in water conservation. In this paper, the water pollution detection problems of the network and of the node in sensor networks are discussed. The detection problems in both cases of the distribution of the monitoring noise being normal and nonnormal are considered. The pollution detection problems are analyzed based on hypothesis testing theory firstly; then, the specific detection algorithms are given. Finally, two implementation examples are given to illustrate how the proposed detection methods are used in the water pollution detection in sensor networks and prove the effectiveness of the proposed detection methods.

  8. Bulk Restoration for SDN-Based Transport Network

    Directory of Open Access Journals (Sweden)

    Yang Zhao

    2016-01-01

    Full Text Available We propose a bulk restoration scheme for software defined networking- (SDN- based transport network. To enhance the network survivability and improve the throughput, we allow disrupted flows to be recovered synchronously in dynamic order. In addition backup paths are scheduled globally by applying the principles of load balance. We model the bulk restoration problem using a mixed integer linear programming (MILP formulation. Then, a heuristic algorithm is devised. The proposed algorithm is verified by simulation and the results are analyzed comparing with sequential restoration schemes.

  9. Density-based and transport-based core-periphery structures in networks.

    Science.gov (United States)

    Lee, Sang Hoon; Cucuringu, Mihai; Porter, Mason A

    2014-03-01

    Networks often possess mesoscale structures, and studying them can yield insights into both structure and function. It is most common to study community structure, but numerous other types of mesoscale structures also exist. In this paper, we examine core-periphery structures based on both density and transport. In such structures, core network components are well-connected both among themselves and to peripheral components, which are not well-connected to anything. We examine core-periphery structures in a wide range of examples of transportation, social, and financial networks-including road networks in large urban areas, a rabbit warren, a dolphin social network, a European interbank network, and a migration network between counties in the United States. We illustrate that a recently developed transport-based notion of node coreness is very useful for characterizing transportation networks. We also generalize this notion to examine core versus peripheral edges, and we show that the resulting diagnostic is also useful for transportation networks. To examine the properties of transportation networks further, we develop a family of generative models of roadlike networks. We illustrate the effect of the dimensionality of the embedding space on transportation networks, and we demonstrate that the correlations between different measures of coreness can be very different for different types of networks.

  10. Carrier ethernet network control plane based on the Next Generation Network

    DEFF Research Database (Denmark)

    Fu, Rong; Wang, Yanmeng; Berger, Michael Stubert

    2008-01-01

    architecture. The approaches to QoS mapping, label distribution and connection and admission control (CAC) are specified here. At last, a simple T-MPLS based Carrier Ethernet network model with three kinds of users (VoIP, VoD and HTTP) and a RACE based control module is simulated in OPNET. The model is aiming...

  11. Research on Fault Diagnosis Method Based on Rule Base Neural Network

    Directory of Open Access Journals (Sweden)

    Zheng Ni

    2017-01-01

    Full Text Available The relationship between fault phenomenon and fault cause is always nonlinear, which influences the accuracy of fault location. And neural network is effective in dealing with nonlinear problem. In order to improve the efficiency of uncertain fault diagnosis based on neural network, a neural network fault diagnosis method based on rule base is put forward. At first, the structure of BP neural network is built and the learning rule is given. Then, the rule base is built by fuzzy theory. An improved fuzzy neural construction model is designed, in which the calculated methods of node function and membership function are also given. Simulation results confirm the effectiveness of this method.

  12. PRIORITY BASED PACKET SCHEDULING APPROACH FOR WIRELESS SENSOR NETWORKS

    OpenAIRE

    K. K. Kannan

    2017-01-01

    A priority based packet scheduling scheme is proposed which aims at scheduling different types of data packets, such as real time and non-real-time data packets at sensor nodes with resource constraints in Wireless Sensor Networks. Most of the existing packet-scheduling mechanisms of Wireless Sensor Networks use First Come First Served (FCFS), non-preemptive priority and preemptive priority scheduling algorithms. These algorithms results in long end-to-end data transmission delay, high energy...

  13. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  14. Cooperative Technique Based on Sensor Selection in Wireless Sensor Network

    OpenAIRE

    ISLAM, M. R.; KIM, J.

    2009-01-01

    An energy efficient cooperative technique is proposed for the IEEE 1451 based Wireless Sensor Networks. Selected numbers of Wireless Transducer Interface Modules (WTIMs) are used to form a Multiple Input Single Output (MISO) structure wirelessly connected with a Network Capable Application Processor (NCAP). Energy efficiency and delay of the proposed architecture are derived for different combination of cluster size and selected number of WTIMs. Optimized constellation parameters are used for...

  15. Novel gas sensors based on carbon nanotube networks

    International Nuclear Information System (INIS)

    Sayago, I; Aleixandre, M; Horrillo, M C; Fernandez, M J; Gutierrez, J; Terrado, E; Lafuente, E; Maser, W K; Benito, A M; Martinez, M T; Munoz, E; Urriolabeitia, E P; Navarro, R

    2008-01-01

    Novel resistive gas sensors based on single-walled carbon nanotube (SWNT) networks as the active sensing element nave been investigated for gas detection. SWNTs networks were fabricated by airbrushing on alumina substrates. As-produced- and Pd-decorated SWNT materials were used as sensitive layers for the detection of NO 2 and H 2 , respectively. The studied sensors provided good response to NO 2 and H 2 as well as excellent selectivities to interfering gases.

  16. A Proposal for Kelly CriterionBased Lossy Network Compression

    Science.gov (United States)

    2016-03-01

    Criterion–Based Lossy Network Compression Sidney C Smith and Robert J Hammell II ARL-TR-7614 Approved for public release; distribution is unlimited...mail.mil>. This proposal describes the development of a Kelly criterion–inspired compression algorithm to be used in distributed network intrusion...detection applications. Most of these applications only send alerts to the central analysis servers. These alerts do not provide the forensic capability

  17. Strengthening regional innovation through network-based innovation brokering

    OpenAIRE

    Svare, Helge; Gausdal, Anne Haugen

    2015-01-01

    The primary objective of this paper is to demonstrate how regional innovation system theory may be translated into manageable micro-level methods with the potential for strengthening the productive dynamics of a regional innovation system. The paper meets this objective by presenting network-based innovation brokering (NBIB), a practical method designed using insights from regional innovation system theory and trust theory. Five cases from two Norwegian regional innovation networks show that ...

  18. Organizational Data Classification Based on the Importance Concept of Complex Networks.

    Science.gov (United States)

    Carneiro, Murillo Guimaraes; Zhao, Liang

    2017-08-01

    Data classification is a common task, which can be performed by both computers and human beings. However, a fundamental difference between them can be observed: computer-based classification considers only physical features (e.g., similarity, distance, or distribution) of input data; by contrast, brain-based classification takes into account not only physical features, but also the organizational structure of data. In this paper, we figure out the data organizational structure for classification using complex networks constructed from training data. Specifically, an unlabeled instance is classified by the importance concept characterized by Google's PageRank measure of the underlying data networks. Before a test data instance is classified, a network is constructed from vector-based data set and the test instance is inserted into the network in a proper manner. To this end, we also propose a measure, called spatio-structural differential efficiency, to combine the physical and topological features of the input data. Such a method allows for the classification technique to capture a variety of data patterns using the unique importance measure. Extensive experiments demonstrate that the proposed technique has promising predictive performance on the detection of heart abnormalities.

  19. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-08-08

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs.

  20. Data Dissemination Based on Fuzzy Logic and Network Coding in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Tang

    2017-01-01

    Full Text Available Vehicular networks, as a significant technology in intelligent transportation systems, improve the convenience, efficiency, and safety of driving in smart cities. However, because of the high velocity, the frequent topology change, and the limited bandwidth, it is difficult to efficiently propagate data in vehicular networks. This paper proposes a data dissemination scheme based on fuzzy logic and network coding for vehicular networks, named SFN. It uses fuzzy logic to compute a transmission ability for each vehicle by comprehensively considering the effects of three factors: the velocity change rate, the velocity optimization degree, and the channel quality. Then, two nodes with high abilities are selected as primary backbone and slave backbone in every road segment, which propagate data to other vehicles in this segment and forward them to the backbones in the next segment. The backbone network helps to increase the delivery ratio and avoid invalid transmissions. Additionally, network coding is utilized to reduce transmission overhead and accelerate data retransmission in interbackbone forwarding and intrasegment broadcasting. Experiments show that, compared with existing schemes, SFN has a high delivery ratio and a short dissemination delay, while the backbone network keeps high reliability.

  1. A network security situation prediction model based on wavelet neural network with optimized parameters

    Directory of Open Access Journals (Sweden)

    Haibo Zhang

    2016-08-01

    Full Text Available The security incidents ion networks are sudden and uncertain, it is very hard to precisely predict the network security situation by traditional methods. In order to improve the prediction accuracy of the network security situation, we build a network security situation prediction model based on Wavelet Neural Network (WNN with optimized parameters by the Improved Niche Genetic Algorithm (INGA. The proposed model adopts WNN which has strong nonlinear ability and fault-tolerance performance. Also, the parameters for WNN are optimized through the adaptive genetic algorithm (GA so that WNN searches more effectively. Considering the problem that the adaptive GA converges slowly and easily turns to the premature problem, we introduce a novel niche technology with a dynamic fuzzy clustering and elimination mechanism to solve the premature convergence of the GA. Our final simulation results show that the proposed INGA-WNN prediction model is more reliable and effective, and it achieves faster convergence-speed and higher prediction accuracy than the Genetic Algorithm-Wavelet Neural Network (GA-WNN, Genetic Algorithm-Back Propagation Neural Network (GA-BPNN and WNN.

  2. Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

    Directory of Open Access Journals (Sweden)

    M. Mazhar U. Rathore

    2015-07-01

    Full Text Available VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN. In some countries, like Pakistan, the commercial usage of VoIP is prohibited. Internet service providers (ISPs and telecommunication authorities are interested in detecting VoIP calls to either block or prioritize them. So detection of VoIP calls is important for both types of authorities. Signature-based, port-based, and pattern-based VoIP detection techniques are inefficient due to complex and confidential security and tunneling mechanisms used by VoIP. In this paper, we propose a generic, robust, efficient, and practically implementable statistical analysis-based solution to identify encrypted, non-encrypted, or tunneled VoIP media (voice flows using threshold values of flow statistical parameters. We have made a comparison with existing techniques and evaluated our system with respect to accuracy and efficiency. Our system has 97.54% direct rate and .00015% false positive rate.

  3. Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks

    Science.gov (United States)

    Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios

    2015-01-01

    Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate. PMID:25658394

  4. Learning Control Over Emotion Networks Through Connectivity-Based Neurofeedback.

    Science.gov (United States)

    Koush, Yury; Meskaldji, Djalel-E; Pichon, Swann; Rey, Gwladys; Rieger, Sebastian W; Linden, David E J; Van De Ville, Dimitri; Vuilleumier, Patrik; Scharnowski, Frank

    2017-02-01

    Most mental functions are associated with dynamic interactions within functional brain networks. Thus, training individuals to alter functional brain networks might provide novel and powerful means to improve cognitive performance and emotions. Using a novel connectivity-neurofeedback approach based on functional magnetic resonance imaging (fMRI), we show for the first time that participants can learn to change functional brain networks. Specifically, we taught participants control over a key component of the emotion regulation network, in that they learned to increase top-down connectivity from the dorsomedial prefrontal cortex, which is involved in cognitive control, onto the amygdala, which is involved in emotion processing. After training, participants successfully self-regulated the top-down connectivity between these brain areas even without neurofeedback, and this was associated with concomitant increases in subjective valence ratings of emotional stimuli of the participants. Connectivity-based neurofeedback goes beyond previous neurofeedback approaches, which were limited to training localized activity within a brain region. It allows to noninvasively and nonpharmacologically change interconnected functional brain networks directly, thereby resulting in specific behavioral changes. Our results demonstrate that connectivity-based neurofeedback training of emotion regulation networks enhances emotion regulation capabilities. This approach can potentially lead to powerful therapeutic emotion regulation protocols for neuropsychiatric disorders. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  5. Chain-based communication in cylindrical underwater wireless sensor networks.

    Science.gov (United States)

    Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios

    2015-02-04

    Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate.

  6. Implementation of neural network based non-linear predictive control

    DEFF Research Database (Denmark)

    Sørensen, Paul Haase; Nørgård, Peter Magnus; Ravn, Ole

    1999-01-01

    This paper describes a control method for non-linear systems based on generalized predictive control. Generalized predictive control (GPC) was developed to control linear systems, including open-loop unstable and non-minimum phase systems, but has also been proposed to be extended for the control...... of non-linear systems. GPC is model based and in this paper we propose the use of a neural network for the modeling of the system. Based on the neural network model, a controller with extended control horizon is developed and the implementation issues are discussed, with particular emphasis...

  7. Implementation of neural network based non-linear predictive

    DEFF Research Database (Denmark)

    Sørensen, Paul Haase; Nørgård, Peter Magnus; Ravn, Ole

    1998-01-01

    The paper describes a control method for non-linear systems based on generalized predictive control. Generalized predictive control (GPC) was developed to control linear systems including open loop unstable and non-minimum phase systems, but has also been proposed extended for the control of non-linear...... systems. GPC is model-based and in this paper we propose the use of a neural network for the modeling of the system. Based on the neural network model a controller with extended control horizon is developed and the implementation issues are discussed, with particular emphasis on an efficient Quasi...

  8. Power Network Fault Diagnosis Based on Multi - source Network Message Data

    Science.gov (United States)

    Li, Peng; Wen, Bo; Li, Hengheng; Li, Jin

    2018-01-01

    In the event of a grid failure, the network message data (SMV, GOOSE) contains all the information about the primary and secondary devices. The amount of information data is large, and it is difficult for the personnel to make a quick and accurate judgment about the fault type from the massive data, affecting fault handling and safe grid operation. In this paper, modeling is unified based on network message data about the primary equipment. The comprehensive data analysis between multiple substations can be achieved by acquiring alarm information, network message information and wave recording information through network message analysis devices; meanwhile, the longitudinal differential principle is applied to fault diagnosis, which can realize accurate fault diagnosis of power grid, and provide data basis for accident treatment.

  9. A new type of coil structure called pan-shaped coil of wireless charging system based on magnetic resonance

    Science.gov (United States)

    Yue, Z. K.; Liu, Z. Z.; Hou, Y. J.; Zeng, H.; Liang, L. H.; Cui, S.

    2017-11-01

    The problem that misalignment between the transmitting coil and the receiving coil significantly impairs the transmission power and efficiency of the system has been attached more and more attention. In order to improve the uniformity of the magnetic field between the two coils to solve this problem, a new type of coil called pan-shaped coil is proposed. Three-dimension simulation models of the planar-core coil and the pan-shaped coil are established using Ansoft Maxwell software. The coupling coefficient between the transmitting coil and the receiving coil is obtained by simulating the magnetic field with the receiving coil misalignment or not. And the maximum percentage difference strength along the radial direction which is defined as the magnetic field uniformity factor is calculated. According to the simulation results of the two kinds of coil structures, it is found that the new type of coil structure can obviously improve the uniformity of the magnetic field, coupling coefficient and power transmission properties between the transmitting coil and the receiving coil.

  10. Optical Calibration Process Developed for Neural-Network-Based Optical Nondestructive Evaluation Method

    Science.gov (United States)

    Decker, Arthur J.

    2004-01-01

    A completely optical calibration process has been developed at Glenn for calibrating a neural-network-based nondestructive evaluation (NDE) method. The NDE method itself detects very small changes in the characteristic patterns or vibration mode shapes of vibrating structures as discussed in many references. The mode shapes or characteristic patterns are recorded using television or electronic holography and change when a structure experiences, for example, cracking, debonds, or variations in fastener properties. An artificial neural network can be trained to be very sensitive to changes in the mode shapes, but quantifying or calibrating that sensitivity in a consistent, meaningful, and deliverable manner has been challenging. The standard calibration approach has been difficult to implement, where the response to damage of the trained neural network is compared with the responses of vibration-measurement sensors. In particular, the vibration-measurement sensors are intrusive, insufficiently sensitive, and not numerous enough. In response to these difficulties, a completely optical alternative to the standard calibration approach was proposed and tested successfully. Specifically, the vibration mode to be monitored for structural damage was intentionally contaminated with known amounts of another mode, and the response of the trained neural network was measured as a function of the peak-to-peak amplitude of the contaminating mode. The neural network calibration technique essentially uses the vibration mode shapes of the undamaged structure as standards against which the changed mode shapes are compared. The published response of the network can be made nearly independent of the contaminating mode, if enough vibration modes are used to train the net. The sensitivity of the neural network can be adjusted for the environment in which the test is to be conducted. The response of a neural network trained with measured vibration patterns for use on a vibration isolation

  11. Nullius in Verba: A Call for the Incorporation of Evidence-based Practice Into the Discipline of Exercise Science

    OpenAIRE

    Amonette, William E.; English, Kirk L.; Ottenbacher, Kenneth J.

    2010-01-01

    Evidence-based practice (EBP) is a concept that was popularized in the early 1990’s by several physicians who recognized that medical practice should be based on the best and most current available evidence. Although this concept seems self-evident, much of medical practice was based on outdated textbooks and oral tradition passed down in medical school. Currently, exercise science is in a similar situation. Due to a lack of regulation within the exercise community, the discipline of exercise...

  12. Advanced Signaling Support for IP-based Networks

    OpenAIRE

    Röhricht, Martin

    2013-01-01

    This work develops a set of advanced signaling concepts for IP-based networks. It proposes a design for secure and authentic signaling and provides QoS signaling support for mobile users. Furthermore, this work develops methods which allow for scalable QoS signaling by realizing QoS-based group communication mechanisms and through aggregation of resource reservations.

  13. IPTV inter-destination synchronization: A network-based approach

    NARCIS (Netherlands)

    Stokking, H.M.; Deventer, M.O. van; Niamut, O.A.; Walraven, F.A.; Mekuria, R.N.

    2010-01-01

    This paper introduces a novel network-based approach to inter-destination media synchronization. The approach meets the need for synchronization in advanced TV concepts like social TV and offers high scalability, unlike conventional end-point based approaches. The solution for interdestination media

  14. Decoding signalling networks by mass spectrometry-based proteomics

    DEFF Research Database (Denmark)

    Choudhary, Chuna Ram; Mann, Matthias

    2010-01-01

    Signalling networks regulate essentially all of the biology of cells and organisms in normal and disease states. Signalling is often studied using antibody-based techniques such as western blots. Large-scale 'precision proteomics' based on mass spectrometry now enables the system...

  15. Dynamic QoS Provisioning for Ethernet-based Networks

    Science.gov (United States)

    Angelopoulos, J.; Kanonakis, K.; Leligou, H. C.; Orfanoudakis, Th.; Katsigiannis, M.

    2008-11-01

    The evolution towards packet-based access networks and the importance of quality of experience brings the need for access networks that support the offer of a wide range of multimedia services not currently available to the desired extent. Legacy networks based on circuit switching used explicit signalling that travelled to all nodes along the path to book resources before the launce of the media stream. This approach does not scale well and is not in line with the philosophy of packet networks. Still, the need to reserve resources in advance remains since real-time services have limited if any means of adjusting their rates to the prevailing network conditions and to preserve customer satisfaction the traditional preventive approach that needs accurate estimates of resource needs for the duration of the session is the only option. The paper describes a possible CAC solution based on measuring flows and enriches the network with implicit admission control (without obviating explicit control if available) and can manage resource allocation to protect quality-demanding services from degradation. The basis is a flow measurement system, which will estimate the traffic load produced by the flow and activate admission control. However, because in most cases these initial indication may well be misleading, it will be cross checked against a database of previously recorded flows per customer interface which can provide long term data on the flows leaving only a few cases that have to be corrected on the fly. The overall product is a self-learning autonomic system that supports QoS in the access network for services that do not communicate with the network layer such as, for example, peer-to-peer real-time multimedia applications.

  16. DMA Reference Base Station Network Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The data (15,904 records documenting 9,090 worldwide gravity base stations) were gathered by various governmental organizations (and academia) using a variety of...

  17. Traffic sign recognition based on deep convolutional neural network

    Science.gov (United States)

    Yin, Shi-hao; Deng, Ji-cai; Zhang, Da-wei; Du, Jing-yuan

    2017-11-01

    Traffic sign recognition (TSR) is an important component of automated driving systems. It is a rather challenging task to design a high-performance classifier for the TSR system. In this paper, we propose a new method for TSR system based on deep convolutional neural network. In order to enhance the expression of the network, a novel structure (dubbed block-layer below) which combines network-in-network and residual connection is designed. Our network has 10 layers with parameters (block-layer seen as a single layer): the first seven are alternate convolutional layers and block-layers, and the remaining three are fully-connected layers. We train our TSR network on the German traffic sign recognition benchmark (GTSRB) dataset. To reduce overfitting, we perform data augmentation on the training images and employ a regularization method named "dropout". The activation function we employ in our network adopts scaled exponential linear units (SELUs), which can induce self-normalizing properties. To speed up the training, we use an efficient GPU to accelerate the convolutional operation. On the test dataset of GTSRB, we achieve the accuracy rate of 99.67%, exceeding the state-of-the-art results.

  18. From PPP and CALL/MALL to a Praxis of Task-Based Teaching and Mobile Assisted Language Use

    Science.gov (United States)

    Jarvis, Huw

    2015-01-01

    Two of the most significant trends in TESOL (Teachers of English to Speakers of Other Languages) over the last twenty years or so are the rise of task­-based language teaching (TBLT) and the growth of technology. With TBLT there is a challenging of more traditional structure-based models of delivery, and the increased capacity and mobility of…

  19. Language Tasks Using Touch Screen and Mobile Technologies: Reconceptualizing Task-Based CALL for Young Language Learners

    Science.gov (United States)

    Pellerin, Martine

    2014-01-01

    This article examines how the use of mobile technologies (iPods and tablets) in language classrooms contributes to redesigning task-based approaches for young language learners. The article is based on a collaborative action research (CAR) project in Early French Immersion classrooms in the province of Alberta, Canada. The data collection included…

  20. The difficult medical emergency call

    DEFF Research Database (Denmark)

    Møller, Thea Palsgaard; Kjærulff, Thora Majlund; Viereck, Søren

    2017-01-01

    BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories and the ......BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories...... and the effect of categorization on mortality. METHODS: Register-based study in a 2-year period based on emergency call data from the emergency medical dispatch center in Copenhagen combined with nationwide register data. Logistic regression analysis (N = 78,040 individuals) was used for identification...

  1. VirVarSeq: a low-frequency virus variant detection pipeline for Illumina sequencing using adaptive base-calling accuracy filtering.

    Science.gov (United States)

    Verbist, Bie M P; Thys, Kim; Reumers, Joke; Wetzels, Yves; Van der Borght, Koen; Talloen, Willem; Aerssens, Jeroen; Clement, Lieven; Thas, Olivier

    2015-01-01

    In virology, massively parallel sequencing (MPS) opens many opportunities for studying viral quasi-species, e.g. in HIV-1- and HCV-infected patients. This is essential for understanding pathways to resistance, which can substantially improve treatment. Although MPS platforms allow in-depth characterization of sequence variation, their measurements still involve substantial technical noise. For Illumina sequencing, single base substitutions are the main error source and impede powerful assessment of low-frequency mutations. Fortunately, base calls are complemented with quality scores (Qs) that are useful for differentiating errors from the real low-frequency mutations. A variant calling tool, Q-cpileup, is proposed, which exploits the Qs of nucleotides in a filtering strategy to increase specificity. The tool is imbedded in an open-source pipeline, VirVarSeq, which allows variant calling starting from fastq files. Using both plasmid mixtures and clinical samples, we show that Q-cpileup is able to reduce the number of false-positive findings. The filtering strategy is adaptive and provides an optimized threshold for individual samples in each sequencing run. Additionally, linkage information is kept between single-nucleotide polymorphisms as variants are called at the codon level. This enables virologists to have an immediate biological interpretation of the reported variants with respect to their antiviral drug responses. A comparison with existing SNP caller tools reveals that calling variants at the codon level with Q-cpileup results in an outstanding sensitivity while maintaining a good specificity for variants with frequencies down to 0.5%. The VirVarSeq is available, together with a user's guide and test data, at sourceforge: http://sourceforge.net/projects/virtools/?source=directory. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  2. Analysing the Correlation between Social Network Analysis Measures and Performance of Students in Social Network-Based Engineering Education

    Science.gov (United States)

    Putnik, Goran; Costa, Eric; Alves, Cátia; Castro, Hélio; Varela, Leonilde; Shah, Vaibhav

    2016-01-01

    Social network-based engineering education (SNEE) is designed and implemented as a model of Education 3.0 paradigm. SNEE represents a new learning methodology, which is based on the concept of social networks and represents an extended model of project-led education. The concept of social networks was applied in the real-life experiment,…

  3. CHROMATOGATE: A TOOL FOR DETECTING BASE MIS-CALLS IN MULTIPLE SEQUENCE ALIGNMENTS BY SEMI-AUTOMATIC CHROMATOGRAM INSPECTION

    Directory of Open Access Journals (Sweden)

    Nikolaos Alachiotis

    2013-03-01

    Full Text Available Automated DNA sequencers generate chromatograms that contain raw sequencing data. They also generate data that translates the chromatograms into molecular sequences of A, C, G, T, or N (undetermined characters. Since chromatogram translation programs frequently introduce errors, a manual inspection of the generated sequence data is required. As sequence numbers and lengths increase, visual inspection and manual correction of chromatograms and corresponding sequences on a per-peak and per-nucleotide basis becomes an error-prone, time-consuming, and tedious process. Here, we introduce ChromatoGate (CG, an open-source software that accelerates and partially automates the inspection of chromatograms and the detection of sequencing errors for bidirectional sequencing runs. To provide users full control over the error correction process, a fully automated error correction algorithm has not been implemented. Initially, the program scans a given multiple sequence alignment (MSA for potential sequencing errors, assuming that each polymorphic site in the alignment may be attributed to a sequencing error with a certain probability. The guided MSA assembly procedure in ChromatoGate detects chromatogram peaks of all characters in an alignment that lead to polymorphic sites, given a user-defined threshold. The threshold value represents the sensitivity of the sequencing error detection mechanism. After this pre-filtering, the user only needs to inspect a small number of peaks in every chromatogram to correct sequencing errors. Finally, we show that correcting sequencing errors is important, because population genetic and phylogenetic inferences can be misled by MSAs with uncorrected mis-calls. Our experiments indicate that estimates of population mutation rates can be affected two- to three-fold by uncorrected errors.

  4. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  5. Deep Belief Network-Based Approaches for Link Prediction in Signed Social Networks

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2015-04-01

    Full Text Available In some online social network services (SNSs, the members are allowed to label their relationships with others, and such relationships can be represented as the links with signed values (positive or negative. The networks containing such relations are named signed social networks (SSNs, and some real-world complex systems can be also modeled with SSNs. Given the information of the observed structure of an SSN, the link prediction aims to estimate the values of the unobserved links. Noticing that most of the previous approaches for link prediction are based on the members’ similarity and the supervised learning method, however, research work on the investigation of the hidden principles that drive the behaviors of social members are rarely conducted. In this paper, the deep belief network (DBN-based approaches for link prediction are proposed. Including an unsupervised link prediction model, a feature representation method and a DBN-based link prediction method are introduced. The experiments are done on the datasets from three SNSs (social networking services in different domains, and the results show that our methods can predict the values of the links with high performance and have a good generalization ability across these datasets.

  6. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  7. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  8. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  9. An Entropy-Based Network Anomaly Detection Method

    Directory of Open Access Journals (Sweden)

    Przemysław Bereziński

    2015-04-01

    Full Text Available Data mining is an interdisciplinary subfield of computer science involving methods at the intersection of artificial intelligence, machine learning and statistics. One of the data mining tasks is anomaly detection which is the analysis of large quantities of data to identify items, events or observations which do not conform to an expected pattern. Anomaly detection is applicable in a variety of domains, e.g., fraud detection, fault detection, system health monitoring but this article focuses on application of anomaly detection in the field of network intrusion detection.The main goal of the article is to prove that an entropy-based approach is suitable to detect modern botnet-like malware based on anomalous patterns in network. This aim is achieved by realization of the following points: (i preparation of a concept of original entropy-based network anomaly detection method, (ii implementation of the method, (iii preparation of original dataset, (iv evaluation of the method.

  10. White blood cells identification system based on convolutional deep neural learning networks.

    Science.gov (United States)

    Shahin, A I; Guo, Yanhui; Amin, K M; Sharawi, Amr A

    2017-11-16

    White blood cells (WBCs) differential counting yields valued information about human health and disease. The current developed automated cell morphology equipments perform differential count which is based on blood smear image analysis. Previous identification systems for WBCs consist of successive dependent stages; pre-processing, segmentation, feature extraction, feature selection, and classification. There is a real need to employ deep learning methodologies so that the performance of previous WBCs identification systems can be increased. Classifying small limited datasets through deep learning systems is a major challenge and should be investigated. In this paper, we propose a novel identification system for WBCs based on deep convolutional neural networks. Two methodologies based on transfer learning are followed: transfer learning based on deep activation features and fine-tuning of existed deep networks. Deep acrivation featues are extracted from several pre-trained networks and employed in a traditional identification system. Moreover, a novel end-to-end convolutional deep architecture called "WBCsNet" is proposed and built from scratch. Finally, a limited balanced WBCs dataset classification is performed through the WBCsNet as a pre-trained network. During our experiments, three different public WBCs datasets (2551 images) have been used which contain 5 healthy WBCs types. The overall system accuracy achieved by the proposed WBCsNet is (96.1%) which is more than different transfer learning approaches or even the previous traditional identification system. We also present features visualization for the WBCsNet activation which reflects higher response than the pre-trained activated one. a novel WBCs identification system based on deep learning theory is proposed and a high performance WBCsNet can be employed as a pre-trained network. Copyright © 2017. Published by Elsevier B.V.

  11. Structure-based control of complex networks with nonlinear dynamics

    Science.gov (United States)

    Zañudo, Jorge Gomez Tejeda; Yang, Gang; Albert, Réka

    2017-01-01

    What can we learn about controlling a system solely from its underlying network structure? Here we adapt a recently developed framework for control of networks governed by a broad class of nonlinear dynamics that includes the major dynamic models of biological, technological, and social processes. This feedback-based framework provides realizable node overrides that steer a system toward any of its natural long-term dynamic behaviors, regardless of the specific functional forms and system parameters. We use this framework on several real networks, identify the topological characteristics that underlie the predicted node overrides, and compare its predictions to those of structural controllability in control theory. Finally, we demonstrate this framework’s applicability in dynamic models of gene regulatory networks and identify nodes whose override is necessary for control in the general case but not in specific model instances. PMID:28655847

  12. Community Clustering Algorithm in Complex Networks Based on Microcommunity Fusion

    Directory of Open Access Journals (Sweden)

    Jin Qi

    2015-01-01

    Full Text Available With the further research on physical meaning and digital features of the community structure in complex networks in recent years, the improvement of effectiveness and efficiency of the community mining algorithms in complex networks has become an important subject in this area. This paper puts forward a concept of the microcommunity and gets final mining results of communities through fusing different microcommunities. This paper starts with the basic definition of the network community and applies Expansion to the microcommunity clustering which provides prerequisites for the microcommunity fusion. The proposed algorithm is more efficient and has higher solution quality compared with other similar algorithms through the analysis of test results based on network data set.

  13. Seismic noise filtering based on Generalized Regression Neural Networks

    Science.gov (United States)

    Djarfour, Nouredine; Ferahtia, Jalal; Babaia, Foudel; Baddari, Kamel; Said, El-adj; Farfour, Mohammed

    2014-08-01

    This paper deals with the application of Generalized Regression Neural Networks to the seismic data filtering. The proposed system is a class of neural networks widely used for the continuous function mapping. They are based on the well known nonparametric kernel statistical estimators. The main advantages of this neural network include adaptability, simplicity and rapid training. Several synthetic tests are performed in order to highlight the merit of the proposed topology of neural network. In this work, the filtering strategy has been applied to remove random noises as well as source-related noises from real seismic data extracted from a field in the South of Algeria. The obtained results are very promising and indicate the high performance of the proposed filter in comparison to the well known frequency-wavenumber filter.

  14. Architecture Analysis of an FPGA-Based Hopfield Neural Network

    Directory of Open Access Journals (Sweden)

    Miguel Angelo de Abreu de Sousa

    2014-01-01

    Full Text Available Interconnections between electronic circuits and neural computation have been a strongly researched topic in the machine learning field in order to approach several practical requirements, including decreasing training and operation times in high performance applications and reducing cost, size, and energy consumption for autonomous or embedded developments. Field programmable gate array (FPGA hardware shows some inherent features typically associated with neural networks, such as, parallel processing, modular executions, and dynamic adaptation, and works on different types of FPGA-based neural networks were presented in recent years. This paper aims to address different aspects of architectural characteristics analysis on a Hopfield Neural Network implemented in FPGA, such as maximum operating frequency and chip-area occupancy according to the network capacity. Also, the FPGA implementation methodology, which does not employ multipliers in the architecture developed for the Hopfield neural model, is presented, in detail.

  15. Numeral eddy current sensor modelling based on genetic neural network

    International Nuclear Information System (INIS)

    Yu Along

    2008-01-01

    This paper presents a method used to the numeral eddy current sensor modelling based on the genetic neural network to settle its nonlinear problem. The principle and algorithms of genetic neural network are introduced. In this method, the nonlinear model parameters of the numeral eddy current sensor are optimized by genetic neural network (GNN) according to measurement data. So the method remains both the global searching ability of genetic algorithm and the good local searching ability of neural network. The nonlinear model has the advantages of strong robustness, on-line modelling and high precision. The maximum nonlinearity error can be reduced to 0.037% by using GNN. However, the maximum nonlinearity error is 0.075% using the least square method

  16. Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

    Directory of Open Access Journals (Sweden)

    DongHo Kang

    2014-01-01

    Full Text Available Internet of Things (IoT consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments. But SCADA sensor networks are becoming more and more vulnerable to cyber-attacks due to increased connectivity. To safely adopt IoT technologies in the SCADA environments, it is important to improve the security of SCADA sensor networks. In this paper we propose a multiple filtering technique based on whitelists to detect illegitimate packets. Our proposed system detects the traffic of network and application protocol attacks with a set of whitelists collected from normal traffic.

  17. Hierarchical-control-based output synchronization of coexisting attractor networks

    International Nuclear Information System (INIS)

    Yun-Zhong, Song; Yi-Fa, Tang

    2010-01-01

    This paper introduces the concept of hierarchical-control-based output synchronization of coexisting attractor networks. Within the new framework, each dynamic node is made passive at first utilizing intra-control around its own arena. Then each dynamic node is viewed as one agent, and on account of that, the solution of output synchronization of coexisting attractor networks is transformed into a multi-agent consensus problem, which is made possible by virtue of local interaction between individual neighbours; this distributed working way of coordination is coined as inter-control, which is only specified by the topological structure of the network. Provided that the network is connected and balanced, the output synchronization would come true naturally via synergy between intra and inter-control actions, where the Tightness is proved theoretically via convex composite Lyapunov functions. For completeness, several illustrative examples are presented to further elucidate the novelty and efficacy of the proposed scheme. (general)

  18. Structure-based control of complex networks with nonlinear dynamics

    Science.gov (United States)

    Zanudo, Jorge G. T.; Yang, Gang; Albert, Reka

    What can we learn about controlling a system solely from its underlying network structure? Here we use a framework for control of networks governed by a broad class of nonlinear dynamics that includes the major dynamic models of biological, technological, and social processes. This feedback-based framework provides realizable node overrides that steer a system towards any of its natural long term dynamic behaviors, regardless of the dynamic details and system parameters. We use this framework on several real networks, identify the topological characteristics that underlie the predicted node overrides, and compare its predictions to those of classical structural control theory. Finally, we demonstrate this framework's applicability in dynamic models of gene regulatory networks and identify nodes whose override is necessary for control in the general case, but not in specific model instances. This work was supported by NSF Grants PHY 1205840 and IIS 1160995. JGTZ is a recipient of a Stand Up To Cancer - The V Foundation Convergence Scholar Award.

  19. Applying Model Based Systems Engineering to NASA's Space Communications Networks

    Science.gov (United States)

    Bhasin, Kul; Barnes, Patrick; Reinert, Jessica; Golden, Bert

    2013-01-01

    System engineering practices for complex systems and networks now require that requirement, architecture, and concept of operations product development teams, simultaneously harmonize their activities to provide timely, useful and cost-effective products. When dealing with complex systems of systems, traditional systems engineering methodology quickly falls short of achieving project objectives. This approach is encumbered by the use of a number of disparate hardware and software tools, spreadsheets and documents to grasp the concept of the network design and operation. In case of NASA's space communication networks, since the networks are geographically distributed, and so are its subject matter experts, the team is challenged to create a common language and tools to produce its products. Using Model Based Systems Engineering methods and tools allows for a unified representation of the system in a model that enables a highly related level of detail. To date, Program System Engineering (PSE) team has been able to model each network from their top-level operational activities and system functions down to the atomic level through relational modeling decomposition. These models allow for a better understanding of the relationships between NASA's stakeholders, internal organizations, and impacts to all related entities due to integration and sustainment of existing systems. Understanding the existing systems is essential to accurate and detailed study of integration options being considered. In this paper, we identify the challenges the PSE team faced in its quest to unify complex legacy space communications networks and their operational processes. We describe the initial approaches undertaken and the evolution toward model based system engineering applied to produce Space Communication and Navigation (SCaN) PSE products. We will demonstrate the practice of Model Based System Engineering applied to integrating space communication networks and the summary of its

  20. Robustness of TAP-based Scan Networks

    OpenAIRE

    Ghani Zadegan, Farrokh; Carlsson, Gunnar; Larsson, Erik

    2014-01-01

    It is common to embed instruments when developing integrated circuits (ICs). These instruments are accessed at post-silicon validation, debugging, wafer sort, package test, burn-in, printed circuit board bring-up, printed circuit board assembly manufacturing test, power-on self-test, and operator-driven in-field test. At any of these scenarios, it is of interest to access some but not all of the instruments. IEEE 1149.1-2013 and IEEE 1687 propose Test Access Port based (TAP-based) mechanisms ...

  1. Dynamic Network-Based Epistasis Analysis: Boolean Examples

    Science.gov (United States)

    Azpeitia, Eugenio; Benítez, Mariana; Padilla-Longoria, Pablo; Espinosa-Soto, Carlos; Alvarez-Buylla, Elena R.

    2011-01-01

    In this article we focus on how the hierarchical and single-path assumptions of epistasis analysis can bias the inference of gene regulatory networks. Here we emphasize the critical importance of dynamic analyses, and specifically illustrate the use of Boolean network models. Epistasis in a broad sense refers to gene interactions, however, as originally proposed by Bateson, epistasis is defined as the blocking of a particular allelic effect due to the effect of another allele at a different locus (herein, classical epistasis). Classical epistasis analysis has proven powerful and useful, allowing researchers to infer and assign directionality to gene interactions. As larger data sets are becoming available, the analysis of classical epistasis is being complemented with computer science tools and system biology approaches. We show that when the hierarchical and single-path assumptions are not met in classical epistasis analysis, the access to relevant information and the correct inference of gene interaction topologies is hindered, and it becomes necessary to consider the temporal dynamics of gene interactions. The use of dynamical networks can overcome these limitations. We particularly focus on the use of Boolean networks that, like classical epistasis analysis, relies on logical formalisms, and hence can complement classical epistasis analysis and relax its assumptions. We develop a couple of theoretical examples and analyze them from a dynamic Boolean network model perspective. Boolean networks could help to guide additional experiments and discern among alternative regulatory schemes that would be impossible or difficult to infer without the elimination of these assumption from the classical epistasis analysis. We also use examples from the literature to show how a Boolean network-based approach has resolved ambiguities and guided epistasis analysis. Our article complements previous accounts, not only by focusing on the implications of the hierarchical and

  2. Global cardiovascular disease prevention: a call to action for nursing: community-based and public health prevention initiatives.

    Science.gov (United States)

    Fletcher, Barbara J; Himmelfarb, Cheryl Dennison; Lira, Maria Teresa; Meininger, Janet C; Pradhan, Sala Ray; Sikkema, Joanna

    2011-01-01

    Policy changes are necessary to promote cardiovascular disease prevention. These will involve community-based and public health initiatives for primary and secondary prevention of cardiovascular disease. In this article, we discuss such interventions, community-based participatory research that has been conducted in this area, and implications for capacity building in genetics research. Finally, areas for future research in this area will be identified.

  3. On Modeling Information Spreading in Bacterial Nano-Networks Based on Plasmid Conjugation.

    Science.gov (United States)

    Castorina, Gaetano; Galluccio, Laura; Palazzo, Sergio

    2016-09-01

    In the last years, nano-communications have attracted much attention as a newly promising research field. In particular, molecular communications, which exploit molecular nodes, are a powerful tool to implement communication functionalities in environments where the use of electromagnetic waves becomes critical, e.g., in the human body. In molecular communications, molecules such as proteins, DNA and RNA sequences are used to carry information. To this aim a novel approach relies on the use of genetically modified bacteria to transport enhanced DNA strands, called plasmids, where information can be encoded. Information transfer is thus based on bacteria motility, i.e., self-propelled motion, which under appropriate circumstances is exhibited by certain bacteria. It has been observed that bacteria motility presents many similarities with opportunistic forwarding. Currently the few studies on opportunistic communications among bacteria are based on simulations only. In this paper we propose an analytical model to characterize information spreading in bacterial nano-networks. To this purpose, an epidemic approach, similar to those used to model Delay Tolerant Networks (DTNs), is employed. We also derive two mathematical models which slightly differ. The first describes bacterial nano-networks where a single plasmid is disseminated according to an epidemic approach; the second, takes into account more complex mechanisms where multiple plasmids are disseminated as in realistic bacterial nano-networks. Numerical results being obtained are finally shown and discussed.

  4. Detection of directional eye movements based on the electrooculogram signals through an artificial neural network

    International Nuclear Information System (INIS)

    Erkaymaz, Hande; Ozer, Mahmut; Orak, İlhami Muharrem

    2015-01-01

    The electrooculogram signals are very important at extracting information about detection of directional eye movements. Therefore, in this study, we propose a new intelligent detection model involving an artificial neural network for the eye movements based on the electrooculogram signals. In addition to conventional eye movements, our model also involves the detection of tic and blinking of an eye. We extract only two features from the electrooculogram signals, and use them as inputs for a feed-forwarded artificial neural network. We develop a new approach to compute these two features, which we call it as a movement range. The results suggest that the proposed model have a potential to become a new tool to determine the directional eye movements accurately

  5. A novel Chemical Reaction Optimization based Higher order Neural Network (CRO-HONN for nonlinear classification

    Directory of Open Access Journals (Sweden)

    Janmenjoy Nayak

    2015-09-01

    Full Text Available In this paper, a Chemical Reaction Optimization (CRO based higher order neural network with a single hidden layer called Pi–Sigma Neural Network (PSNN has been proposed for data classification which maintains fast learning capability and avoids the exponential increase of number of weights and processing units. CRO is a recent metaheuristic optimization algorithm inspired by chemical reactions, free from intricate operator and parameter settings such as other algorithms and loosely couples chemical reactions with optimization. The performance of the proposed CRO-PSNN has been tested with various benchmark datasets from UCI machine learning repository and compared with the resulting performance of PSNN, GA-PSNN, PSO-PSNN. The methods have been implemented in MATLAB and the accuracy measures have been tested by using the ANOVA statistical tool. Experimental results show that the proposed method is fast, steady and reliable and provides better classification accuracy than others.

  6. Optimization of observation plan based on the stochastic characteristics of the geodetic network

    Directory of Open Access Journals (Sweden)

    Pachelski Wojciech

    2016-06-01

    Full Text Available Optimal design of geodetic network is a basic subject of many engineering projects. An observation plan is a concluding part of the process. Any particular observation within the network has through adjustment a different contribution and impact on values and accuracy characteristics of unknowns. The problem of optimal design can be solved by means of computer simulation. This paper presents a new method of simulation based on sequential estimation of individual observations in a step-by-step manner, by means of the so-called filtering equations. The algorithm aims at satisfying different criteria of accuracy according to various interpretations of the covariance matrix. Apart of them, the optimization criterion is also amount of effort, defined as the minimum number of observations required.

  7. When the project becomes method: New perspectives for network-based socio-educational research

    Directory of Open Access Journals (Sweden)

    José Antonio Caride Gómez

    2015-05-01

    Full Text Available This paper centers its arguments in the epistemological shift that the so-called mixed methods have provided the Social and Educational Sciences with. It is not just as a way for widening the expectations they generate in socio-educational action and reflection but also in the change processes and social transformation. Based on these assumptions it is introduced the Network of Research Groups OcioGune and the coordinated project “From Educational to Social Times: the Daily Building of the Young Condition into a Network Society” (RESORTES. A practical realization of the potentialities inherent to collaborative work and the multidisciplinary approach provided by shared knowledge: a way, among others, to extend the frontiers of knowledge and its transfer to society by using mixed research methodologies.

  8. Implementation of DMAs in Intermittent Water Supply Networks Based on Equity Criteria

    Directory of Open Access Journals (Sweden)

    Amilkar E. Ilaya-Ayza

    2017-11-01

    Full Text Available Intermittent supply is a common way of delivering water in many developing countries. Limitations on water and economic resources, in addition to poor management and population growth, limit the possibilities of delivering water 24 h a day. Intermittent water supply networks are usually designed and managed in an empirical manner, or using tools and criteria devised for continuous supply systems, and this approach can produce supply inequity. In this paper, an approach based on the hydraulic capacity concept, which uses soft computing tools of graph theory and cluster analysis, is developed to define sectors, also called district metered areas (DMAs, to produce an equitable water supply. Moreover, this approach helps determine the supply time for each sector, which depends on each sector’s hydraulic characteristics. This process also includes the opinions of water company experts, the individuals who are best acquainted with the intricacies of the network.

  9. A Network-Based Electrical Engineering Laboratory

    Science.gov (United States)

    Asimopoulos, Nikolaos D.; Kyriakos, Nathanail; Mpatzakis, Vlasios

    2007-01-01

    Technical education is, by definition, a field that requires hands-on practice and experience by the student. When it comes to distant learning, technical education suffers from lack of such practical study, given the fact that e-learning is based on theoretical material being provided remotely to the student. This article presents the idea of…

  10. AMERICA’S BASE NETWORK: CREDIBLE DETERRENCE

    Science.gov (United States)

    2017-04-06

    been a focal point of the US grand strategy for nearly 120 years dating back to the conclusion of the Spanish American War.3 As such the evolution can...domestic political landscapes are changing around the globe. This global rules based international order is under pressure and governing and

  11. A reconsideration of negative ratings for network-based recommendation

    Science.gov (United States)

    Hu, Liang; Ren, Liang; Lin, Wenbin

    2018-01-01

    Recommendation algorithms based on bipartite networks have become increasingly popular, thanks to their accuracy and flexibility. Currently, many of these methods ignore users' negative ratings. In this work, we propose a method to exploit negative ratings for the network-based inference algorithm. We find that negative ratings play a positive role regardless of sparsity of data sets. Furthermore, we improve the efficiency of our method and compare it with the state-of-the-art algorithms. Experimental results show that the present method outperforms the existing algorithms.

  12. Heterogeneous Community-based mobility model for human opportunistic network

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    Human opportunistic networks can facilitate wireless content dissemination while humans are on the move. In such a network, content is disseminated via nodes relaying and nodes mobility (human mobility). Thus it is essential to understand and model the real human mobility. We present...... a heterogeneous community-based random way-point (HC-RWP) mobility model that captures the four important properties of real human mobility. These properties are based on both intuitive observations of daily human mobility and analysis of empirical mobility traces. By discrete event simulation, we show HC......-RWP captures essential statistic features of wide range of real human mobility traces reported in previous studies....

  13. Market Split based Congestion Management for Networks with Loops

    Science.gov (United States)

    Marmiroli, Marta; Tanimoto, Masahiko; Tsukamoto, Yukitoki; Yokoyama, Ryuichi

    Market splitting is one of the methods to solve the transmission congestion problem associated with the introduction of competitive electricity market and transmission access. Based on the concept of price difference among congested areas, the market splitting approach produces a solution that strongly informs market participants of congestion path. In this paper, an algorithm to solve the market splitting problem for complex networks including loop structures is proposed. The method, based on an algebraic approach, ensures a feasible optimal solution verifiable and easily understandable by the market participants. Complex networks are transformed into simple radial ones using the delta-star approach. The method was tested on large problems to evaluate the performances.

  14. Network Science Based Quantification of Resilience Demonstrated on the Indian Railways Network.

    Science.gov (United States)

    Bhatia, Udit; Kumar, Devashish; Kodra, Evan; Ganguly, Auroop R

    2015-01-01

    The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general.

  15. Network Science Based Quantification of Resilience Demonstrated on the Indian Railways Network.

    Directory of Open Access Journals (Sweden)

    Udit Bhatia

    Full Text Available The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general.

  16. Connecting Land-Based Networks to Ships

    Science.gov (United States)

    2013-06-01

    VSAT ) system. The stations, equipped with VSAT antennas, share the satellite’s transmission capacity to transmit to the station having the central hub...and base stations, which are connected to the ship’s VSAT system by which the voice and data connections from the phones are routed from the ship to...Maritime VSAT Communications Solutions, June 2010. [17] MCP Maritime Communications Partner, “Technology overview,” August 2012, http

  17. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies.

    Science.gov (United States)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew; Gautier, Laurent; Willis, Scooter; Fields, Christopher; Katayama, Toshiaki

    2012-01-01

    Open-source software (OSS) encourages computer programmers to reuse software components written by others. In evolutionary bioinformatics, OSS comes in a broad range of programming languages, including C/C++, Perl, Python, Ruby, Java, and R. To avoid writing the same functionality multiple times for different languages, it is possible to share components by bridging computer languages and Bio* projects, such as BioPerl, Biopython, BioRuby, BioJava, and R/Bioconductor. In this chapter, we compare the two principal approaches for sharing software between different programming languages: either by remote procedure call (RPC) or by sharing a local call stack. RPC provides a language-independent protocol over a network interface; examples are RSOAP and Rserve. The local call stack provides a between-language mapping not over the network interface, but directly in computer memory; examples are R bindings, RPy, and languages sharing the Java Virtual Machine stack. This functionality provides strategies for sharing of software between Bio* projects, which can be exploited more often. Here, we present cross-language examples for sequence translation, and measure throughput of the different options. We compare calling into R through native R, RSOAP, Rserve, and RPy interfaces, with the performance of native BioPerl, Biopython, BioJava, and BioRuby implementations, and with call stack bindings to BioJava and the European Molecular Biology Open Software Suite. In general, call stack approaches outperform native Bio* implementations and these, in turn, outperform RPC-based approaches. To test and compare strategies, we provide a downloadable BioNode image with all examples, tools, and libraries included. The BioNode image can be run on VirtualBox-supported operating systems, including Windows, OSX, and Linux.

  18. Clustering and information in correlation based financial networks

    Science.gov (United States)

    Onnela, J.-P.; Kaski, K.; Kertész, J.

    2004-03-01

    Networks of companies can be constructed by using return correlations. A crucial issue in this approach is to select the relevant correlations from the correlation matrix. In order to study this problem, we start from an empty graph with no edges where the vertices correspond to stocks. Then, one by one, we insert edges between the vertices according to the rank of their correlation strength, resulting in a network called asset graph. We study its properties, such as topologically different growth types, number and size of clusters and clustering coefficient. These properties, calculated from empirical data, are compared against those of a random graph. The growth of the graph can be classified according to the topological role of the newly inserted edge. We find that the type of growth which is responsible for creating cycles in the graph sets in much earlier for the empirical asset graph than for the random graph, and thus reflects the high degree of networking present in the market. We also find the number of clusters in the random graph to be one order of magnitude higher than for the asset graph. At a critical threshold, the random graph undergoes a radical change in topology related to percolation transition and forms a single giant cluster, a phenomenon which is not observed for the asset graph. Differences in mean clustering coefficient lead us to conclude that most information is contained roughly within 10% of the edges.

  19. Vortex network community based reduced-order force model

    Science.gov (United States)

    Gopalakrishnan Meena, Muralikrishnan; Nair, Aditya; Taira, Kunihiko

    2017-11-01

    We characterize the vortical wake interactions by utilizing network theory and cluster-based approaches, and develop a data-inspired unsteady force model. In the present work, the vortical interaction network is defined by nodes representing vortical elements and the edges quantified by induced velocity measures amongst the vortices. The full vorticity field is reduced to a finite number of vortical clusters based on network community detection algorithm, which serves as a basis for a skeleton network that captures the essence of the wake dynamics. We use this reduced representation of the wake to develop a data-inspired reduced-order force model that can predict unsteady fluid forces on the body. The overall formulation is demonstrated for laminar flows around canonical bluff body wake and stalled flow over an airfoil. We also show the robustness of the present network-based model against noisy data, which motivates applications towards turbulent flows and experimental measurements. Supported by the National Science Foundation (Grant 1632003).

  20. Analytical network process based optimum cluster head selection in wireless sensor network.

    Science.gov (United States)

    Farman, Haleem; Javed, Huma; Jan, Bilal; Ahmad, Jamil; Ali, Shaukat; Khalil, Falak Naz; Khan, Murad

    2017-01-01

    Wireless Sensor Networks (WSNs) are becoming ubiquitous in everyday life due to their applications in weather forecasting, surveillance, implantable sensors for health monitoring and other plethora of applications. WSN is equipped with hundreds and thousands of small sensor nodes. As the size of a sensor node decreases, critical issues such as limited energy, computation time and limited memory become even more highlighted. In such a case, network lifetime mainly depends on efficient use of available resources. Organizing nearby nodes into clusters make it convenient to efficiently manage each cluster as well as the overall network. In this paper, we extend our previous work of grid-based hybrid network deployment approach, in which merge and split technique has been proposed to construct network topology. Constructing topology through our proposed technique, in this paper we have used analytical network process (ANP) model for cluster head selection in WSN. Five distinct parameters: distance from nodes (DistNode), residual energy level (REL), distance from centroid (DistCent), number of times the node has been selected as cluster head (TCH) and merged node (MN) are considered for CH selection. The problem of CH selection based on these parameters is tackled as a multi criteria decision system, for which ANP method is used for optimum cluster head selection. Main contribution of this work is to check the applicability of ANP model for cluster head selection in WSN. In addition, sensitivity analysis is carried out to check the stability of alternatives (available candidate nodes) and their ranking for different scenarios. The simulation results show that the proposed method outperforms existing energy efficient clustering protocols in terms of optimum CH selection and minimizing CH reselection process that results in extending overall network lifetime. This paper analyzes that ANP method used for CH selection with better understanding of the dependencies of

  1. Reducing non-injection drug use in HIV primary care: A randomized trial of brief motivational interviewing, with and without HealthCall, a technology-based enhancement.

    Science.gov (United States)

    Aharonovich, Efrat; Sarvet, Aaron; Stohl, Malki; DesJarlais, Don; Tross, Susan; Hurst, Teresa; Urbina, Antonio; Hasin, Deborah

    2017-03-01

    In HIV-infected individuals, non-injection drug use (NIDU) compromises many health outcomes. In HIV primary care, the efficacy of brief motivational interviewing (MI) to reduce NIDU is unknown, and drug users may need greater intervention. We designed an enhancement to MI, HealthCall (HC), for daily patient self-monitoring calls to an interactive voice response (IVR) phone system, and provided participants with periodic personalized feedback. To reduce NIDU among HIV primary care patients, we compared the efficacy of MI+HealthCall to MI-only and an educational control condition. Participants age >18 with >4days of NIDU during the prior 30days were recruited from large urban HIV primary care clinics. Of the 240 participants, 83 were randomly assigned to control, 77 to MI-only, and 80 to MI+HC. Counselors provided educational control, MI-only or MI+HC at baseline. At 30 and 60days (end-of-treatment), counselors briefly discussed drug use, moods and health behaviors, using HealthCall-generated graphs with MI+HC patients. Primary outcomes (last 30days) were number of days used primary drug (NumDU), and total quantity of primary drug used (dollar amount spent; QuantU), derived from the Time-Line Follow-Back. Across all groups, at end-of-treatment, frequency and quantity of NIDU decreased, with significantly greater reductions in the MI-Only group. A twelve-month post-treatment follow-up indicated sustained benefits of MI+HC and MI-only relative to control. Brief interventions can be successfully used to reduce non-injection drug use in HIV primary care. IVR-based technology may not be sufficiently engaging to be effective. Future studies should investigate mobile technology to deliver a more engaging version of HealthCall to diverse substance abusing populations. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. A Review of the Use of Script-Based Tracking in CALL Research for Data Sharing: Applications Providing Meaning Aids

    Science.gov (United States)

    Hwu, Fenfang

    2013-01-01

    Using script-based tracking to gain insights into the way students learn or process language information can be traced as far back as to the 1980s. Nevertheless, researchers continue to face challenges in collecting and studying this type of data. The objective of this study is to propose data sharing through data repositories as a way to (a) ease…

  3. An Island Called Cuba

    Directory of Open Access Journals (Sweden)

    Jean Stubbs

    2011-06-01

    Full Text Available Review of: An Island Called Home: Returning to Jewish Cuba. Ruth Behar, photographs by Humberto Mayol. New Brunswick NJ: Rutgers University Press, 2007. xiii + 297 pp. (Cloth US$ 29.95 Fidel Castro: My Life: A Spoken Autobiography. Fidel Castro & Ignacio Ramonet. New York: Scribner/Simon & Schuster, 2008. vii + 724 pp. (Paper US$ 22.00, e-book US$ 14.99 Cuba: What Everyone Needs to Know. Julia E. Sweig. New York: Oxford University Press, 2009. xiv + 279 pp. (Paper US$ 16.95 [First paragraph] These three ostensibly very different books tell a compelling story of each author’s approach, as much as the subject matter itself. Fidel Castro: My Life: A Spoken Autobiography is based on a series of long interviews granted by the then-president of Cuba, Fidel Castro, to Spanish-Franco journalist Ignacio Ramonet. Cuba: What Everyone Needs to Know, by U.S. political analyst Julia Sweig, is one of a set country series, and, like Ramonet’s, presented in question/answer format. An Island Called Home: Returning to Jewish Cuba, with a narrative by Cuban-American anthropologist Ruth Behar and photographs by Cuban photographer Humberto Mayol, is a retrospective/introspective account of the Jewish presence in Cuba. While from Ramonet and Sweig we learn much about the revolutionary project, Behar and Mayol convey the lived experience of the small Jewish community against that backdrop.

  4. Evaluating airline energy efficiency: An integrated approach with Network Epsilon-based Measure and Network Slacks-based Measure

    International Nuclear Information System (INIS)

    Xu, Xin; Cui, Qiang

    2017-01-01

    This paper focuses on evaluating airline energy efficiency, which is firstly divided into four stages: Operations Stage, Fleet Maintenance Stage, Services Stage and Sales Stage. The new four-stage network structure of airline energy efficiency is a modification of existing models. A new approach, integrated with Network Epsilon-based Measure and Network Slacks-based Measure, is applied to assess the overall energy efficiency and divisional efficiency of 19 international airlines from 2008 to 2014. The influencing factors of airline energy efficiency are analyzed through the regression analysis. The results indicate the followings: 1. The integrated model can identify the benchmarking airlines in the overall system and stages. 2. Most airlines' energy efficiencies keep steady during the period, except for some sharply fluctuations. The efficiency decreases mainly centralized in the year 2008–2011, affected by the financial crisis in the USA. 3. The average age of fleet is positively correlated with the overall energy efficiency, and each divisional efficiency has different significant influencing factors. - Highlights: • An integrated approach with Network Epsilon-based Measure and Network Slacks-based Measure is developed. • 19 airlines' energy efficiencies are evaluated. • Garuda Indonesia has the highest overall energy efficiency.

  5. Citizen-based environmental radiation monitoring network

    International Nuclear Information System (INIS)

    Alemayehu, B.; Mckinzie, M.; Cochran, T.; Sythe, D.; Randrup, R.; Lafargue, E.

    2017-01-01

    This paper discusses a Citizen Radiation Monitoring project designed and implemented by the Natural Resources Defense Council . The goal of the project was to implement a radiation monitoring system that provides radiation data accessible to the public. The monitoring system consisted of usage of a radiation detector integrated with near real-time data collection and visualization. The monitoring systems were installed at five different locations and background radiation measurements were taken. The developed monitoring system demonstrated that citizen-based monitoring system could provide accessible radiation data to the general public and relevant to the area where they live. (author)

  6. Robust and Cost-Efficient Communication Based on SNMP in Mobile Networks

    Science.gov (United States)

    Ryu, Sang-Hoon; Baik, Doo-Kwon

    A main challenge in the design of this mobile network is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. Multimedia streaming services are receiving considerable interest in the mobile network business. An entire mobile network may change its point of attachment to the Internet. The mobile network is operated by a basic specification to support network mobility called Network Mobility (NEMO) Basic Support. However, NEMO basic Support mechanism has some problem in continuous communication. In this paper, we propose robust and cost-efficient algorithm. And we simulate proposed method and conclude some remarks.

  7. Call-for-tender documentation in the area of servers, personal computers and networks; Ausschreibungsunterlagen im Server-, PC- und Netzwerk-Bereich

    Energy Technology Data Exchange (ETDEWEB)

    Grieder, T.; Huser, A.

    2003-07-01

    As a result of this work, sample texts, so-called performance sheets, have been drawn up for the invitation to tender for IT devices. As a supplement to the standard technical requirements, such as computer performance, memory capacity, etc., these texts cover the aspects of energy efficiency. The performance sheets can be enclosed with the invitations to tender as an appendix, or be used directly as text modules. They are supplemented by explanatory texts, which give information regarding technical terms, labels and possible technical realizations. Performance sheets and explanatory texts are included in the appendix to this report. The goal of these activities is to exert pressure on the market, which should ultimately lead to more efficient units. In addition, however, these texts should serve to make the offices placing the invitations to tender more aware of the energy efficiency aspect. Energy saving functions are fairly common for PCs and monitors nowadays. Reference to proved technical realisations can be made in the performance sheets. The situation is more difficult for servers. Although some technical solutions have been initiated, very little is known about practical applications. Further activities are necessary here. (author)

  8. Design and Application of Nanogel-Based Polymer Networks

    Science.gov (United States)

    Dailing, Eric Alan

    Crosslinked polymer networks have wide application in biomaterials, from soft hydrogel scaffolds for cell culture and tissue engineering to glassy, high modulus dental restoratives. Composite materials formed with nanogels as a means for tuning network structure on the nanoscale have been reported, but no investigation into nanogels as the primary network component has been explored to this point. This thesis was dedicated to studying network formation from the direct polymerization of nanogels and investigating applications for these unique materials. Covalently crosslinked polymer networks were synthesized from polymerizable nanogels without the use of reactive small monomers or oligomers. Network properties were controlled by the chemical and physical properties of the nanogel, allowing for materials to be designed from nanostructured macromolecular precursors. Nanogels were synthesized from a thermally initiated solution free radical polymerization of a monomethacrylate, a dimethacrylate, and a thiol-based chain transfer agent. Monomers with a range of hydrophilic and hydrophobic character were copolymerized, and polymerizable groups were introduced through an alcohol-isocyanate click reaction. Nanogels were dispersible in water up to 75 wt%, including nanogels that contained a relatively high fraction of a conventionally water-insoluble component. Nanogels with molecular weights that ranged from 10's to 100's of kDa and hydrodynamic radii between 4 and 10 nm were obtained. Macroscopic crosslinked polymer networks were synthesized from the photopolymerization of methacrylate-functionalized nanogels in inert solvent, which was typically water. The nanogel composition and internal branching density affected both covalent and non-covalent interparticle interactions, which dictated the final mechanical properties of the networks. Nanogels with progressively disparate hydrophilic and hydrophobic character were synthesized to explore the potential for creating

  9. Adaptive Neural Network Based Control of Noncanonical Nonlinear Systems.

    Science.gov (United States)

    Zhang, Yanjun; Tao, Gang; Chen, Mou

    2016-09-01

    This paper presents a new study on the adaptive neural network-based control of a class of noncanonical nonlinear systems with large parametric uncertainties. Unlike commonly studied canonical form nonlinear systems whose neural network approximation system models have explicit relative degree structures, which can directly be used to derive parameterized controllers for adaptation, noncanonical form nonlinear systems usually do not have explicit relative degrees, and thus their approximation system models are also in noncanonical forms. It is well-known that the adaptive control of noncanonical form nonlinear systems involves the parameterization of system dynamics. As demonstrated in this paper, it is also the case for noncanonical neural network approximation system models. Effective control of such systems is an open research problem, especially in the presence of uncertain parameters. This paper shows that it is necessary to reparameterize such neural network system models for adaptive control design, and that such reparameterization can be realized using a relative degree formulation, a concept yet to be studied for general neural network system models. This paper then derives the parameterized controllers that guarantee closed-loop stability and asymptotic output tracking for noncanonical form neural network system models. An illustrative example is presented with the simulation results to demonstrate the control design procedure, and to verify the effectiveness of such a new design method.

  10. Scene understanding based on network-symbolic models

    Science.gov (United States)

    Kuvich, Gary

    2005-05-01

    New generations of smart weapons and unmanned vehicles must have reliable perceptual systems that are similar to human vision. Instead of precise computations of 3-dimensional models, a network-symbolic system converts image information into an "understandable" Network-Symbolic format, which is similar to relational knowledge models. Logic of visual scenes can be captured in the Network-Symbolic models and used for the disambiguation of visual information. It is hard to use geometric operations for processing of natural images. Instead, the brain builds a relational network-symbolic structure of visual scene, using different clues to set up the relational order of surfaces and objects. Feature, symbol, and predicate are equivalent in the biologically inspired Network-Symbolic systems. A linking mechanism binds these features/symbols into coherent structures, and image converts from a "raster" into a "vector" representation that can be better interpreted by higher-level knowledge structures. View-based object recognition is a hard problem for traditional algorithms that directly match a primary view of an object to a model. In Network-Symbolic Models, the derived structure, not the primary view, is a subject for recognition. Such recognition is not affected by local changes and appearances of the object as seen from a set of similar views.

  11. UNMANNED AIR VEHICLE STABILIZATION BASED ON NEURAL NETWORK REGULATOR

    Directory of Open Access Journals (Sweden)

    S. S. Andropov

    2016-09-01

    Full Text Available A problem of stabilizing for the multirotor unmanned aerial vehicle in an environment with external disturbances is researched. A classic proportional-integral-derivative controller is analyzed, its flaws are outlined: inability to respond to changing of external conditions and the need for manual adjustment of coefficients. The paper presents an adaptive adjustment method for coefficients of the proportional-integral-derivative controller based on neural networks. A neural network structure, its input and output data are described. Neural networks with three layers are used to create an adaptive stabilization system for the multirotor unmanned aerial vehicle. Training of the networks is done with the back propagation method. Each neural network produces regulator coefficients for each angle of stabilization as its output. A method for network training is explained. Several graphs of transition process on different stages of learning, including processes with external disturbances, are presented. It is shown that the system meets stabilization requirements with sufficient number of iterations. Described adjustment method for coefficients can be used in remote control of unmanned aerial vehicles, operating in the changing environment.

  12. Quantitative Method for Network Security Situation Based on Attack Prediction

    Directory of Open Access Journals (Sweden)

    Hao Hu

    2017-01-01

    Full Text Available Multistep attack prediction and security situation awareness are two big challenges for network administrators because future is generally unknown. In recent years, many investigations have been made. However, they are not sufficient. To improve the comprehensiveness of prediction, in this paper, we quantitatively convert attack threat into security situation. Actually, two algorithms are proposed, namely, attack prediction algorithm using dynamic Bayesian attack graph and security situation quantification algorithm based on attack prediction. The first algorithm aims to provide more abundant information of future attack behaviors by simulating incremental network penetration. Through timely evaluating the attack capacity of intruder and defense strategies of defender, the likely attack goal, path, and probability and time-cost are predicted dynamically along with the ongoing security events. Furthermore, in combination with the common vulnerability scoring system (CVSS metric and network assets information, the second algorithm quantifies the concealed attack threat into the surfaced security risk from two levels: host and network. Examples show that our method is feasible and flexible for the attack-defense adversarial network environment, which benefits the administrator to infer the security situation in advance and prerepair the critical compromised hosts to maintain normal network communication.

  13. Algorithm for Wireless Sensor Networks Based on Grid Management

    Directory of Open Access Journals (Sweden)

    Geng Zhang

    2014-05-01

    Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.

  14. Automation tools for control systems a network based sequencer

    International Nuclear Information System (INIS)

    Clout, P.; Geib, M.; Westervelt, R.

    1990-01-01

    This paper reports on development of a sequencer for control systems which works in conjunction with its realtime, distributed Vsystem database. Vsystem is a network-based data acquisition, monitoring and control system which has been applied successfully to many different types of projects. The network-based sequencer allows a user to simple define a thread of execution in any supported computer on the network. The scrip defining a sequence has a simple syntax designed for non-programmers, with facilities for selectively abbreviating the channel names for easy reference. The semantics of the script contains most of the familiar capabilities of conventional programming languages, including standard stream I/O and the ability to start other processes with parameters passed. The scrip is compiled to threaded code for execution efficiency. The implementation will be described in some detail and examples will be given of applications for which the sequencer has been used

  15. Partition network into communities based on group action on sets

    Science.gov (United States)

    Lin, Shu-Cheng; Tuan, Han-Wen; Tung, Cheng-Tan; Julian, Peterson

    2018-02-01

    In this paper an improved algorithm is provided to detect communities within a network based on group action on sets (GAS). Modularity has been used as the criterion to revise the results of three previous papers, deriving a better method of partition for the network of Karate club. We developed a new method to replace the complicated GAS to achieve the same effect as GAS. Through four examples, we demonstrated that our revised approach reduced the computation amount of modularity values. Based on a branch marked example, a detailed example is provided by us to illustrate that there is too many cores in the initial stage of GAS approach to induce too many communities in the final partition. The findings shown here, will allow scholars to understand using GAS algorithm to partition a network into communities is an unreliable method.

  16. Deflection routing scheme for GMPLS-based OBS networks

    DEFF Research Database (Denmark)

    Eid, Arafat; Mahmood, Waqar; Alomar, Anwar

    2010-01-01

    is not applicable in such an integrated solution. This is due to the existence of already established Label Switched Paths (LSPs) between edge nodes in a GMPLS-based OBS network which guide the Data Burst Headers (DBHs) through the network. In this paper we propose a novel deflection routing scheme which can...... be implemented in GMPLS-based OBS Control Plane. In this scheme, deflection routes or LSPs are designed and pre-established for the whole network. The ingress nodes are responsible for enabling DBHs for deflection at contending core ports prior to DBHs transmission. Moreover, we propose an object extension...... for Path and Resv messages of the RSVP-TE protocol to be able to utilize both messages for deflection labels dissemination. The scheme simulation results show reduction in data bursts blocking probability....

  17. An Intelligent Logistics Tracking System Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Xing Jijun

    2018-01-01

    Full Text Available In view of the shortcomings in information collection and tracking management in existing logistics, the key technologies of wireless sensor network and the basic concepts and methods of Information Technology Infrastructure Library(ITIL is studied. The basic structure and main functions of the logistics tracking system based on wireless sensor network is put forward. It can effectively solve the detection, location, recognition and automatic processing of fault events and other issues of goods in the process of logistics tracking management. In addition, combined with the GIS software, the logistics tracking and monitoring system based on the wireless sensor network is realized by using Java language coding. The results show that this system can realize the tracking, visualization and automatic management of the information in the process of goods transportation. Therefore, the proposed method significantly improves the accuracy, rapidity and intuition of the logistics information management.

  18. Hand posture recognizer based on separator wavelet networks

    Science.gov (United States)

    Bouchrika, Tahani; Jemai, Olfa; Zaied, Mourad; Ben Amar, Chokri

    2015-12-01

    This paper presents a novel hand posture recognizer based on separator wavelet networks (SWNs). Aiming at creating a robust and rapid hand posture recognizer, we have contributed by proposing a new training algorithm for the wavelet network classifier based on fast wavelet transform (FWN). So, the contribution resides in reducing the number of WNs modeling training data. To make that, inspiring from the adaboost feature selection method, we thought to create SWNs (n-1 WNs for n classes) instead of modeling each training sample by its wavelet network (WN). By proposing the new training algorithm, the recognition phase will be positively influenced. It will be more rapid thanks to the reduction of the number of comparisons between test images WNs and training WNs. Comparisons with other works, employing universal hand posture datasets are presented and discussed. Obtained results have shown that the new hand posture recognizer is comparable to previously established ones.

  19. FPGA-based network data transmission scheme for CSNS

    International Nuclear Information System (INIS)

    Wang Xiuku; Zhang Hongyu; Gu Minhao; Xiao Liang

    2012-01-01

    This paper presents the FPGA-based network data transmission solutions for the Data Acquisition System of China Spallation Neutron Source (CSNS). The board with FPGA as the core is used as the hardware platform to realize the transmission of network data. A SOPC system is built and an embedded Linux is transplanted on PowerPC Core. An application program based on Linux has been finished to realize the data transmission via embedded Gigabit Ethernet. The relationship between network transfer performance and packet size was obtained by a test program. In addition, the paper also tried to realize some other ways to transfer data: transplanting PetaLinux on Microblaze, transplanting Lwip protocol stack on PowerPC Core and Microblaze. Their advantages and disadvantages are analyzed and compared in this paper, so that different options and recommendations can be given to meet the actual needs of different projects in the future. (authors)

  20. Nullius in verba: a call for the incorporation of evidence-based practice into the discipline of exercise science.

    Science.gov (United States)

    Amonette, William E; English, Kirk L; Ottenbacher, Kenneth J

    2010-06-01

    Evidence-based practice (EBP) is a concept that was popularized in the early 1990s by several physicians who recognized that medical practice should be based on the best and most current available evidence. Although this concept seems self-evident, much of medical practice was based on outdated textbooks and oral tradition passed down in medical school. Currently, exercise science is in a similar situation. Due to a lack of regulation within the exercise community, the discipline of exercise science is particularly prone to bias and misinformation, as evidenced by the plethora of available programmes with efficacy supported by anecdote alone. In this review, we provide a description of the five steps in EBP: (i) develop a question; (ii) find evidence; (iii) evaluate the evidence; (iv) incorporate evidence into practice; and (v) re-evaluate the evidence. Although objections have been raised to the EBP process, we believe that its incorporation into exercise science will improve the credibility of our discipline and will keep exercise practitioners and academics on the cutting edge of the most current research findings.

  1. [Forensic evidence-based medicine in computer communication networks].

    Science.gov (United States)

    Qiu, Yun-Liang; Peng, Ming-Qi

    2013-12-01

    As an important component of judicial expertise, forensic science is broad and highly specialized. With development of network technology, increasement of information resources, and improvement of people's legal consciousness, forensic scientists encounter many new problems, and have been required to meet higher evidentiary standards in litigation. In view of this, evidence-based concept should be established in forensic medicine. We should find the most suitable method in forensic science field and other related area to solve specific problems in the evidence-based mode. Evidence-based practice can solve the problems in legal medical field, and it will play a great role in promoting the progress and development of forensic science. This article reviews the basic theory of evidence-based medicine and its effect, way, method, and evaluation in the forensic medicine in order to discuss the application value of forensic evidence-based medicine in computer communication networks.

  2. FIPA agent based network distributed control system

    Energy Technology Data Exchange (ETDEWEB)

    D. Abbott; V. Gyurjyan; G. Heyes; E. Jastrzembski; C. Timmer; E. Wolin

    2003-03-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  3. Network public opinion space sentiment tendency analyze based on recurrent convolution neural network

    Science.gov (United States)

    Zhang, Gaowei; Xu, Lingyu; Wang, Lei

    2018-04-01

    The purpose of this chapter is to analyze the investor's psychological characteristics and investment decision-making behavior characteristics, to study the investor sentiment under the network public opinion, and then analyze from three aspects: First, investor sentiment analysis and how to spread in the online media; The influence mechanism of investor's emotion on the stock market and its effect; the third one is to measure the investor's emotion based on the degree of attention, trying hard to sort out the internal relations between the investor's sentiment and the network public opinion and the stock market, in order to lay the theoretical foundation of this article.

  4. EIGENVECTOR-BASED CENTRALITY MEASURES FOR TEMPORAL NETWORKS*

    Science.gov (United States)

    TAYLOR, DANE; MYERS, SEAN A.; CLAUSET, AARON; PORTER, MASON A.; MUCHA, PETER J.

    2017-01-01

    Numerous centrality measures have been developed to quantify the importances of nodes in time-independent networks, and many of them can be expressed as the leading eigenvector of some matrix. With the increasing availability of network data that changes in time, it is important to extend such eigenvector-based centrality measures to time-dependent networks. In this paper, we introduce a principled generalization of network centrality measures that is valid for any eigenvector-based centrality. We consider a temporal network with N nodes as a sequence of T layers that describe the network during different time windows, and we couple centrality matrices for the layers into a supra-centrality matrix of size NT × NT whose dominant eigenvector gives the centrality of each node i at each time t. We refer to this eigenvector and its components as a joint centrality, as it reflects the importances of both the node i and the time layer t. We also introduce the concepts of marginal and conditional centralities, which facilitate the study of centrality trajectories over time. We find that the strength of coupling between layers is important for determining multiscale properties of centrality, such as localization phenomena and the time scale of centrality changes. In the strong-coupling regime, we derive expressions for time-averaged centralities, which are given by the zeroth-order terms of a singular perturbation expansion. We also study first-order terms to obtain first-order-mover scores, which concisely describe the magnitude of nodes’ centrality changes over time. As examples, we apply our method to three empirical temporal networks: the United States Ph.D. exchange in mathematics, costarring relationships among top-billed actors during the Golden Age of Hollywood, and citations of decisions from the United States Supreme Court. PMID:29046619

  5. Novel indexes based on network structure to indicate financial market

    Science.gov (United States)

    Zhong, Tao; Peng, Qinke; Wang, Xiao; Zhang, Jing

    2016-02-01

    There have been various achievements to understand and to analyze the financial market by complex network model. However, current studies analyze the financial network model but seldom present quantified indexes to indicate or forecast the price action of market. In this paper, the stock market is modeled as a dynamic network, in which the vertices refer to listed companies and edges refer to their rank-based correlation based on price series. Characteristics of the network are analyzed and then novel indexes are introduced into market analysis, which are calculated from maximum and fully-connected subnets. The indexes are compared with existing ones and the results confirm that our indexes perform better to indicate the daily trend of market composite index in advance. Via investment simulation, the performance of our indexes is analyzed in detail. The results indicate that the dynamic complex network model could not only serve as a structural description of the financial market, but also work to predict the market and guide investment by indexes.

  6. Efficient learning strategy of Chinese characters based on network approach.

    Directory of Open Access Journals (Sweden)

    Xiaoyong Yan

    Full Text Available We develop an efficient learning strategy of Chinese characters based on the network of the hierarchical structural relations between Chinese characters. A more efficient strategy is that of learning the same number of useful Chinese characters in less effort or time. We construct a node-weighted network of Chinese characters, where character usage frequencies are used as node weights. Using this hierarchical node-weighted network, we propose a new learning method, the distributed node weight (DNW strategy, which is based on a new measure of nodes' importance that considers both the weight of the nodes and its location in the network hierarchical structure. Chinese character learning strategies, particularly their learning order, are analyzed as dynamical processes over the network. We compare the efficiency of three theoretical learning methods and two commonly used methods from mainstream Chinese textbooks, one for Chinese elementary school students and the other for students learning Chinese as a second language. We find that the DNW method significantly outperforms the others, implying that the efficiency of current learning methods of major textbooks can be greatly improved.

  7. A Vector Network Analyzer Based on Pulse Generators

    Directory of Open Access Journals (Sweden)

    B. Schulte

    2005-01-01

    Full Text Available A fast four channel network analyzer is introduced to measure S-parameters in a frequency range from 10MHz to 3GHz. The signal generation for this kind of analyzer is based on pulse generators, which are realized with bipolar transistors. The output signal of the transistor is differentiated and two short pulses, a slow and a fast one, with opposite polarities are generated. The slow pulse is suppressed with a clipping network. Thus the generation of very short electrical pulses with a duration of about 100ps is possible. The structure of the following network analyzer is similar to the structure of a conventional four channel network analyzer. All four pulses, which contain the high frequency information of the device under test, are evaluated after the digitalization of intermediate frequencies. These intermediate frequencies are generated with sampling mixers. The recorded data is evaluated with a special analysis technique, which is based on a Fourier transformation. The calibration techniques used are the same as for conventional four channel network analyzers, no new calibration techniques need to be developed.

  8. Efficient learning strategy of Chinese characters based on network approach.

    Science.gov (United States)

    Yan, Xiaoyong; Fan, Ying; Di, Zengru; Havlin, Shlomo; Wu, Jinshan

    2013-01-01

    We develop an efficient learning strategy of Chinese characters based on the network of the hierarchical structural relations between Chinese characters. A more efficient strategy is that of learning the same number of useful Chinese characters in less effort or time. We construct a node-weighted network of Chinese characters, where character usage frequencies are used as node weights. Using this hierarchical node-weighted network, we propose a new learning method, the distributed node weight (DNW) strategy, which is based on a new measure of nodes' importance that considers both the weight of the nodes and its location in the network hierarchical structure. Chinese character learning strategies, particularly their learning order, are analyzed as dynamical processes over the network. We compare the efficiency of three theoretical learning methods and two commonly used methods from mainstream Chinese textbooks, one for Chinese elementary school students and the other for students learning Chinese as a second language. We find that the DNW method significantly outperforms the others, implying that the efficiency of current learning methods of major textbooks can be greatly improved.

  9. A Wildlife Monitoring System Based on Wireless Image Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junguo Zhang

    2014-10-01

    Full Text Available Survival and development of wildlife sustains the balance and stability of the entire ecosystem. Wildlife monitoring can provide lots of information such as wildlife species, quantity, habits, quality of life and habitat conditions, to help researchers grasp the status and dynamics of wildlife resources, and to provide basis for the effective protection, sustainable use, and scientific management of wildlife resources. Wildlife monitoring is the foundation of wildlife protection and management. Wireless Sensor Networks (WSN technology has become the most popular technology in the field of information. With advance of the CMOS image sensor technology, wireless sensor networks combined with image sensors, namely Wireless Image Sensor Networks (WISN technology, has emerged as an alternative in monitoring applications. Monitoring wildlife is one of its most promising applications. In this paper, system architecture of the wildlife monitoring system based on the wireless image sensor networks was presented to overcome the shortcomings of the traditional monitoring methods. Specifically, some key issues including design of wireless image sensor nodes and software process design have been studied and presented. A self-powered rotatable wireless infrared image sensor node based on ARM and an aggregation node designed for large amounts of data were developed. In addition, their corresponding software was designed. The proposed system is able to monitor wildlife accurately, automatically, and remotely in all-weather condition, which lays foundations for applications of wireless image sensor networks in wildlife monitoring.

  10. Bidirectional QoS support for novelty detection applications based on hierarchical wireless sensor network model

    Science.gov (United States)

    Edwards, Mark; Hu, Fei; Kumar, Sunil

    2004-10-01

    The research on the Novelty Detection System (NDS) (called as VENUS) at the authors' universities has generated exciting results. For example, we can detect an abnormal behavior (such as cars thefts from the parking lot) from a series of video frames based on the cognitively motivated theory of habituation. In this paper, we would like to describe the implementation strategies of lower layer protocols for using large-scale Wireless Sensor Networks (WSN) to NDS with Quality-of-Service (QoS) support. Wireless data collection framework, consisting of small and low-power sensor nodes, provides an alternative mechanism to observe the physical world, by using various types of sensing capabilities that include images (and even videos using Panoptos), sound and basic physical measurements such as temperature. We do not want to lose any 'data query command' packets (in the downstream direction: sink-to-sensors) or have any bit-errors in them since they are so important to the whole sensor network. In the upstream direction (sensors-to-sink), we may tolerate the loss of some sensing data packets. But the 'interested' sensing flow should be assigned a higher priority in terms of multi-hop path choice, network bandwidth allocation, and sensing data packet generation frequency (we hope to generate more sensing data packet for that novel event in the specified network area). The focus of this paper is to investigate MAC-level Quality of Service (QoS) issue in Wireless Sensor Networks (WSN) for Novelty Detection applications. Although QoS has been widely studied in other types of networks including wired Internet, general ad hoc networks and mobile cellular networks, we argue that QoS in WSN has its own characteristics. In wired Internet, the main QoS parameters include delay, jitter and bandwidth. In mobile cellular networks, two most common QoS metrics are: handoff call dropping probability and new call blocking probability. Since the main task of WSN is to detect and report

  11. The index-based subgraph matching algorithm (ISMA): fast subgraph enumeration in large networks using optimized search trees.

    Science.gov (United States)

    Demeyer, Sofie; Michoel, Tom; Fostier, Jan; Audenaert, Pieter; Pickavet, Mario; Demeester, Piet

    2013-01-01

    Subgraph matching algorithms are designed to find all instances of predefined subgraphs in a large graph or network and play an important role in the discovery and analysis of so-called network motifs, subgraph patterns which occur more often than expected by chance. We present the index-based subgraph matching algorithm (ISMA), a novel tree-based algorithm. ISMA realizes a speedup compared to existing algorithms by carefully selecting the order in which the nodes of a query subgraph are investigated. In order to achieve this, we developed a number of data structures and maximally exploited symmetry characteristics of the subgraph. We compared ISMA to a naive recursive tree-based algorithm and to a number of well-known subgraph matching algorithms. Our algorithm outperforms the other algorithms, especially on large networks and with large query subgraphs. An implementation of ISMA in Java is freely available at http://sourceforge.net/projects/isma/.

  12. The index-based subgraph matching algorithm (ISMA: fast subgraph enumeration in large networks using optimized search trees.

    Directory of Open Access Journals (Sweden)

    Sofie Demeyer

    Full Text Available Subgraph matching algorithms are designed to find all instances of predefined subgraphs in a large graph or network and play an important role in the discovery and analysis of so-called network motifs, subgraph patterns which occur more often than expected by chance. We present the index-based subgraph matching algorithm (ISMA, a novel tree-based algorithm. ISMA realizes a speedup compared to existing algorithms by carefully selecting the order in which the nodes of a query subgraph are investigated. In order to achieve this, we developed a number of data structures and maximally exploited symmetry characteristics of the subgraph. We compared ISMA to a naive recursive tree-based algorithm and to a number of well-known subgraph matching algorithms. Our algorithm outperforms the other algorithms, especially on large networks and with large query subgraphs. An implementation of ISMA in Java is freely available at http://sourceforge.net/projects/isma/.

  13. A new fuzzy regression model based on interval-valued fuzzy neural network and its applications to management

    Directory of Open Access Journals (Sweden)

    Somaye Yeylaghi

    2017-06-01

    Full Text Available In this paper, a novel hybrid method based on interval-valued fuzzy neural network for approximate of interval-valued fuzzy regression models, is presented. The work of this paper is an expansion of the research of real fuzzy regression models. In this paper interval-valued fuzzy neural network (IVFNN can be trained with crisp and interval-valued fuzzy data. Here a neural network is considered as a part of a large field called neural computing or soft computing. Moreover, in order to find the approximate parameters, a simple algorithm from the cost function of the fuzzy neural network is proposed. Finally, we illustrate our approach by some numerical examples and compare this method with existing methods.

  14. Gender-Based Violence Against Transgender People in the United States: A Call for Research and Programming.

    Science.gov (United States)

    Wirtz, Andrea L; Poteat, Tonia C; Malik, Mannat; Glass, Nancy

    2018-01-01

    Gender-based violence (GBV) is an umbrella term for any harm that is perpetrated against a person's will and that results from power inequalities based on gender roles. Most global estimates of GBV implicitly refer only to the experiences of cisgender, heterosexually identified women, which often comes at the exclusion of transgender and gender nonconforming (trans) populations. Those who perpetrate violence against trans populations often target gender nonconformity, gender expression or identity, and perceived sexual orientation and thus these forms of violence should be considered within broader discussions of GBV. Nascent epidemiologic research suggests a high burden of GBV among trans populations, with an estimated prevalence that ranges from 7% to 89% among trans populations and subpopulations. Further, 165 trans persons have been reported murdered in the United States between 2008 and 2016. GBV is associated with multiple poor health outcomes and has been broadly posited as a component of syndemics, a term used to describe an interaction of diseases with underlying social forces, concomitant with limited prevention and response programs. The interaction of social stigma, inadequate laws, and punitive policies as well as a lack of effective GBV programs limits access to and use of GBV prevention and response programs among trans populations. This commentary summarizes the current body of research on GBV among trans populations and highlights areas for future research, intervention, and policy.

  15. Amplified CWDM-based Next Generation Broadband Access Networks

    Science.gov (United States)

    Peiris, Sasanthi Chamarika

    The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed

  16. Recurrent neural network based hybrid model for reconstructing gene regulatory network.

    Science.gov (United States)

    Raza, Khalid; Alam, Mansaf

    2016-10-01

    One of the exciting problems in systems biology research is to decipher how genome controls the development of complex biological system. The gene regulatory networks (GRNs) help in the identification of regulatory interactions between genes and offer fruitful information related to functional role of individual gene in a cellular system. Discovering GRNs lead to a wide range of applications, including identification of disease related pathways providing novel tentative drug targets, helps to predict disease response, and also assists in diagnosing various diseases including cancer. Reconstruction of GRNs from available biological data is still an open problem. This paper proposes a recurrent neural network (RNN) based model of GRN, hybridized with generalized extended Kalman filter for weight update in backpropagation through time training algorithm. The RNN is a complex neural network that gives a better settlement between biological closeness and mathematical flexibility to model GRN; and is also able to capture complex, non-linear and dynamic relationships among variables. Gene expression data are inherently noisy and Kalman filter performs well for estimation problem even in noisy data. Hence, we applied non-linear version of Kalman filter, known as generalized extended Kalman filter, for weight update during RNN training. The developed model has been tested on four benchmark networks such as DNA SOS repair network, IRMA network, and two synthetic networks from DREAM Challenge. We performed a comparison of our results with other state-of-the-art techniques which shows superiority of our proposed model. Further, 5% Gaussian noise has been induced in the dataset and result of the proposed model shows negligible effect of noise on results, demonstrating the noise tolerance capability of the model. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Bernstein approximations in glasso-based estimation of biological networks

    NARCIS (Netherlands)

    Purutcuoglu, Vilda; Agraz, Melih; Wit, Ernst

    The Gaussian graphical model (GGM) is one of the common dynamic modelling approaches in the construction of gene networks. In inference of this modelling the interaction between genes can be detected mainly via graphical lasso (glasso) or coordinate descent-based approaches. Although these methods

  18. Agent-based Personal Network (PN) service architecture

    DEFF Research Database (Denmark)

    Jiang, Bo; Olesen, Henning

    2004-01-01

    In this paper we proposte a new concept for a centralized agent system as the solution for the PN service architecture, which aims to efficiently control and manage the PN resources and enable the PN based services to run seamlessly over different networks and devices. The working principle, cont...

  19. Coupled interference based rate adaptation in ad hoc networks

    CSIR Research Space (South Africa)

    Awuor, F

    2011-09-01

    Full Text Available to transmit at the minimum transmission power enough to sustain connectivity. This paper proposes coupled interference network utility maximization (NUM) strategy (i.e. CIN) for rate adaptation in WLANs that is solved using ”reverse-engineering” based...

  20. Detecting danger labels with RAM-based neural networks

    DEFF Research Database (Denmark)

    Jørgensen, T.M.; Christensen, S.S.; Andersen, A.W.

    1996-01-01

    An image processing system for the automatic location of danger labels on the back of containers is presented. The system uses RAM-based neural networks to locate and classify labels after a pre-processing step involving specially designed non-linear edge filters and RGB-to-HSV conversion. Results...

  1. Neural network based system for script identification in Indian ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... The paper describes a neural network-based script identification system which can be used in the machine reading of documents written in English, Hindi and Kannada language scripts. Script identification is a basic requirement in automation of document processing, in multi-script, multi-lingual ...

  2. Combine harvester monitor system based on wireless sensor network

    Science.gov (United States)

    A measurement method based on Wireless Sensor Network (WSN) was developed to monitor the working condition of combine harvester for remote application. Three JN5139 modules were chosen for sensor data acquisition and another two as a router and a coordinator, which could create a tree topology netwo...

  3. Efficient multiuser quantum cryptography network based on entanglement.

    Science.gov (United States)

    Xue, Peng; Wang, Kunkun; Wang, Xiaoping

    2017-04-04

    We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.

  4. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  5. Advanced flooding-based routing protocols for underwater sensor networks

    NARCIS (Netherlands)

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a

  6. The harmonics detection method based on neural network applied ...

    African Journals Online (AJOL)

    The harmonics detection method based on neural network applied to harmonics compensation. R Dehini, A Bassou, B Ferdi. Abstract. Several different methods have been used to sense load currents and extract its harmonic component in order to produce a reference current in shunt active power filters (SAPF), and to ...

  7. Energy Efficient Routing in Wireless Sensor Networks based on Ant ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-09-01

    Sep 1, 2013 ... Ant Colony Optimization, a swarm intelligence based optimization technique, has been successfully used in network routing. In this paper, we introduce a heuristic way to reduce energy consumption in WSNs routing process using Ant Colony Optimization. We introduce three Ant Colony Optimization ...

  8. Neural network-based retrieval from software reuse repositories

    Science.gov (United States)

    Eichmann, David A.; Srinivas, Kankanahalli

    1992-01-01

    A significant hurdle confronts the software reuser attempting to select candidate components from a software repository - discriminating between those components without resorting to inspection of the implementation(s). We outline an approach to this problem based upon neural networks which avoids requiring the repository administrators to define a conceptual closeness graph for the classification vocabulary.

  9. GeneNetwork: framework for web-based genetics

    NARCIS (Netherlands)

    Sloan, Zachary; Arends, Danny; Broman, Karl W.; Centeno, Arthur; Furlotte, Nicholas; Nijveen, H.; Yan, Lei; Zhou, Xiang; Williams, Robert W.; Prins, Pjotr

    2016-01-01

    GeneNetwork (GN) is a free and open source (FOSS) framework for web-based genetics that can be deployed anywhere. GN allows biologists to upload high-throughput experimental data, such as expression data from microarrays and RNA-seq, and also `classic' phenotypes, such as disease phenotypes. These

  10. Soft silicone based interpenetrating networks as materials for actuators

    DEFF Research Database (Denmark)

    Yu, Liyun; Gonzalez, Lidia; Hvilsted, Søren

    2014-01-01

    as for the commercial available silylation based elastomers such as Elastosil RT625. The resulting interpenetrating networks are formulated to be softer than RT625 to increase the actuation caused when applying a voltage due to their softness combined with the significantly higher permittivity than the pure silicone...

  11. Using location based services and social networks for crowdsoursing

    OpenAIRE

    Alebrahim, Mehrnoosh; Moshiri, Behzad

    2013-01-01

    In this paper, location based services with hard sensors like GPS and accelerometer in cell phones and also soft sensors like social networks (LinkedIn) in which people share personal information, skills, industry, location and interests are used. The information obtained from these sensors can be integrated to improve crowdsoursing approach.

  12. Learning Neuroscience: An Interactive Case-Based Online Network (ICON).

    Science.gov (United States)

    Quattrochi, James J.; Pasquale, Susan; Cerva, Barbara; Lester, John E.

    2002-01-01

    Presents an interactive, case-based online network (ICON) that provides a learning environment that integrates student thinking across different concentration tracks and allows students to get away from interpreting vast amounts of available information, move toward selecting useful information, recognize discriminating findings, and build a…

  13. Reward-based training of recurrent neural networks for cognitive and value-based tasks.

    Science.gov (United States)

    Song, H Francis; Yang, Guangyu R; Wang, Xiao-Jing

    2017-01-13

    Trained neural network models, which exhibit features of neural activity recorded from behaving animals, may provide insights into the circuit mechanisms of cognitive functions through systematic analysis of network activity and connectivity. However, in contrast to the graded error signals commonly used to train networks through supervised learning, animals learn from reward feedback on definite actions through reinforcement learning. Reward maximization is particularly relevant when optimal behavior depends on an animal's internal judgment of confidence or subjective preferences. Here, we implement reward-based training of recurrent neural networks in which a value network guides learning by using the activity of the decision network to predict future reward. We show that such models capture behavioral and electrophysiological findings from well-known experimental paradigms. Our work provides a unified framework for investigating diverse cognitive and value-based computations, and predicts a role for value representation that is essential for learning, but not executing, a task.

  14. A complex network based model for detecting isolated communities in water distribution networks

    Science.gov (United States)

    Sheng, Nan; Jia, Youwei; Xu, Zhao; Ho, Siu-Lau; Wai Kan, Chi

    2013-12-01

    Water distribution network (WDN) is a typical real-world complex network of major infrastructure that plays an important role in human's daily life. In this paper, we explore the formation of isolated communities in WDN based on complex network theory. A graph-algebraic model is proposed to effectively detect the potential communities due to pipeline failures. This model can properly illustrate the connectivity and evolution of WDN during different stages of contingency events, and identify the emerging isolated communities through spectral analysis on Laplacian matrix. A case study on a practical urban WDN in China is conducted, and the consistency between the simulation results and the historical data are reported to showcase the feasibility and effectiveness of the proposed model.

  15. Pedagogical Scholarship in Public Health: A Call for Cultivating Learning Communities to Support Evidence-Based Education.

    Science.gov (United States)

    Merzel, Cheryl; Halkitis, Perry; Healton, Cheryl

    Public health education is experiencing record growth and transformation. The current emphasis on learning outcomes necessitates attention to creating and evaluating the best curricula and learning methods for helping public health students develop public health competencies. Schools and programs of public health would benefit from active engagement in pedagogical research and additional platforms to support dissemination and implementation of educational research findings. We reviewed current avenues for sharing public health educational research, curricula, and best teaching practices; we identified useful models from other health professions; and we offered suggestions for how the field of public health education can develop communities of learning devoted to supporting pedagogy. Our goal was to help advance an agenda of innovative evidence-based public health education, enabling schools and programs of public health to evaluate and measure success in meeting the current and future needs of the public health profession.

  16. Assigning a team-based pager for on-call physicians reduces paging errors in a large academic hospital.

    Science.gov (United States)

    Shieh, Lisa; Chi, Jeffrey; Kulik, Carol; Momeni, Arash; Shelton, Andrew; DePorte, Cynthia; Hopkins, Joseph

    2014-02-01

    As complexity of care of hospitalized patients has increased, the need for communication and collaboration among members of the team caring for the patient has become increasingly important. This often takes the form of a nurse's need to contact a patient's physician to discuss some aspect of care and modify treatment plans. Errors in communication delay care and can pose risk to patients. This report describes the successful implementation of a standardized team-based paging system at an academic center. Results showed a substantial improvement in nurses' perceptions of knowing how to contact the correct physician when discussion of the patient's care is needed. This improvement was found across multiple medical and surgical specialties and was particularly effective for services with the greatest communication problems.

  17. Interdisciplinary health promotion: a call for theory-based interventions drawing on the skills of multiple disciplines.

    Science.gov (United States)

    Newton, Jonathon Timothy

    2012-10-01

    Promoting the health of populations demands the adoption of a perspective exploring the societal, political, community, family and individual determinants of health. I will argue that to develop interventions to modify health-related behaviours and health risks requires collaboration with a range of disciplines, in order to draw upon their theoretical, empirical and oftentimes political knowledge. To illustrate this thesis, I will draw upon research in three areas: improving oral health-related behaviours in individuals with periodontal disease and childhood caries; encouraging early recognition in head and neck cancer; and managing dental anxiety. Reviews of oral health education in the early 1990 s suggested that approaches based on education were largely ineffective in the absence of the provision of fluoride supplementation. More recently, high-quality research has identified simple, theory-based interventions that can improve adherence to specific oral hygiene-related behaviours. Similarly, a range of studies have demonstrated the effectiveness of motivational interviewing for targeting caries-related behaviours in targeted groups. Dental anxiety remains a significant barrier to the uptake of dental services, and again, by working in multi-disciplinary teams, a proportionate and comprehensive range of interventions can be adopted to alleviate the burden of dental fear. Finally, head and neck cancer has potentially serious effects for sufferers, but often presents late for a variety of reasons. Through developing a theoretical model of help-seeking behaviour, psychologists have been able to identify targets for interventions and work together with the healthcare team to develop these. © 2012 John Wiley & Sons A/S.

  18. A Soft-Hard Combination-Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Nhu Tri Do

    2015-02-01

    Full Text Available In this paper we propose a soft-hard combination scheme, called SHC scheme, for cooperative spectrum sensing in cognitive radio networks. The SHC scheme deploys a cluster based network in which Likelihood Ratio Test (LRT-based soft combination is applied at each cluster, and weighted decision fusion rule-based hard combination is utilized at the fusion center. The novelties of the SHC scheme are as follows: the structure of the SHC scheme reduces the complexity of cooperative detection which is an inherent limitation of soft combination schemes. By using the LRT, we can detect primary signals in a low signal-to-noise ratio regime (around an average of −15 dB. In addition, the computational complexity of the LRT is reduced since we derive the closed-form expression of the probability density function of LRT value. The SHC scheme also takes into account the different effects of large scale fading on different users in the wide area network. The simulation results show that the SHC scheme not only provides the better sensing performance compared to the conventional hard combination schemes, but also reduces sensing overhead in terms of reporting time compared to the conventional soft combination scheme using the LRT.

  19. A soft-hard combination-based cooperative spectrum sensing scheme for cognitive radio networks.

    Science.gov (United States)

    Do, Nhu Tri; An, Beongku

    2015-02-13

    In this paper we propose a soft-hard combination scheme, called SHC scheme, for cooperative spectrum sensing in cognitive radio networks. The SHC scheme deploys a cluster based network in which Likelihood Ratio Test (LRT)-based soft combination is applied at each cluster, and weighted decision fusion rule-based hard combination is utilized at the fusion center. The novelties of the SHC scheme are as follows: the structure of the SHC scheme reduces the complexity of cooperative detection which is an inherent limitation of soft combination schemes. By using the LRT, we can detect primary signals in a low signal-to-noise ratio regime (around an average of -15 dB). In addition, the computational complexity of the LRT is reduced since we derive the closed-form expression of the probability density function of LRT value. The SHC scheme also takes into account the different effects of large scale fading on different users in the wide area network. The simulation results show that the SHC scheme not only provides the better sensing performance compared to the conventional hard combination schemes, but also reduces sensing overhead in terms of reporting time compared to the conventional soft combination scheme using the LRT.

  20. Implementation and Performance Evaluation of Two Fuzzy-Based Handover Systems for Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Gjergji Mino

    2009-01-01

    Full Text Available Wireless mobile networks and devices are becoming increasingly popular to provide users the access anytime and anywhere. We are witnessing now an unprecedented demand for wireless networks to support both data and real-time multimedia traffic. The wireless mobile systems are based on cellular approach and the area is covered by cells that overlap each other. In mobile cellular systems the handover is a very important process. Many handover algorithms are proposed in the literature. However, to make a better handover and keep the QoS in wireless networks is very difficult task. For this reason, new intelligent algorithms should be implemented to deal with this problem. In this paper, we carried out a comparison study of two handover systems based on fuzzy logic. We implement two Fuzzy-Based Handover Systems (FBHS called FBHS1 and FBHS2. The performance evaluation via simulations shows that FBHS2 has better behavior than FBHS1 and can avoid ping-pong effect in all simulation cases.