WorldWideScience

Sample records for network caan entitled

  1. Auctioning payment entitlements

    DEFF Research Database (Denmark)

    Nielsen, Kurt

    2005-01-01

    Payment entitlements is a new commodity that arises from the new European common agricultural policy. The agricultural subsidies are decoupled from the actual production and replaced by the so-called payment entitlements. A payment entitlement has a farm specific value and may be freely traded. T...

  2. Identifying Two Groups of Entitled Individuals: Cluster Analysis Reveals Emotional Stability and Self-Esteem Distinction.

    Science.gov (United States)

    Crowe, Michael L; LoPilato, Alexander C; Campbell, W Keith; Miller, Joshua D

    2016-12-01

    The present study hypothesized that there exist two distinct groups of entitled individuals: grandiose-entitled, and vulnerable-entitled. Self-report scores of entitlement were collected for 916 individuals using an online platform. Model-based cluster analyses were conducted on the individuals with scores one standard deviation above mean (n = 159) using the five-factor model dimensions as clustering variables. The results support the existence of two groups of entitled individuals categorized as emotionally stable and emotionally vulnerable. The emotionally stable cluster reported emotional stability, high self-esteem, more positive affect, and antisocial behavior. The emotionally vulnerable cluster reported low self-esteem and high levels of neuroticism, disinhibition, conventionality, psychopathy, negative affect, childhood abuse, intrusive parenting, and attachment difficulties. Compared to the control group, both clusters reported being more antagonistic, extraverted, Machiavellian, and narcissistic. These results suggest important differences are missed when simply examining the linear relationships between entitlement and various aspects of its nomological network.

  3. Academic entitlement in pharmacy education.

    Science.gov (United States)

    Cain, Jeff; Romanelli, Frank; Smith, Kelly M

    2012-12-12

    The constructs of academic entitlement and student consumerism refer to students' attitudes toward education as a commodity and the underlying belief that as consumers, they should be catered to and given the opportunity to participate in the education process according to their preferences. Most discussions regarding these attitudes are anecdotal, but the pervasiveness of these accounts and the troubling effects that ensue warrant attention. Grade inflation, student incivility, altered classroom practices, and decreased faculty morale are all potential aftereffects of teaching students who hold academic entitlement beliefs. Numerous factors are posited as attributing to academic entitlement including personal issues, societal pressures, and broad academic practices. This paper discusses these factors and offers faculty members and administrators recommendations regarding practices that may curb or alleviate issues associated with academically entitled students.

  4. Entitlement and organizational behaviors: the moderating role of narcissism

    Directory of Open Access Journals (Sweden)

    Agata Szalkowska

    2015-10-01

    Full Text Available Background The purpose of this study was to investigate the relationship between psychological entitlement (active, passive, and revenge, narcissism and two types of organizational behaviors in employees. Interactions between narcissism and psychological entitlement as predictors of organizational citizenship behaviors (OCB and counterproductive work behaviors (CWB were explored. Predictors were analyzed in an effort to determine whether psychological entitlement plays a more destructive role among narcissistic employees than among non-narcissistic ones and whether the effects of narcissism on OCB and CWB are mediated by entitlement. Participants and procedure Data were obtained from 100 employees (34% men aged 22 to 59 years (M = 37.00, SD = 9.30 from public and private companies. Participants were asked to complete the Organizational Citizenship Behavior Scale (OCBS, the Counterproductive Organizational Behaviors Scale (COBS, the Entitlement Questionnaire, and the Narcissistic Personality Inventory (NPI. Results Positive aspects of entitlement were positively associated with OCB only among narcissistic employees, and active entitlement mediated the effects of narcissism on CWB. Active entitlement was negatively related to CWB. Negative aspects of entitlement were negatively related to OCB and unrelated to CWB. Conclusions This study provides evidence for positive (healthy aspects of entitlement for organizations. The unexpected interaction between narcissism and entitlement in predicting higher levels of OCB suggests that among narcissistic employees, healthy aspects of entitlement are desirable and profitable for an organization. Psychological entitlement was observed to be an important predictor of organizational behaviors beyond narcissism itself.

  5. 42 CFR 31.11 - Persons entitled to treatment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.11 Section 31.11... § 31.11 Persons entitled to treatment. To the extent and under the circumstances prescribed in this part, the following persons shall be entitled to medical, surgical, and dental treatment and...

  6. 43 CFR 426.5 - Ownership entitlement.

    Science.gov (United States)

    2010-10-01

    ... nonexempt land; (ii) Married couples who hold equal interests are entitled to receive irrigation water on a... entitled to receive irrigation water on that land owned jointly in marriage up to a maximum of 320 acres of... tenant, provided each tenant holds an equal interest in the tenancy; (vi) Partnerships subject to prior...

  7. 20 CFR 725.219 - Duration of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Duration of entitlement; child. 725.219... of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning... month in which any one of the following events first occurs: (1) The child dies; (2) The child marries...

  8. 20 CFR 725.218 - Conditions of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Conditions of entitlement; child. 725.218... Conditions of entitlement; child. (a) An individual is entitled to benefits where he or she meets the... the child of a deceased miner who: (1) Was receiving benefits under section 415 or part C of title IV...

  9. 20 CFR 410.212 - Conditions of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; child. 410.212...; Filing of Claims and Evidence § 410.212 Conditions of entitlement; child. (a) An individual is entitled to benefits if such individual: (1) Is the child or stepchild (see § 410.330) of (i) a deceased miner...

  10. 20 CFR 410.213 - Duration of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Duration of entitlement; child. 410.213...; Filing of Claims and Evidence § 410.213 Duration of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning with the first month in which all of the conditions of...

  11. Academic Entitlement and Academic Performance in Graduating Pharmacy Students

    OpenAIRE

    Jeffres, Meghan N.; Barclay, Sean M.; Stolte, Scott K.

    2014-01-01

    Objectives. To determine a measurable definition of academic entitlement, measure academic entitlement in graduating doctor of pharmacy (PharmD) students, and compare the academic performance between students identified as more or less academically entitled.

  12. Teaching Rational Entitlement and Responsibility: A Socratic Exercise

    Directory of Open Access Journals (Sweden)

    David Godden

    2014-02-01

    Full Text Available The paper reports on a Socratic exercise that introduces participants to the norm of rational entitlement, as distinct from political entitlement, and the attendant norm of rational responsibility. The exercise demonstrates that, because participants are not willing to exchange their own opinion at random for another differing opinion to which the owner is, by the participants’ own admission, entitled, they treat their entitlement to their own opinion differently, giving it a special status. This gives rise to rational obligations such as the obligation to provide reasons, and a willingness to risk those opinions to the force of the better reason.

  13. Personality, Self-Regulated Learning, and Academic Entitlement

    Science.gov (United States)

    McLellan, Chelsea K.; Jackson, Dennis L.

    2017-01-01

    The current study explored the relation between the Big-Five personality domains, self-regulated learning, and academic entitlement. Academic entitlement is defined as the tendency to possess expectations of unearned academic success, unearned/undeserved academic services, and/or the expectation of unrealistic accommodation (Chowning and Campbell…

  14. 20 CFR 410.214 - Conditions of entitlement; parent, brother, or sister.

    Science.gov (United States)

    2010-04-01

    ... entitlement to brother's benefits may be established for any month before January 1973, based on a disability... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; parent, brother...; Duration of Entitlement; Filing of Claims and Evidence § 410.214 Conditions of entitlement; parent, brother...

  15. Original article Entitlement and subjective well-being: a three-nations study

    Directory of Open Access Journals (Sweden)

    Magdalena Żemojtel-Piotrowska

    2015-03-01

    Full Text Available Background The current study investigated the role of three facets of entitlement (active, passive and revenge in various forms of subjective well-being (SWB: hedonistic and two facets of eudaimonic well-being (social and psychological. Social well-being was based on Keyes’ model (1998 and psychological well-being on Ryff’s model (1989. Participants and procedure The study was performed in three nations (Poland, Puerto Rico and Vietnam on student samples (Poland, n = 245, Vietnam, n = 115, and Puerto Rico, n = 300. To assess entitlement level the Entitlement Questionnaire was used. The level of hedonistic well-being was measured with the Satisfaction with Life Scale (SWLS and the Positive and Negative Affect Schedule (PANAS, and eudaimonic well-being by the Mental Health Continuum–Short Form (MHC-SF. Results Active entitlement was positively related to all aspects of SWB. Revenge entitlement was negatively related to hedonistic and psychological SWB in all samples and negatively related to social well-being only in Poland. Passive entitlement was unrelated to SWB. Conclusions The current study shows cross-cultural similarities in relationships of entitlement with hedonistic and psychological well-being and cross-cultural differences in the relationship of entitlement with social well-being. Additionally, the study indicates positive meaning of healthy aspects of entitlement for subjective well-being and negative meaning of dysfunctional aspects of entitlement for subjective well-being.

  16. Measurement of Psychological Entitlement in 28 Countries

    Czech Academy of Sciences Publication Activity Database

    Żemojtel-Piotrowska, M.; Piotrowski, J.; Cieciuch, J.; Calogero, R.M.; Van Hiel, A.; Argentero, P.; Baltatescu, S.; Baran, T.; Bardhwaj, G.; Bukowski, M.; Chargazia, M.; Clinton, A.; Halik, M.H.; Ilisko, D.; Khachatryan, N.; Klicperová-Baker, Martina; Košťál, Jaroslav; Kovacs, M.; Letovancova, E.; Liik, K.; Marganski, A.; Michałowski, J.; Nord, I.; Paspalanova, E.; de Leon, P.P.; Techera, J.; Rojas, M.; Różycka, J.; Sawicka, A.; Seibt, B.; Semkiv, I.; Tiliouine, H.; Truong, H.K.; Van den Bos, K.; Wills-Herrera, E.

    2017-01-01

    Roč. 33, č. 3 (2017), s. 207-217 ISSN 1015-5759 R&D Projects: GA ČR GA15-11062S Institutional support: RVO:68081740 Keywords : psychological entitlement * Entitlement Attitudes Questionnaire * cross-cultural research * measurement invariance Subject RIV: AN - Psychology OBOR OECD: Psychology (including human - machine relations) Impact factor: 2.328, year: 2016 http://econtent.hogrefe.com/doi/abs/10.1027/1015-5759/a000286

  17. Academic Entitlement in the Context of Learning Styles

    Science.gov (United States)

    Andrey, Jean; Joakim, Erin; Schoner, Vivian; Hambly, Derrick; Silver, Amber; Jayasundera, Rohan; Nelson, Allen

    2012-01-01

    This study explores the linkages between students' sense of entitlement and their approaches to learning, based on survey research at a large public university in Canada. Through literature review and pilot testing, a questionnaire instrument was developed that measures four constructs: academic entitlement, deep learning, surface learning and…

  18. 42 CFR 31.2 - Persons entitled to treatment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.2 Section 31.2... Public Health Service § 31.2 Persons entitled to treatment. To the extent and under the circumstances... treatment and hospitalization by the Service: (a) Coast Guard. (1) Commissioned officers, chief warrant...

  19. Academic Entitlement: Relations to Perceptions of Parental Warmth and Psychological Control

    Science.gov (United States)

    Turner, Lisa A.; McCormick, Wesley H.

    2018-01-01

    Academic entitlement characterises students who expect positive academic outcomes without personal effort. The current study examined the relations of perceived parental warmth and parental psychological control with two dimensions of academic entitlement (i.e., entitled expectations and externalised responsibility) among college students.…

  20. 20 CFR 408.816 - When does SVB entitlement end due to death?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does SVB entitlement end due to death? 408.816 Section 408.816 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Suspensions and Terminations Termination § 408.816 When does SVB entitlement end due to death? Your SVB entitlement ends wit...

  1. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    CERN Multimedia

    DG Unit

    2011-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website (topic « Privileges and immunities (Manual) » : http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud). The dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities : for Geneva: http://www.ge.ch/votations-elections/prochains-scrutins/; for Vaud: http://www.vd.ch/fr/themes/etat-droit-financ...

  2. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    CERN Multimedia

    DG Unit

    2009-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website: for the Canton of Genevafor the Canton of VaudThe dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities: for Geneva: referendum and forthcoming ballots ; for Vaud: forthcoming ballots In this context, please note, especially with regard to eligibility for election, that: in accordance with Articles S I 3.05 and I 3.06 of the Staff Rules "Members of the personnel wishing to take part in the public and political life of a State shall comply with the relevant legislat...

  3. Academic Entitlement and Its Relationship with Perception of Cheating Ethics

    Science.gov (United States)

    Elias, Rafik Z.

    2017-01-01

    Cheating is an epidemic in higher education. The author examined the psychological variable of academic entitlement and its relationship with the ethical perception of cheating using a sample of business students. Contrary to some previous research, the author found that millennials were only slightly more academically entitled than students from…

  4. Entitlement Attitudes Predict Students' Poor Performance in Challenging Academic Conditions

    Science.gov (United States)

    Anderson, Donna; Halberstadt, Jamin; Aitken, Robert

    2013-01-01

    Excessive entitlement--an exaggerated or unrealistic belief about what one deserves--has been associated with a variety of maladaptive behaviors, including a decline in motivation and effort. In the context of tertiary education, we reasoned that if students expend less effort to obtain positive outcomes to which they feel entitled, this should…

  5. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and......, hopefully, to enhance the level of security provided by these solutions even further....

  6. 7 CFR 272.11 - Systematic Alien Verification for Entitlements (SAVE) Program.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Systematic Alien Verification for Entitlements (SAVE... FOR PARTICIPATING STATE AGENCIES § 272.11 Systematic Alien Verification for Entitlements (SAVE... and Naturalization Service (INS), in order to verify the validity of documents provided by aliens...

  7. Rights as entitlements and rights as claims

    Directory of Open Access Journals (Sweden)

    Azevedo, Marco Antônio Oliveira de

    2010-01-01

    Full Text Available Há pelo menos dois registros diferentes sobre o significado de “direitos”. Segundo um deles, os direitos são relações entre dois termos: uma pessoa e um bem; para o outro, os direitos são relações entre três termos: um indivíduo, uma pessoa e uma ação ou algo. Os registros são diferentes, mas não são totalmente incompatíveis. De acordo com a interpretação de direitos como entitlements, trata-se de direitos morais ou legais, ou seja, as relações de ordem moral ou jurídica das pessoas com bens (de benefícios concedidos a pessoas por uma lei humana, moral ou legal. Como uma espécie de direitos, os direitos humanos são vistos como direitos (entitlements das pessoas ou dos indivíduos a bens essenciais, dos quais podem-se inferir reivindicações (claims contra outras pessoas ou contra governos e representantes. Falamos sobre direitos humanos geralmente desta forma. Mas de acordo com o outro registro, os direitos em sentido próprio têm que ser interpretados como claims. Neste artigo, pretendo apresentar alguns argumentos em favor da vantagem de expor todos os enunciados significativos dos direitos como entitlements em termos explícitos de claims

  8. The Effects of Reducing the Entitlement Period to Unemployment Insurance Benefits

    NARCIS (Netherlands)

    de Groot, N.; van der Klaauw, B.

    This paper exploits a substantial reform of the Dutch UI law to study the effect of the entitlement period on job finding and subsequent labor market outcomes. Using detailed administrative data covering the full population we find that reducing the entitlement period increases the job finding rate,

  9. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  10. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  11. A Non-Member Spouse's Entitlement To The Member's Pension Interest

    Directory of Open Access Journals (Sweden)

    Motseotsile Clement Marumoagae

    2014-12-01

    Full Text Available It is important that married couples seek legal advice with regard to the assets falling within their joint estate, more particularly their retirement benefits. This article reflects on the entitlement (if any of non-member spouses to their spouses' retirement fund benefits. Pension benefits can be due before, during or after divorce, and parties to the marriage should be aware of their rights with regard to the accruing pension benefits of their spouses. While it is settled law that non-member spouses are entitled to receive a portion of their member spouses' pension benefits (known as "pension interest" immediately on divorce, it is not particularly clear whether non-member spouses are also entitled to receive the same before or sometime after divorce. In this article I provide a contextual understanding of the entitlements (if any which spouses or former spouses of members of pension funds have on such member spouses' retirement benefits. Furthermore, it shown in this article that various divisions of South African High Courts have been inconsistent in how they have approached the issue of the pension interest between divorcing spouses or divorced ex-spouses.

  12. 38 CFR 21.3045 - Entitlement charges.

    Science.gov (United States)

    2010-07-01

    ...) VOCATIONAL REHABILITATION AND EDUCATION Survivors' and Dependents' Educational Assistance Under 38 U.S.C...) Entitlement charges for elementary and secondary education. (1) When an eligible spouse or surviving spouse is... of the course or courses as a result of being— (A) Ordered, in connection with the Persian Gulf War...

  13. Entitlement attitude in the workplace and its relationship to job satisfaction and organizational commitment

    Directory of Open Access Journals (Sweden)

    Sonya Asenova Dragova-Koleva

    2017-05-01

    Full Text Available Background This article is focused on the entitlement attitude in an organizational context. Its purpose was to examine the relationship of entitlement and its 3 components (active, passive and revengefulness with job satisfaction and organizational commitment. Participants and procedure Two independent studies were conducted to examine the discussed relationships. In study 1 and study 2 there participated respectively 110 and 95 full-time employees from both genders working in public and private organizations. The 30-item Bulgarian version of the Entitlement Questionnaire was used. Job satisfaction measurement included employees’ affective response to their overall job and to various aspects of their job. The three aspects of organizational commitment (affective, instrumental and normative were measured. Results Active entitlement had a positive effect on satisfaction with results, satisfaction with supervisor, pay satisfaction and overall job satisfaction. It was not related to organizational commitment. Passive entitlement had a positive effect on satisfaction with tasks, but it correlated negatively with pay satisfaction. Higher level of passive entitlement predicted instrumental commitment. Revengefulness was negatively related to task satisfaction, satisfaction with supervisor and overall satisfaction, and had a negative effect on affective commitment. Conclusions Different forms of entitlement have a diverse influence on the various aspects of job satisfaction and components of organizational commitment. Active and passive types of entitlement are more adaptive, whereas revengefulness is a maladaptive and dysfunctional attitude.

  14. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  15. Permissive parenting and mental health in college students: Mediating effects of academic entitlement.

    Science.gov (United States)

    Barton, Alison L; Hirsch, Jameson K

    2016-01-01

    Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants were 524 undergraduate students at a single institution (52% female; age range = 18-22). Data collection was completed in May 2011. Cross-sectional design. Participants completed online self-report measures of parenting styles, academic entitlement, stress, depressive symptoms, and well-being. Permissive parenting was associated with greater academic entitlement and, in turn, to more perceived stress and poorer mental health. Mother/father differences were found in some cases. Academic entitlement may partially explain why permissive parenting is detrimentally related to mental health for college students. Implications for academic affairs and counseling include helping students develop an appreciation of the role of self-regulation in college success.

  16. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  17. Restricted health care entitlements for child migrants in Europe and Australia

    DEFF Research Database (Denmark)

    Østergaard, Liv Stubbe; Norredam, Marie; Mock-Munoz de Luna, Claire

    2017-01-01

    Background: More than 300 000 asylum seeking children were registered in Europe alone during 2015. In this study, we examined entitlements for health care for these and other migrant children in Europe and Australia in a framework based on United Nations Convention of the Rights of the Child (UNCRC......). Methods: Survey to child health professionals, NGO's and European Ombudspersons for Children in 30 EU/EEA countries and Australia, supplemented by desktop research of official documents. Migrant children were categorised as asylum seekers and irregular/undocumented migrants. Results: Five countries....... Twelve European countries have limited entitlements to health care for asylum seeking children, including Germany that stands out as the country with the most restrictive health care policy for migrant children. In Australia entitlements for health care are restricted for asylum seeking children...

  18. 78 FR 46418 - Proposed Information Collection (Obligation To Report Factors Affecting Entitlement) Activity...

    Science.gov (United States)

    2013-07-31

    ... (Obligation To Report Factors Affecting Entitlement) Activity; Comment Request AGENCY: Veterans Benefits... use of other forms of information technology. Title: Obligation to Report Factors Affecting... entitlement factors. Individual factors such as income, marital status, and the beneficiary's number of...

  19. Between availability and entitlement: The Constitution, Grootboom ...

    African Journals Online (AJOL)

    Between availability and entitlement: The Constitution, Grootboom and the right to food. Danie Brand. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians ...

  20. Tax treaty entitlement issues concerning dual residents

    NARCIS (Netherlands)

    Sanghavi, D.

    2014-01-01

    The question whether a dual resident taxpayer is entitled to tax treaties concluded by each residence state with a third state has been controversial. Since 2008, the Organisation for Economic Co-operation and Development (OECD) Commentary on Article 4(1) of the OECD Model states that such a

  1. Multi Service Proxy: Mobile Web Traffic Entitlement Point in 4G Core Network

    Directory of Open Access Journals (Sweden)

    Dalibor Uhlir

    2015-05-01

    Full Text Available Core part of state-of-the-art mobile networks is composed of several standard elements like GGSN (Gateway General Packet Radio Service Support Node, SGSN (Serving GPRS Support Node, F5 or MSP (Multi Service Proxy. Each node handles network traffic from a slightly different perspective, and with various goals. In this article we will focus only on the MSP, its key features and especially on related security issues. MSP handles all HTTP traffic in the mobile network and therefore it is a suitable point for the implementation of different optimization functions, e.g. to reduce the volume of data generated by YouTube or similar HTTP-based service. This article will introduce basic features and functions of MSP as well as ways of remote access and security mechanisms of this key element in state-of-the-art mobile networks.

  2. Permissive Parenting and Mental Health in College Students: Mediating Effects of Academic Entitlement

    Science.gov (United States)

    Barton, Alison L.; Hirsch, Jameson K.

    2016-01-01

    Objective: Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants:…

  3. 20 CFR 725.228 - Effect of conviction of felonious and intentional homicide on entitlement to benefits.

    Science.gov (United States)

    2010-04-01

    ... intentional homicide on entitlement to benefits. 725.228 Section 725.228 Employees' Benefits EMPLOYMENT... intentional homicide on entitlement to benefits. An individual who has been convicted of the felonious and intentional homicide of a miner or other beneficiary shall not be entitled to receive any benefits payable...

  4. Reforming Equalization: Balancing Efficiency, Entitlement and Ownership

    Directory of Open Access Journals (Sweden)

    Bev Dahlby

    2014-08-01

    Full Text Available In this paper, we provide an overview of the equalization grant system in Canada and the issues that have been raised concerning the reform of the fiscal transfer system. Any reforms to the equalization grant system have to balance three concerns — “efficiency” effects that arise through federal financing of transfers, and the incentive effects on provincial fiscal policies, “entitlement” to reasonably comparable public services at reasonably comparable levels of taxation, and “ownership” of resources and independence of fiscal policies by provincial governments. Five proposals for reform of the equalization system are discussed. With regard to the inclusion rate for resource revenues in equalization formula, we argue that the rate should be reduced from 50 per cent to 25 per cent and that ceiling on total equalization payments should be eliminated. We argue against the proposal to exempt from the calculation of equalization entitlements that are deposited in provincial sovereign wealth funds because this would not reduce total equalization entitlements in present value terms, it would be complex to implement if it extended to all forms of savings by provinces (such as debt reduction, and it would not alter the resource rich provinces’ incentives to save more of their resource revenues. We argue against a proposal to reduce CHT and CST to provinces with above average fiscal capacities because this would reduce their incentive to develop and tax their resources, and it would be counter to the purpose of these block grants, which is to reduce the vertical fiscal imbalance between the federal and the provincial governments. We review the Gusen (2012a proto-type model for incorporating variations in costs and needs in the computation of the equalization entitlements and argue that this procedure seems feasible and merits further analysis.

  5. 20 CFR 404.337 - When does my entitlement to widow's and widower's benefits start and end?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does my entitlement to widow's and widower's benefits start and end? 404.337 Section 404.337 Employees' Benefits SOCIAL SECURITY... does my entitlement to widow's and widower's benefits start and end? (a) We will find you entitled to...

  6. Gender Differences in Pay Histories and Views on Pay Entitlement among University Students.

    Science.gov (United States)

    Desmarais, Serge; Curtis, James

    1997-01-01

    Examines whether gender differences in recent pay experience influence entitlement views by providing different standards for female and male students' judgments of their entitlements. Responses from 309 undergraduate students reveal that income gaps in the full-time working world extended to their own recent work experiences and that these past…

  7. Wealth and the inflated self: class, entitlement, and narcissism.

    Science.gov (United States)

    Piff, Paul K

    2014-01-01

    Americans may be more narcissistic now than ever, but narcissism is not evenly distributed across social strata. Five studies demonstrated that higher social class is associated with increased entitlement and narcissism. Upper-class individuals reported greater psychological entitlement (Studies 1a, 1b, and 2) and narcissistic personality tendencies (Study 2), and they were more likely to behave in a narcissistic fashion by opting to look at themselves in a mirror (Study 3). Finally, inducing egalitarian values in upper-class participants decreased their narcissism to a level on par with their lower-class peers (Study 4). These findings offer novel evidence regarding the influence of social class on the self and highlight the importance of social stratification to understanding basic psychological processes.

  8. 75 FR 68035 - Proposed Information Collection (Evidence for Transfer of Entitlement of Education Benefits...

    Science.gov (United States)

    2010-11-04

    ... (Evidence for Transfer of Entitlement of Education Benefits) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits... receive education benefits under the transfer of entitlement provision of law. Affected Public...

  9. 78 FR 59772 - Proposed Information Collection (Evidence for Transfer of Entitlement of Education Benefits...

    Science.gov (United States)

    2013-09-27

    ... (Evidence for Transfer of Entitlement of Education Benefits) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits... receive education benefits under the transfer of entitlement provision of law. Affected Public...

  10. Social policy and entitlements : a proposal for reform

    NARCIS (Netherlands)

    Nentjes, Andries; Meijer, G; Heijman, WJM; VanOphem, JAC; Verstegen, BHJ

    2006-01-01

    Welfare states citizens have entitlements to a variety of social services provided for free or a price far below cost, such as education, health care, social security and housing. Every citizen benefits, but in their present organisation the social services also have major deficiencies: lack of

  11. Effects of customer entitlement on service workers' physical and psychological well-being: a study of waitstaff employees.

    Science.gov (United States)

    Fisk, Glenda M; Neville, Lukas B

    2011-10-01

    This exploratory study examines the nature of customer entitlement and its impact on front-line service employees. In an open-ended qualitative inquiry, 56 individuals with waitstaff experience described the types of behaviors entitled customers engage in and the kinds of service-related "perks" these individuals feel deserving of. Participants explained how they responded to entitled customers, how and when managers became involved, and how their dealings with these patrons influenced their subjective physical and psychological well-being. We found that the behaviors of entitled customers negatively impacted waitstaff employees. Participants reported physiological arousal, negative affect, burnout, and feelings of dehumanization as a result of dealing with these patrons. While respondents drew on a variety of strategies to manage their encounters with entitled customers, they indicated workplace support was often informal and described feeling abandoned by management in dealing with this workplace stressor. Approaching customer entitlement as a form of microaggression, we offer recommendations for practice and suggest new directions for future research. . (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  12. 75 FR 52619 - Entitlement and Termination Requirements for Stepchildren

    Science.gov (United States)

    2010-08-27

    ... site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2006-0154] RIN 0960-AF78 Entitlement and Termination Requirements for Stepchildren AGENCY: Social Security Administration. ACTION...

  13. Intellectual Freedom and Economic Sufficiency as Educational Entitlements.

    Science.gov (United States)

    Morse, Jane Fowler

    2001-01-01

    Using the theories of John Stuart Mill and Karl Marx, this article supports the educational entitlements of intellectual freedom and economic sufficiency. Explores these issues in reference to their implications for teaching, the teaching profession and its training. Concludes that ideas cannot be controlled by the interests of the dominant class.…

  14. Entitlement to concessionary public transport and wellbeing: a qualitative study of young people and older citizens in London, UK.

    Science.gov (United States)

    Jones, Alasdair; Goodman, Anna; Roberts, Helen; Steinbach, Rebecca; Green, Judith

    2013-08-01

    Access to transport is an important determinant of health, and concessionary fares for public transport are one way to reduce the 'transport exclusion' that can limit access. This paper draws on qualitative data from two groups typically at risk of transport exclusion: young people (12-18 years of age, n = 118) and older citizens (60+ years of age, n = 46). The data were collected in London, UK, where young people and older citizens are currently entitled to concessionary bus travel. We focus on how this entitlement is understood and enacted, and how different sources of entitlement mediate the relationship between transport and wellbeing. Both groups felt that their formal entitlement to travel for free reflected their social worth and was, particularly for older citizens, relatively unproblematic. The provision of a concessionary transport entitlement also helped to combat feelings of social exclusion by enhancing recipients' sense of belonging to the city and to a 'community'. However, informal entitlements to particular spaces on the bus reflected less valued social attributes such as need or frailty. Thus in the course of travelling by bus the enactment of entitlements to space and seats entailed the negotiation of social differences and personal vulnerabilities, and this carried with it potential threats to wellbeing. We conclude that the process, as well as the substance, of entitlement can mediate wellbeing; and that where the basis for providing a given entitlement is widely understood and accepted, the risks to wellbeing associated with enacting that entitlement will be reduced. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. 76 FR 28789 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    Science.gov (United States)

    2011-05-18

    ... NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office... Institute for Occupational Safety and Health (NIOSH) of the Centers for Disease Control and Prevention (CDC), announces the availability of a draft Alert entitled ``Preventing Occupational Respiratory Disease from...

  16. Review Article: Revisiting the Entitlement Approach to Famine ...

    African Journals Online (AJOL)

    Sen's (1981b) entitlement approach conceptualises famine as the characteristics of some people not having enough food to eat but not of there being not enough food to eat. Famine from this perspective is one that occurs without a decline in the macro level supply of food and, hence, it is all about demand failure/shift in the ...

  17. Approaching Corporate Social Responsibility through Kenneth Burke's Notions of Terministic Screens and Entitlement

    DEFF Research Database (Denmark)

    Kampf, Constance

    summarizes Burke's essay, "Antinomies of Definition," from a Grammar of Motives as demonstrating that 'the intrinsic and the extrinsic can change places' "such that to define is always to contextualize and to uncover the absence of a solid ground for a claim to knowledge."2   So if the intrinsic...... allow for user agency, whereas entitlement appears to be focused more at the cultural level, with the agency shared by the 'tribe,' the language itself, and the context of situation.1 In other words, "terministic screens" appear to be extrinsic, while "entitlement" appears to be intrinsic.  Carmichael...... and extrinsic can change places, the interpretive process of "terministic screens" and the constitutive process of "entitlement" may well be reciprocal.  The implications of this reciprocity can be used as a basis for understanding the linguistic and cultural components of Corporate Social Responsibility...

  18. 21 CFR 1.401 - Who is entitled to appeal?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Who is entitled to appeal? 1.401 Section 1.401 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GENERAL ENFORCEMENT REGULATIONS Administrative Detention of Food for Human or Animal Consumption What Is the Appeal...

  19. 76 FR 2758 - Agency Information Collection (Evidence for Transfer of Entitlement of Education Benefits (CFR 21...

    Science.gov (United States)

    2011-01-14

    ... for Transfer of Entitlement of Education Benefits (CFR 21.7080)) Activity Under OMB Review AGENCY... INFORMATION: Title: Evidence for Transfer of Entitlement of Education Benefits (CFR 21.7080). OMB Control... DOD Form 2366-1 to determine whether the dependent qualifies to receive education benefits under the...

  20. 20 CFR 410.250 - Effect of conviction of felonious and intentional homicide on entitlement to benefits.

    Science.gov (United States)

    2010-04-01

    ... intentional homicide on entitlement to benefits. 410.250 Section 410.250 Employees' Benefits SOCIAL SECURITY... conviction of felonious and intentional homicide on entitlement to benefits. An individual who has been finally convicted by a court of competent jurisdiction of the felonious and intentional homicide of a...

  1. Robert Nozick's entitlement theory of justice: a critique | Nnajiofor ...

    African Journals Online (AJOL)

    The burden of this paper is to critique Robert Nozick's entitlement theory of justice which was drafted as an argument against traditional distribution theories. Nozick's theory of justice claims that whether a distribution is just or not depend entirely on how it came about. By contrast, justice according to equality, need, desert or ...

  2. FORUM: Instructional Communication and Millennial Students: Millennial Students in the College Classroom: Adjusting to Academic Entitlement

    Science.gov (United States)

    Goldman, Zachary W.; Martin, Matthew M.

    2016-01-01

    Academic entitlement (AE) refers to the expectation of educational success despite the input of personal effort needed to earn it (Boswell, 2012). Entitled students feel that learning should require minimal work and that difficulties encountered during the learning process should be attributed to instructors, rather than themselves. AE has become…

  3. 76 FR 70117 - Notice of Intent To Grant an Exclusive License; Voltage Networking, LLC

    Science.gov (United States)

    2011-11-10

    ...; Voltage Networking, LLC AGENCY: National Security Agency, Department of Defense (DoD). ACTION: Notice. SUMMARY: The National Security Agency hereby gives notice of its intent to grant Voltage Networking, LLC a... described in the following: Patent No. 6,835,581 entitled ``Method of coating optical device facets with...

  4. Safe water: an enquiry into water entitlements and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2006-01-01

    Privatisation of water delivery is a human rights issue in two distinct ways. Firstly, it implies an institutional change that will tend to impinge on existing access to water. While basic water entitlements are supposed to be protected by human rights law, this is likely to influence

  5. Entitled vengeance: A meta-analysis relating narcissism to provoked aggression.

    Science.gov (United States)

    Rasmussen, Kyler

    2016-07-01

    Narcissism has long been used to predict aggressive or vengeful responses to provocations from others. The strength of this relation can, however, vary widely from study to study. Narcissism and revenge were examined in 84 independent samples (N = 11297), along with the moderating role of sample type (i.e., child/adolescent, prisoner, undergraduate, or general samples), type of narcissism measure used (i.e., Narcissistic Personality Inventory, Psychological Entitlement Scale, Short D3, etc.), the nature of the provocation, and the type of provoked aggression examined. Narcissism was positively related to provoked aggression across studies (ρ = .25), but that relation was stronger in child/adolescent samples (ρ = .36) and when measures of entitlement or vulnerable narcissism were employed (ρ = .29). Implications for practical research, as well as neglected areas of research on narcissism and provoked aggression are discussed. Aggr. Behav. 42:362-379, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  6. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  7. Agentic and communal narcissism and satisfaction with life: The mediating role of psychological entitlement and self-esteem.

    Science.gov (United States)

    Żemojtel-Piotrowska, Magdalena A; Piotrowski, Jarosław P; Maltby, John

    2017-10-01

    This study examined the mediational role of self-esteem (as an enhancement) and psychological entitlement (as a cost) in the relationship between an agentic-communal model of grandiose narcissism and satisfaction with life. Two hundred and forty-eight university undergraduate students completed measures of agentic and communal narcissism, self-esteem, psychological entitlement and satisfaction with life. The findings suggest that there is support for the usefulness of the agentic-communal model of narcissism, and, consistent with predictions in the wider literature, self-esteem and psychological entitlement mediated the relationship between agentic-communal narcissism and life satisfaction. © 2015 International Union of Psychological Science.

  8. Cover Letter Dear Editor, Please find enclosed a paper entitled ...

    African Journals Online (AJOL)

    Ajamein

    Dear Editor,. Please find enclosed a paper entitled ' Intrinsic Kinetics of Fischer- Tropsch Synthesis Over a. Promoted Iron Catalyst '. I am submitting to your journal to be considered for publication as a research paper in Bulletin of the Chemical Society of Ethiopia. The manuscript has not been previously published, is not ...

  9. Entitlement Can Both Decrease and Increase Consumer Susceptibility to Social Influence

    NARCIS (Netherlands)

    van der Heide, Martine; Fennis, Bob; van Ittersum, Koert; Trampe, Debra; Diehl, Kristin; Yoon, Carolyn

    2015-01-01

    Two studies indicate that entitlement—a sense that one deserves special treatment and is exempt from normal social demands—can both buffer and boost consumers’ proneness to social influence. Specifically, Study 1 shows that entitlement reduces susceptibility to consistency appeals. Study 2, however,

  10. Social Vulnerability to Climate Change and the Architecture of Entitlements

    International Nuclear Information System (INIS)

    Adger, W.N.; Kelly, P.M.

    1999-01-01

    The objective of this paper is to outline a conceptual model of vulnerability to climate change as the first step in appraising and understanding the social and economic processes which facilitate and constrain adaptation. Vulnerability as defined here pertains to individuals and social groups. It is the state of individuals, of groups, of communities defined in terms of their ability to cope with and adapt to any external stress placed on their livelihoods and well-being. This proposed approach puts the social and economic well-being of society at the centre of the analysis, thereby reversing the central focus of approaches to climate impact assessment based on impacts on and the adaptability of natural resources or ecosystems and which only subsequently address consequences for human well-being. The vulnerability or security of any group is determined by the availability of resources and, crucially, by the entitlement of individuals and groups to call on these resources. This perspective extends the concept of entitlements developed within neoclassical and institutional economics. Within this conceptual framework, vulnerability can be seen as a socially-constructed phenomenon influenced by institutional and economic dynamics. The study develops proxy indicators of vulnerability related to the structure of economic relations and the entitlements which govern them, and shows how these can be applied to a District in coastal lowland Vietnam. This paper outlines the lessons of such an approach to social vulnerability for the assessment of climate change at the global scale. We argue that the socio-economic and biophysical processes that determine vulnerability are manifest at the local, national, regional and global level but the state of vulnerability itself is associated with a specific population. Aggregation one level to another is therefore not appropriate and global-scale analysis is meaningful only in so far as it deals with the vulnerability of the global

  11. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  12. 38 CFR 3.274 - Relationship of net worth to pension entitlement.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Relationship of net worth to pension entitlement. 3.274 Section 3.274 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUDICATION Pension, Compensation, and Dependency and Indemnity Compensation Regulations...

  13. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement... States to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  14. New designing of E-Learning systems with using network learning

    OpenAIRE

    Malayeri, Amin Daneshmand; Abdollahi, Jalal

    2010-01-01

    One of the most applied learning in virtual spaces is using E-Learning systems. Some E-Learning methodologies has been introduced, but the main subject is the most positive feedback from E-Learning systems. In this paper, we introduce a new methodology of E-Learning systems entitle "Network Learning" with review of another aspects of E-Learning systems. Also, we present benefits and advantages of using these systems in educating and fast learning programs. Network Learning can be programmable...

  15. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Directory of Open Access Journals (Sweden)

    Gillian Hewitt-Stubbs

    2016-01-01

    Full Text Available Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1, young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate.

  16. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Science.gov (United States)

    Hewitt-Stubbs, Gillian; Zimmer-Gembeck, Melanie J.; Mastro, Shawna; Boislard, Marie-Aude

    2016-01-01

    Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1), young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate. PMID:26797642

  17. Visualization and Analysis of Complex Covert Networks

    DEFF Research Database (Denmark)

    Memon, Bisharat

    systems that are covert and hence inherently complex. My Ph.D. is positioned within the wider framework of CrimeFighter project. The framework envisions a number of key knowledge management processes that are involved in the workflow, and the toolbox provides supporting tools to assist human end......This report discusses and summarize the results of my work so far in relation to my Ph.D. project entitled "Visualization and Analysis of Complex Covert Networks". The focus of my research is primarily on development of methods and supporting tools for visualization and analysis of networked......-users (intelligence analysts) in harvesting, filtering, storing, managing, structuring, mining, analyzing, interpreting, and visualizing data about offensive networks. The methods and tools proposed and discussed in this work can also be applied to analysis of more generic complex networks....

  18. What Are Occupational Pension Plan Entitlements Worth in Britain?

    OpenAIRE

    Disney, Richard; Whitehouse, Edward

    1996-01-01

    The acquisition of rights by workers in private pension plans underpins retirement behavior, recruitment policy, and wage structure but there is controversy as to how these individual pension rights should be valued. The paper combines four data-sets to calculate pension entitlements for a sample of 3,000 British workers in 1987. Expected scheme tenure is a key variable in valuation; younger workers and women face greater initial uncertainty as to their pension outcomes, which is resolved as ...

  19. Narcissistic self-esteem or optimal self-esteem? A Latent Profile Analysis of self-esteem and psychological entitlement

    OpenAIRE

    Stronge, Sam; Cichocka, Aleksandra; Sibley, Chris G.

    2016-01-01

    Research into the relationship between self-esteem and narcissism has produced conflicting results, potentially caused by hidden subpopulations that exhibit distinct positive or negative associations. This research uses Latent Profile Analysis to identify profiles within a national panel study (N = 6,471) with differing relationships between psychological entitlement and self-esteem. We identified a narcissistic self-esteem profile (9%) characterised by high entitlement and high self-esteem, ...

  20. 75 FR 69521 - Evidence for Transfer of Entitlement of Education Benefits; Correction

    Science.gov (United States)

    2010-11-12

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0708] Evidence for Transfer of Entitlement of Education Benefits; Correction AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice; correction. SUMMARY: The Department of Veterans Affairs (VA) published a collection of...

  1. College instruction is not so stress free after all: A qualitative and quantitative study of academic entitlement, uncivil behaviors, and instructor strain and burnout.

    Science.gov (United States)

    Jiang, Lixin; Tripp, Thomas M; Hong, Phan Y

    2017-12-01

    The vast majority of today's college students are millennials, who have traits of confidence, tolerance, but also of entitlement and narcissism (Twenge, 2006). Therefore, college instructors face a unique challenge: dealing with the requests from academically entitled students, who have unreasonable expectations of receiving academic success, regardless of performance (Chowning & Campbell, 2009). We conducted two studies to examine whether student academic entitlement would increase instructors' strain and burnout via uncivil behaviors. A qualitative inquiry asked 136 instructors with college-teaching experience to describe types of behaviors entitled students display, their responses to entitled students, and the influence of these interactions on instructors' well-being. Next, a quantitative study with data from 857 college students nested in 34 instructors tested a multilevel mediation model where students' academic entitlement was related to instructor-reported uncivil behaviors, which in turn related to instructors' strain and burnout. Both studies largely support our hypothesis that uncivil behaviors fully mediate the relationship between students' academic entitlement and instructors' strain and burnout. We recommend employing behavioral modification strategies to decrease uncivil behaviors (e.g., class rules regarding uncivil behaviors might be specified in the course syllabus and consistently enforced) because academic entitlement attitudes are largely stable beliefs and thus may be less amenable to modification. Copyright © 2017 John Wiley & Sons, Ltd.

  2. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.4... Entitlement is created when a Federal Reserve Bank indicates by book-entry that a Book-entry Sallie Mae... the books of a Federal Reserve Bank is thereby effected and perfected, and has priority over any other...

  3. It is all about being popular: The effects of need for popularity on social network site use

    OpenAIRE

    Utz, S.; Tanis, M.A.; Vermeulen, I.E.

    2012-01-01

    Prior research on predictors of social network site (SNS) use has mainly focused on the Big Five, narcissism, and self-esteem. Results have been inconsistent, and variance explained was rather low. Need for popularity (NfP) might be a better predictor of SNS use, because SNSs are ideal venues for people with a high NfP. Study 1 tested NfP, self-esteem, need to belong, entitlement, and vanity as predictors for a range of SNS behaviors; Study 2 replaced entitlement and vanity with narcissism an...

  4. Informing resource-poor populations and the delivery of entitled health and social services in rural India: a cluster randomized controlled trial.

    Science.gov (United States)

    Pandey, Priyanka; Sehgal, Ashwini R; Riboud, Michelle; Levine, David; Goyal, Madhav

    2007-10-24

    A lack of awareness about entitled health and social services may contribute to poor delivery of such services in developing countries, especially among individuals of low socioeconomic status. To determine the impact of informing resource-poor rural populations about entitled services. Community-based, cluster randomized controlled trial conducted from May 2004 to May 2005 in 105 randomly selected village clusters in Uttar Pradesh state in India. Households (548 intervention and 497 control) were selected by a systematic sampling design, including both low-caste and mid- to high-caste households. Four to 6 public meetings were held in each intervention village cluster to disseminate information on entitled health services, entitled education services, and village governance requirements. No intervention took place in control village clusters. Visits by nurse midwife; prenatal examinations, tetanus vaccinations, and prenatal supplements received by pregnant women; vaccinations received by infants; excess school fees charged; occurrence of village council meetings; and development work in villages. At baseline, there were no significant differences in self-reported delivery of health and social services. After 1 year, intervention villagers reported better delivery of several services compared with control villagers: in a multivariate analysis, 30% more prenatal examinations (95% confidence interval [CI], 17%-43%; P India about entitled services enhanced the delivery of health and social services among both low- and mid- to high-caste households. Interventions that emphasize educating resource-poor populations about entitled services may improve the delivery of such services. clinicaltrials.gov Identifier: NCT00421291.

  5. Can a sense of entitlement increase stealing?

    DEFF Research Database (Denmark)

    Gravert, Christina Annette

    Are people more likely to steal when the payoff they deserve is determined randomly or when it depends on their performance in a difficult task? In this paper I investigate how the probability of stealing is affected by the way in which payoff is earned. After answering a short survey one group...... to take the (undeserved) maximum payoff than the participants in the random payment scheme. In contrast to previous findings in the cheating literature, stealing is an all-or-nothing decision rather than a trade-off between a slightly higher payoff and the desire to keep ones moral values intact....... The results support the theory that unethical behavior is increased by a sense of entitlement, which is more pronounced when wealth depends on performance than on the roll of a die....

  6. Student Entitlement Models in Australia's National Training System: Expert Views. Occasional Paper

    Science.gov (United States)

    Bowman, Kaye; McKenna, Suzy

    2016-01-01

    This occasional paper provides the views of 17 "thought leaders" in the Australian vocational education and training (VET) sector. Their insight and opinions were sought to inform a larger research project focused on the student entitlement reforms that were introduced into the national VET system from 2012. These individuals offered a…

  7. Entitlement to Sickness Benefits in Sweden: The Social Insurance Officers Experiences

    Directory of Open Access Journals (Sweden)

    Ulrika Müssener

    2008-01-01

    Full Text Available Background: Social insurance offices (SIOs handle a wide range of complex assessments of the entitlement to sickness benefits for an increasing number of clients on sick leave and consequently, the demands on the SIOs have increased considerably.Aim: To gain deeper knowledge of the problems experienced by the SIOs in their work associated with entitlement to sickness benefits.Method: A descriptive and explorative qualitative approach was used to analyse data from two focus-group interviews, including six participants in each group.Results: The participants discussed different dilemmas in regard to; physicians’ responsibility for issuing sickness certificates, interactions with the insured individuals, disclosure of decisions, communications with medical consultants, documentation of sickness benefit claims, threats in the workplace, as well as their own competence. The SIOs regarded incomplete information on sickness certificates as a main problem, because they frequently had to contact the client and the physicians who issued the certificates in order to obtain further details, leading to delays in the decision-making whether to grant sickness benefits.Conclusions: More knowledge regarding SIOs work is required to improve the methods used in the sickness insurance system and to ensure adequate training of new staff members.

  8. 5 CFR 1651.2 - Entitlement to funds in a deceased participant's account.

    Science.gov (United States)

    2010-01-01

    ... BOARD DEATH BENEFITS § 1651.2 Entitlement to funds in a deceased participant's account. (a) Death... participant will be paid as a death benefit to the individual or individuals surviving the participant, in the... representation in accordance with § 1651.6; (4) If there are no beneficiaries or persons as described in...

  9. Measuring policy entitlements at the micro-level: maternity and parental leave in Europe

    NARCIS (Netherlands)

    Bártová, A.; Emery, T.

    2018-01-01

    Comparative social policy analysis has been shaped by the measurement of policy as a macro phenomenon. However, social policy theories have consistently asserted that policy entitlements vary across class, gender, ethnicity and the life-course. This paper synthesises a number of innovations to

  10. Employee entitlements during pregnancy and maternal psychological well-being.

    Science.gov (United States)

    Cooklin, Amanda R; Rowe, Heather J; Fisher, Jane R W

    2007-12-01

    Antenatal psychological well-being is multifactorially determined, including by social circumstances. Evidence suggests that workplace conditions are salient determinants of mental health, but it is not known whether employment conditions influence antenatal psychological well-being. To investigate the relationship between employment conditions and antenatal psychological well-being in Australian women. A sociodemographically diverse consecutive cohort of employed nulliparous women was recruited in late pregnancy. Data were collected by a structured interview assessing sociodemographic characteristics, employment arrangements, experience of pregnancy-related discrimination, and access to maternity leave entitlements. Participants completed two standardised psychometric measures of maternal mood: the Edinburgh Depression Scale (EDS) and the Profile of Mood States (PoMS). Comparisons of self-reported mood were made between women by experience of workplace adversity, using a composite measure of workplace events. Of 205 eligible women, 165 agreed to participate. Of these, 114 of 165 (69%) reported at least one form of workplace adversity during pregnancy. More women without private health insurance (78%) reported workplace adversity than those who were privately insured (57%) (chi2(1)=6.95, P=0.008). Women experiencing workplace adversity had significantly worse psychological well-being as indicated by the EDS score (7.7+/-5.1) than those who were experiencing no workplace adversity (5.5+/-3.4), mean difference (95% CI)=-2.2 (-3.7 to -0.8), P=0.003. Similar results were reported for the PoMS. Workplace adversity during pregnancy is associated with poorer maternal psychological well-being. Workplace conditions and entitlements are salient factors for consideration in assessments of antenatal psychosocial well-being.

  11. Generation Me in the spotlight : Linking reality TV to materialism, entitlement, and narcissism

    NARCIS (Netherlands)

    Opree, S.J.; Kühne, R.

    2016-01-01

    Today’s youth, the Generation Me, is deemed materialistic, entitled, and narcissistic. Individuality has become an important value in child-rearing and is cultivated in the media—especially within the reality TV genre. The aim of this study was to investigate whether adolescents’ and emerging

  12. 41 CFR 302-2.3 - What determines my entitlements and allowances for relocation?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false What determines my entitlements and allowances for relocation? 302-2.3 Section 302-2.3 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES INTRODUCTION 2-EMPLOYEES ELIGIBILITY REQUIREMENTS...

  13. Is the Narcissistic Personality Inventory Still Relevant? A Test of Independent Grandiosity and Entitlement Scales in the Assessment of Narcissism

    Science.gov (United States)

    Miller, Joshua D.; Price, Joanna; Campbell, W. Keith

    2012-01-01

    Some scholars have called for the replacement of the Narcissistic Personality Inventory (NPI) with more narrow scales measuring grandiosity and entitlement instead. In the current study, the authors examined the relations among the NPI and measures of grandiosity and entitlement, as well as in relation to a measure of the Five-Factor Model (FFM).…

  14. Embedded Electro-Optic Sensor Network for the On-Site Calibration and Real-Time Performance Monitoring of Large-Scale Phased Arrays

    National Research Council Canada - National Science Library

    Yang, Kyoung

    2005-01-01

    This final report summarizes the progress during the Phase I SBIR project entitled "Embedded Electro-Optic Sensor Network for the On-Site Calibration and Real-Time Performance Monitoring of Large-Scale Phased Arrays...

  15. Kandungan Gizi dan Indeks Glikemik Bolu Kukus yang Terbuat Dari Tepung Ubi Jalar dan Rumput Laut

    OpenAIRE

    Alamsyah, Wahidatul Ukhra

    2016-01-01

    Steamed sponge cake made from purple sweet potato flour and seaweed flour is an alternative food are subsituting wheat flour with purple sweet potatoes and seaweeds. Purple sweet potatoes contents much β-carotene which is caused this steamed sponge cake as a kind of cake rich in antioxidants. Purple sweet potato can be processed into refined products, one of them into flour. Through the purple sweet potato flour caan also be processed into steamed sponge cake. To enrich the fiber, steamed spo...

  16. Bribery games on inter-dependent regular networks.

    Science.gov (United States)

    Verma, Prateek; Nandi, Anjan K; Sengupta, Supratim

    2017-02-16

    We examine a scenario of social conflict that is manifest during an interaction between government servants providing a service and citizens who are legally entitled to the service, using evolutionary game-theory in structured populations characterized by an inter-dependent network. Bribe-demands by government servants during such transactions, called harassment bribes, constitute a widespread form of corruption in many countries. We investigate the effect of varying bribe demand made by corrupt officials and the cost of complaining incurred by harassed citizens, on the proliferation of corrupt strategies in the population. We also examine how the connectivity of the various constituent networks affects the spread of corrupt officials in the population. We find that incidents of bribery can be considerably reduced in a network-structured populations compared to mixed populations. Interestingly, we also find that an optimal range for the connectivity of nodes in the citizen's network (signifying the degree of influence a citizen has in affecting the strategy of other citizens in the network) as well as the interaction network aids in the fixation of honest officers. Our results reveal the important role of network structure and connectivity in asymmetric games.

  17. Bribery games on inter-dependent regular networks

    Science.gov (United States)

    Verma, Prateek; Nandi, Anjan K.; Sengupta, Supratim

    2017-02-01

    We examine a scenario of social conflict that is manifest during an interaction between government servants providing a service and citizens who are legally entitled to the service, using evolutionary game-theory in structured populations characterized by an inter-dependent network. Bribe-demands by government servants during such transactions, called harassment bribes, constitute a widespread form of corruption in many countries. We investigate the effect of varying bribe demand made by corrupt officials and the cost of complaining incurred by harassed citizens, on the proliferation of corrupt strategies in the population. We also examine how the connectivity of the various constituent networks affects the spread of corrupt officials in the population. We find that incidents of bribery can be considerably reduced in a network-structured populations compared to mixed populations. Interestingly, we also find that an optimal range for the connectivity of nodes in the citizen’s network (signifying the degree of influence a citizen has in affecting the strategy of other citizens in the network) as well as the interaction network aids in the fixation of honest officers. Our results reveal the important role of network structure and connectivity in asymmetric games.

  18. Learning Based on the Project Entitled "Design and Construction of a Wooden Bridge"

    Science.gov (United States)

    Barris, Cristina; Torres, Lluís; Simon, Enric

    2016-01-01

    This article presents the results of a case involving the application of project-based learning carried out with students in the Mechanical Engineering degree program at the University of Girona. The project, entitled "Design and construction of a wooden bridge", was conducted at the Polytechnic School in the third-year Structures…

  19. 20 CFR 725.201 - Who is entitled to benefits; contents of this subpart.

    Science.gov (United States)

    2010-04-01

    ... surviving spouse or child, or the surviving dependent brothers or sisters, where there is no surviving... part the term “total disability” shall mean partial disability with respect to a claim for which... entitlement to benefits applicable to a miner, or a surviving spouse, child, parent, brother, or sister, and...

  20. 38 CFR 3.1000 - Entitlement under 38 U.S.C. 5121 to benefits due and unpaid upon death of a beneficiary.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Entitlement under 38 U.S.C. 5121 to benefits due and unpaid upon death of a beneficiary. 3.1000 Section 3.1000 Pensions... Dependency and Indemnity Compensation Accrued § 3.1000 Entitlement under 38 U.S.C. 5121 to benefits due and...

  1. Recurrence Density Enhanced Complex Networks for Nonlinear Time Series Analysis

    Science.gov (United States)

    Costa, Diego G. De B.; Reis, Barbara M. Da F.; Zou, Yong; Quiles, Marcos G.; Macau, Elbert E. N.

    We introduce a new method, which is entitled Recurrence Density Enhanced Complex Network (RDE-CN), to properly analyze nonlinear time series. Our method first transforms a recurrence plot into a figure of a reduced number of points yet preserving the main and fundamental recurrence properties of the original plot. This resulting figure is then reinterpreted as a complex network, which is further characterized by network statistical measures. We illustrate the computational power of RDE-CN approach by time series by both the logistic map and experimental fluid flows, which show that our method distinguishes different dynamics sufficiently well as the traditional recurrence analysis. Therefore, the proposed methodology characterizes the recurrence matrix adequately, while using a reduced set of points from the original recurrence plots.

  2. 20 CFR 416.986 - Why and when we will find that you are no longer entitled to benefits based on statutory blindness.

    Science.gov (United States)

    2010-04-01

    ... longer entitled to benefits based on statutory blindness. 416.986 Section 416.986 Employees' Benefits... Disability and Blindness Blindness § 416.986 Why and when we will find that you are no longer entitled to benefits based on statutory blindness. (a) If your vision does not meet the definition of blindness. If you...

  3. Proceedings 2001. Networks. Section 3. Book 4

    International Nuclear Information System (INIS)

    Shukleva, Eva; Taleski, Rubin

    2001-01-01

    The holding of this Symposium was initiated by MAKO CIGRE - Macedonian Committee on Large High Voltage Systems, in compliance with its determination to raise competent discussions on current issues. The 3 sections of the conference were entitled: (1) power plants facilities, (2) power transmission lines, (3) networks. The forth volume includes the following topics: STK 36 - electromagnetic compatibility; STK 37 - planning and development of the power systems; STK 38 - power systems analysis and STK 39 - power systems control. Papers relevant to INIS are indexed separately

  4. Can we make a new deal? Entitlement reform sounds alluring, but the reality is stark.

    Science.gov (United States)

    Wagner, L

    1995-01-20

    After simmering for more than a decade, the Great Entitlement Debate promises to dominate the 1995 congressional agenda. But lost amid a tangle of conflicting parochial interests, voter confusion and searing partisan rhetoric are some harsh truths about our options.

  5. Perceived entitlement causes discrimination against attractive job candidates in the domain of relatively less desirable jobs.

    Science.gov (United States)

    Lee, Margaret; Pitesa, Marko; Pillutla, Madan M; Thau, Stefan

    2018-03-01

    People generally hold positive stereotypes of physically attractive people and because of those stereotypes often treat them more favorably. However, we propose that some beliefs about attractive people, specifically, the perception that attractive individuals have a greater sense of entitlement than less attractive individuals, can result in negative treatment of attractive people. We examine this in the context of job selection and propose that for relatively less desirable jobs, attractive candidates will be discriminated against. We argue that the ascribed sense of entitlement to good outcomes leads to perceptions that attractive individuals are more likely to be dissatisfied working in relatively less desirable jobs. When selecting candidates for relatively less desirable jobs, decision makers try to ascertain whether a candidate would be satisfied in those jobs, and the stereotype of attractive individuals feeling entitled to good outcomes makes decision makers judge attractive candidates as more likely to be dissatisfied in relatively less (but not more) desirable jobs. Consequently, attractive candidates are discriminated against in the selection for relatively less desirable jobs. Four experiments found support for this theory. Our results suggest that different discriminatory processes operate when decision makers select among candidates for relatively less desirable jobs and that attractive people might be systematically discriminated against in a segment of the workforce. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  6. 76 FR 30366 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    Science.gov (United States)

    2011-05-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [Docket Number NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office... Institute for Occupational Safety and Health, Centers for Disease Control and Prevention. [FR Doc. 2011...

  7. International comparison of systems to determine entitlements to medical specialist care: performance and organizational issues

    NARCIS (Netherlands)

    E.A. Stolk (Elly); A.A. de Bont (Antoinette); M.J. Poley (Marten); S. Jerak (Sonja); M. Stroet (Mary); F.F.H. Rutten (Frans)

    2008-01-01

    textabstractSummary Objective: CVZ has asked us to provide a comparison of criteria and procedures that different countries use to determine entitlements to medical specialist care. This question was asked within the context of the recent introduction of the DBC (diagnosis treatment combinations)

  8. 20 CFR 404.467 - Nonpayment of benefits; individual entitled to disability insurance benefits or childhood...

    Science.gov (United States)

    2010-04-01

    ... type of substantial gainful activity. (b) Childhood disability benefits. An individual who has attained... Nonpayments of Benefits § 404.467 Nonpayment of benefits; individual entitled to disability insurance benefits... definition of disability for disability insurance benefits purposes based on statutory blindness, as defined...

  9. Unveiling network-based functional features through integration of gene expression into protein networks.

    Science.gov (United States)

    Jalili, Mahdi; Gebhardt, Tom; Wolkenhauer, Olaf; Salehzadeh-Yazdi, Ali

    2018-06-01

    Decoding health and disease phenotypes is one of the fundamental objectives in biomedicine. Whereas high-throughput omics approaches are available, it is evident that any single omics approach might not be adequate to capture the complexity of phenotypes. Therefore, integrated multi-omics approaches have been used to unravel genotype-phenotype relationships such as global regulatory mechanisms and complex metabolic networks in different eukaryotic organisms. Some of the progress and challenges associated with integrated omics studies have been reviewed previously in comprehensive studies. In this work, we highlight and review the progress, challenges and advantages associated with emerging approaches, integrating gene expression and protein-protein interaction networks to unravel network-based functional features. This includes identifying disease related genes, gene prioritization, clustering protein interactions, developing the modules, extract active subnetworks and static protein complexes or dynamic/temporal protein complexes. We also discuss how these approaches contribute to our understanding of the biology of complex traits and diseases. This article is part of a Special Issue entitled: Cardiac adaptations to obesity, diabetes and insulin resistance, edited by Professors Jan F.C. Glatz, Jason R.B. Dyck and Christine Des Rosiers. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. Entitlement to vote in the Cantons of Geneva and Vaud and eligibility for election in the Canton of Vaud

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that some international civil servants and members of their families are henceforth entitled to vote on commune matters in the Canton of Geneva and are entitled to vote and are eligible for election at commune level in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise this entitlement, you are invited to consult the information published, in French only, on the Swiss Mission's website: http://www.dfae.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud), In this regard, you are reminded that: Under Articles I 3.05 and I 3.07 of the Staff Rules, a member of the personnel 'may take part, outside the Organization, in the public and political life of a State in accordance with the relevant legislation' and 'express his own person...

  11. Characteristics of DNA-AuNP networks on cell membranes and real-time movies for viral infection.

    Science.gov (United States)

    Li, Chunmei; Zheng, Linling; Yang, Xiaoxi; Wan, Xiaoyan; Wu, Wenbi; Zhen, Shujun; Li, Yuanfang; Luo, Lingfei; Huang, Chengzhi

    2016-03-01

    This data article provides complementary data for the article entitled "DNA-AuNP networks on cell membranes as a protective barrier to inhibit viral attachment, entry and budding" Li et al. (2016) [1]. The experimental methods for the preparation and characterization of DNA-conjugated nanoparticle networks on cell membranes were described. Confocal fluorescence images, agarose gel electrophoresis images and hydrodynamic diameter of DNA-conjugated gold nanoparticle (DNA-AuNP) networks were presented. In addition, we have prepared QDs-labeled RSV (QDs-RSV) to real-time monitor the RSV infection on HEp-2 cells in the absence and presence of DNA-AuNP networks. Finally, the cell viability of HEp-2 cells coated by six types of DNA-nanoparticle networks was determined after RSV infection.

  12. Bribery games on interdependent complex networks.

    Science.gov (United States)

    Verma, Prateek; Nandi, Anjan K; Sengupta, Supratim

    2018-08-07

    Bribe demands present a social conflict scenario where decisions have wide-ranging economic and ethical consequences. Nevertheless, such incidents occur daily in many countries across the globe. Harassment bribery constitute a significant sub-set of such bribery incidents where a government official demands a bribe for providing a service to a citizen legally entitled to it. We employ an evolutionary game-theoretic framework to analyse the evolution of corrupt and honest strategies in structured populations characterized by an interdependent complex network. The effects of changing network topology, average number of links and asymmetry in size of the citizen and officer population on the proliferation of incidents of bribery are explored. A complex network topology is found to be beneficial for the dominance of corrupt strategies over a larger region of phase space when compared with the outcome for a regular network, for equal citizen and officer population sizes. However, the extent of the advantage depends critically on the network degree and topology. A different trend is observed when there is a difference between the citizen and officer population sizes. Under those circumstances, increasing randomness of the underlying citizen network can be beneficial to the fixation of honest officers up to a certain value of the network degree. Our analysis reveals how the interplay between network topology, connectivity and strategy update rules can affect population level outcomes in such asymmetric games. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Developmental Trajectories of Work Values and Job Entitlement Beliefs in the Transition to Adulthood

    Science.gov (United States)

    Chow, Angela; Krahn, Harvey J.; Galambos, Nancy L.

    2014-01-01

    Employing a life span developmental systems perspective, this study used a 5-wave (1985-1992) Canadian longitudinal data set (N = 404) to examine trajectories of intrinsic and extrinsic work values and job entitlement beliefs from age 18 to 25. Piecewise growth models (Slope 1: age 18-20; Slope 2: age 20-25) showed intriguing patterns of change.…

  14. 20 CFR 222.53 - When a legally adopted child is dependent-child adopted after entitlement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false When a legally adopted child is dependent-child adopted after entitlement. 222.53 Section 222.53 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT FAMILY RELATIONSHIPS Child Support and Dependency § 222.53 When...

  15. Transfer of single farm payment entitlements to farm successors: impact on structural change and rental prices in Switzerland

    Directory of Open Access Journals (Sweden)

    Gabriele Mack

    2013-09-01

    Full Text Available This paper analyses the impact of tradable and non-tradable single farm payment (SFP entitlements for farm successors on structural change and the lease market. Using the example of Swiss agriculture, the effects on rental-price trends and farm-exit rates are investigated. An ex-ante normative impact analysis is performed with the agent-based agricultural-sector model SWISSland, which simulates structural change processes and income trends in Swiss agriculture over a period of up to 15 years. A land market implemented at municipality level simulates the plot-by-plot leasing of land to surrounding neighbouring agents that is common in Switzerland. Allocation of plots to tenants as well as lease pricing is modelled taking into account the farm-specific land rents. The results show that personalised SFP entitlements which could not be transferred to a farm successor not only cause an intensification of structural change, but would also thus lead to a substantial reduction in rental prices. SFP entitlements which were successfully transferred to farm successors have only a slight impact on structural change and the rental prices of arable land. Only for grassland in the mountain region does a stronger shift result in a significant reduction in rental prices.

  16. The Impact of Active Labor Market Programs and Benefit Entitlement Rules on the Duration of Unemployment

    NARCIS (Netherlands)

    Lalive, R.; van Ours, J.C.; Zweimüller, J.

    2000-01-01

    Swiss policy makers created a unique link between unemployment benefits and active labor market programs (ALMPs) by making benefit payments conditional on program attendance after 7 months of unemployment duration. We evaluate the effect of ALMPs and benefit entitlement on the duration of

  17. Economic Entitlements via Entrepreneurial Conduct? Women and Financial Inclusion in Neo-liberal India

    Directory of Open Access Journals (Sweden)

    K. Kalpana

    2015-08-01

    Full Text Available This paper examines the gendered local character of neoliberalism at the household level by focusing on microcredit/finance programs in India. Microfinance promoted by the state as an informal activity targeting women is intended to alleviate income inequalities, even as it contributes to maintaining the world capitalist system. In India the inception of microfinance-based Self Help Groups (SHGs or peer groups of women savers and borrowers in the 1990s has coincided with a rightward turn towards neoliberal policies of structural adjustment, privatization and economic deregulation. In this paper, I show how Indian policy makers have endeavored to make women's economic entitlements contingent upon their disciplined financial behavior and their willing participation in neoliberal agendas of creating and deepening 'self-regulating' markets at village levels. Drawing on an ethnographic study conducted in a South Indian state, I show that the community level 'neoliberal disciplining' that microfinance entails does not proceed without resistance. Whilst SHGs seek to constitute women as fiscally disciplined savers and borrowers, women stake their 'rightful' entitlement to bank credit even as they reject outright the entrepreneurial subjectivities they are expected to assume. They pursue purposes and ends that extend well beyond 'financial inclusion.'

  18. Human Rights as Practice: Dalit Women's Collective Action to Secure Livelihood Entitlements in rural South India

    NARCIS (Netherlands)

    Mangubhai, Y.

    2012-01-01

    In this dissertation, I investigate how Dalit women in rural South India secure livelihood entitlements by analysing processes of social exclusion as well as collective action by these women through their perspectives. This problematic requires focus on how caste, class and gender mutually construct

  19. Toetsing van het gehalte duurzame veiligheid met Safer Transportation Network Planning : integratie van de ‘DV-gehaltemeter’ in het ontwerpprogramma ‘Safer-TNP’

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    Testing the sustainable-safety contents with Safer Transportation Network Planning. In the publication entitled “Developing a sustainable-safety meter (DV-meter) for measuring the sustainable-safety contents” (Van der Kooi & Dijkstra, 2000), the development of and a pilot measurement with a

  20. Alien Registration Number Verification via the U.S. Citizenship and Immigration Service's Systematic Alien Verification for Entitlements System

    National Research Council Canada - National Science Library

    Ainslie, Frances M; Buck, Kelly R

    2008-01-01

    The purpose of this study was to evaluate the implications of conducting high-volume automated checks of the United States Citizenship and Immigration Services Systematic Allen Verification for Entitlements System (SAVE...

  1. The Making of a Good Woman: Extended Parental Leave Entitlements and Mothers' Work Commitment in Germany.

    Science.gov (United States)

    Gangl, Markus; Ziefle, Andrea

    2015-09-01

    The authors investigate the relationship between family policy and women's attachment to the labor market, focusing specifically on policy feedback on women's subjective work commitment. They utilize a quasi-experimental design to identify normative policy effects from changes in mothers' work commitment in conjunction with two policy changes that significantly extended the length of statutory parental leave entitlements in Germany. Using unique survey data from the German Socio-Economic Panel and difference-in-differences, triple-differenced, and instrumental variables estimators for panel data, they obtain consistent empirical evidence that increasing generosity of leave entitlements led to a decline in mothers' work commitment in both East and West Germany. They also probe potential mediating mechanisms and find strong evidence for role exposure and norm setting effects. Finally, they demonstrate that policy-induced shifts in mothers' preferences have contributed to. retarding women's labor force participation after childbirth in Germany, especially as far as mothers' return to full-time employment is concerned.

  2. Entitlement theory of justice and end-state fairness in the allocation of goods

    OpenAIRE

    Ju, Biung-Ghi; Moreno-Ternero, Juan D.

    2016-01-01

    Robert Nozick allegedly introduced his liberal theory of private ownership as an objection to theories of end-state justice. Nevertheless, we show that, in a stylized framework for the allocation of goods in joint ventures, both approaches can be seen as complementary. More precisely, in such a context, self-ownership (the basis for Nozick's entitlement theory of justice) followed by voluntary transfer (Nozick's principle of just transfer) can lead to end-state fairness (as well as Pareto eff...

  3. 20 CFR 222.54 - When a legally adopted child is dependent-grandchild or stepgrandchild adopted after entitlement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false When a legally adopted child is dependent-grandchild or stepgrandchild adopted after entitlement. 222.54 Section 222.54 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT FAMILY RELATIONSHIPS Child Support and...

  4. The vision of a future energy supply network

    International Nuclear Information System (INIS)

    Koeppel, G.; Favre-Perrod, P.; Geidl, M.; Kloeckl, B.

    2005-01-01

    This article discusses a concept developed within the framework of a project entitled 'Vision of Future Energy Networks' carried out at the Swiss Federal Institute of Technology in Zurich. The project looked at the possibility of using synergies between various energy carriers and systems. Network topologies are discussed that can cope with the distributed production of energy in installations featuring technologies such as combined heat and power, micro gas turbines and wind-power installations. The topics discussed include the use of a large amount of such distributed generation capacity and which network topologies and storage requirements would be necessary for their operation. Also, under the title 'energy hubs', possible synergies with other forms of energy use are examined. The modelling, dimensioning and use of such hubs are dealt with for various scenarios, ranging from single family homes through to combinations of industrial complexes and whole residential areas. Questions of reliability are addressed and the idea of an 'Energy Interconnector' that supplies electrical, chemical and thermal energy is introduced

  5. The Relationship between Academic Entitlement, Academic Performance, and Satisfaction with Life in a College Student Population

    Science.gov (United States)

    Reysen, Rebekah H.

    2013-01-01

    Although academic entitlement (AE) has become a popular topic of discussion in the media, it has received very little scholarly focus in the higher education literature to date. AE has been defined as a belief held by students that they deserve high grades in school despite a lack of effort put forth into their work (Chowning & Campbell,…

  6. Regulations implementing the Byrd Amendments to the Black Lung Benefits Act: determining coal miners' and survivors' entitlement to benefits. Final rule.

    Science.gov (United States)

    2013-09-25

    This final rule revises the Black Lung Benefits Act (BLBA or Act) regulations to implement amendments made by the Patient Protection and Affordable Care Act (ACA). The ACA amended the BLBA in two ways. First, it revived a rebuttable presumption of total disability or death due to pneumoconiosis for certain claims. Second, it reinstituted automatic entitlement to benefits for certain eligible survivors of coal miners whose lifetime benefit claims were awarded because they were totally disabled due to pneumoconiosis. These regulations clarify how the statutory presumption may be invoked and rebutted and the application and scope of the survivor-entitlement provision. The rule also eliminates several unnecessary or obsolete provisions.

  7. Social care networks and older LGBT adults: challenges for the future.

    Science.gov (United States)

    Brennan-Ing, Mark; Seidel, Liz; Larson, Britta; Karpiak, Stephen E

    2014-01-01

    Research on service needs among older adults rarely addresses the special circumstances of lesbian, gay, bisexual, and transgender (LGBT) individuals, such as their reliance on friend-centered social networks or the experience of discrimination from service providers. Limited data suggests that older LGBT adults underutilize health and social services that are important in maintaining independence and quality of life. This study explored the social care networks of this population using a mixed-methods approach. Data were obtained from 210 LGBT older adults. The average age was 60 years, and 71% were men, 24% were women, and 5% were transgender or intersex. One-third was Black, and 62% were Caucasian. Quantitative assessments found high levels of morbidity and friend-centered support networks. Need for and use of services was frequently reported. Content analysis revealed unmet needs for basic supports, including housing, economic supports, and help with entitlements. Limited opportunities for socialization were strongly expressed, particularly among older lesbians. Implications for senior programs and policies are discussed.

  8. 45 CFR 506.18 - Entitlement of survivors to award in case of death of prisoner of war.

    Science.gov (United States)

    2010-10-01

    ... of prisoner of war. 506.18 Section 506.18 Public Welfare Regulations Relating to Public Welfare..., ADMINISTRATION, AND PAYMENT OF CLAIMS UNDER TITLE I OF THE WAR CLAIMS ACT OF 1948, AS AMENDED ELIGIBILITY REQUIREMENTS FOR COMPENSATION Prisoners of War § 506.18 Entitlement of survivors to award in case of death of...

  9. It is all about being popular: the effects of need for popularity on social network site use.

    Science.gov (United States)

    Utz, Sonja; Tanis, Martin; Vermeulen, Ivar

    2012-01-01

    Prior research on predictors of social network site (SNS) use has mainly focused on the Big Five, narcissism, and self-esteem. Results have been inconsistent, and variance explained was rather low. Need for popularity (NfP) might be a better predictor of SNS use, because SNSs are ideal venues for people with a high NfP. Study 1 tested NfP, self-esteem, need to belong, entitlement, and vanity as predictors for a range of SNS behaviors; Study 2 replaced entitlement and vanity with narcissism and added the Big Five as predictors. SNS behaviors assessed were grooming, strategic self-presentation, profile enhancement, disclosure of feelings, routine use of SNS, and number of friends. Results showed that NfP was the strongest and most consistent predictor of SNS behaviors. This pattern indicates that NfP plays an important role in SNSs.

  10. Modeling Marine Electromagnetic Survey with Radial Basis Function Networks

    Directory of Open Access Journals (Sweden)

    Agus Arif

    2014-11-01

    Full Text Available A marine electromagnetic survey is an engineering endeavour to discover the location and dimension of a hydrocarbon layer under an ocean floor. In this kind of survey, an array of electric and magnetic receivers are located on the sea floor and record the scattered, refracted and reflected electromagnetic wave, which has been transmitted by an electric dipole antenna towed by a vessel. The data recorded in receivers must be processed and further analysed to estimate the hydrocarbon location and dimension. To conduct those analyses successfuly, a radial basis function (RBF network could be employed to become a forward model of the input-output relationship of the data from a marine electromagnetic survey. This type of neural networks is working based on distances between its inputs and predetermined centres of some basis functions. A previous research had been conducted to model the same marine electromagnetic survey using another type of neural networks, which is a multi layer perceptron (MLP network. By comparing their validation and training performances (mean-squared errors and correlation coefficients, it is concluded that, in this case, the MLP network is comparatively better than the RBF network[1].[1] This manuscript is an extended version of our previous paper, entitled Radial Basis Function Networks for Modeling Marine Electromagnetic Survey, which had been presented on 2011 International Conference on Electrical Engineering and Informatics, 17-19 July 2011, Bandung, Indonesia.

  11. 20 CFR 404.340 - How do I become entitled to mother's or father's benefits as a surviving divorced spouse?

    Science.gov (United States)

    2010-04-01

    ... described in § 404.345 or you were deemed to be validly married as described in § 404.346 but the marriage... not entitled to widow's or widower's benefits, or to an old-age benefit that is equal to or larger...

  12. 12 CFR 617.7100 - Who must make and who is entitled to receive an effective interest rate disclosure?

    Science.gov (United States)

    2010-01-01

    ... effective interest rate disclosure? 617.7100 Section 617.7100 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM BORROWER RIGHTS Disclosure of Effective Interest Rates § 617.7100 Who must make and who is entitled to receive an effective interest rate disclosure? (a) A qualified lender must make the...

  13. Human Rights Discourse in the Sustainable Development Agenda Avoids Obligations and Entitlements

    Science.gov (United States)

    Williams, Carmel; Blaiklock, Alison

    2016-01-01

    Our commentary on Forman et al paper explores their thesis that right to health language can frame global health policy responses. We examined human rights discourse in the outcome documents from three 2015 United Nations (UN) summits and found rights-related terms are used in all three. However, a deeper examination of the discourse finds the documents do not convey the obligations and entitlements of human rights and international human rights law. The documents contain little that can be used to empower the participation of those already left behind and to hold States and the private sector to account for their human rights duties. This is especially worrying in a neoliberal era. PMID:27285518

  14. NIF ICCS network design and loading analysis

    International Nuclear Information System (INIS)

    Tietbohl, G; Bryant, R

    1998-01-01

    The National Ignition Facility (NIF) is housed within a large facility about the size of two football fields. The Integrated Computer Control System (ICCS) is distributed throughout this facility and requires the integration of about 40,000 control points and over 500 video sources. This integration is provided by approximately 700 control computers distributed throughout the NIF facility and a network that provides the communication infrastructure. A main control room houses a set of seven computer consoles providing operator access and control of the various distributed front-end processors (FEPs). There are also remote workstations distributed within the facility that allow provide operator console functions while personnel are testing and troubleshooting throughout the facility. The operator workstations communicate with the FEPs which implement the localized control and monitoring functions. There are different types of FEPs for the various subsystems being controlled. This report describes the design of the NIF ICCS network and how it meets the traffic loads that will are expected and the requirements of the Sub-System Design Requirements (SSDR's). This document supersedes the earlier reports entitled Analysis of the National Ignition Facility Network, dated November 6, 1996 and The National Ignition Facility Digital Video and Control Network, dated July 9, 1996. For an overview of the ICCS, refer to the document NIF Integrated Computer Controls System Description (NIF-3738)

  15. Romanian network for structural integrity assessment of nuclear components

    International Nuclear Information System (INIS)

    Roth, Maria; Constantinescu, Dan Mihai; Brad, Sebastian; Ducu, Catalin

    2008-01-01

    Full text: Based of the Romanian option to develop and operate nuclear facilities, using as model the networks created at European level and taking into account the international importance of the structural integrity assessments for lifetime extension of the nuclear components, a national Project started since 2005 in the framework of the National Program 'Research of Excellence', Modulus I 2006-2008, managed by the Ministry of Education and Research. Entitled 'Integrated Network for Structural Integrity Monitoring of Critical Components in Nuclear Facilities', with the acronym RIMIS, the Project had two main objectives: - to elaborate a procedure applicable to the structural integrity assessment of the critical components used in Romanian nuclear facilities; - to integrate the national networking in a similar one, at European level, to enhance the scientific significance of Romanian R and D organizations as well as to increase the contribution to solving one of the major issue of the nuclear field. The paper aimed to present the activities performed in the Romanian institutes, involved in the Project, the final results obtained as part of the R and D activities, including experimental, theoretical and modeling ones regarding structural integrity assessment of nuclear components employed in CANDU type reactors. Also the activity carried out in the framework of the NULIFE network, created at European level of the FP6 Program and sustained by the RIMIS network will be described. (authors)

  16. Are undocumented migrants’ entitlements and barriers to healthcare a public health challenge for the European Union?

    OpenAIRE

    De Vito, Elisabetta; de Waure, Chiara; Specchia, Maria Lucia; Parente, Paolo; Azzolini, Elena; Frisicale, Emanuela Maria; Favale, Marcella; Teleman, Adele Anna; Ricciardi, Walter

    2016-01-01

    Undocumented migrants (UMs) are at higher risk for health problems because of their irregular status and the consequences of economic and social marginalization. Moreover, the emergent reality of undocumented migration in Europe calls for action in the field of management of UM’s health demands as their access to health services has become a sensitive political and social issue. In this light, this paper aims to address UMs’ entitlement and barriers to healthcare and related policies citing e...

  17. SOCIAL NETWORKING IN PHYSICAL EDUCATION: Undergraduate Students’ Views on Ning

    Directory of Open Access Journals (Sweden)

    Gülfem SEZEN BALCIKANLI

    2012-04-01

    Full Text Available It was the aim of this study to investigate physical education undergraduate students’ views on the use of social networking, one of the most typical representations of Web 2.0 technologies. In order to do so, the researcher, who was the instructor of the class, entitled “Fair Play Education in Sport”, introduced Ning and its educational aspects to her students with a 50-minute presentation prior to the study. Following this, the students were encouraged to use this networking for 15 weeks in parallel with their class. During this application, the researcher helped the students to make the best use of Ning in educational settings. Upon the implementation, the researcher interviewed the students (n=19 in five groups on the basis of the questions prepared and piloted earlier. The interviews demonstrated that the students enjoyed using social networking in educational settings. The findings of the study were the following: Increasing student-student and teacher-student interaction, enhancing student motivation and classroom climate, sharing materials with the instructor and students, making use of students’ interests and needs, and making learning process more interesting and permanent. The research concluded that social networking could be used in PE classes effectively.

  18. International conference entitled Zdeněk Kopal’s Binary Star Legacy

    CERN Document Server

    Drechsel, Horst; ZDENEK KOPAL’S BINARY STAR LEGACY

    2005-01-01

    An international conference entitled "Zdenek Kopal's Binary Star Legacy" was held on the occasion of the late Professor Kopal's 90th birthday in his home town of Litomyšl/Czech Republic and dedicated to the memory of one of the leading astronomers of the 20th century. Professor Kopal, who devoted 60 years of his scientific life to the exploration of close binary systems, initiated a breakthrough in this field with his description of binary components as non-spherical stars deformed by gravity, with surfaces following Roche equipotentials. Such knowledge triggered the development of new branches of astrophysics dealing with the structure and evolution of close binaries and the interaction effects displayed by exciting objects such as cataclysmic variables, symbiotic stars or X-ray binaries. Contributions to this conference included praise of the achievements of a great astronomer and personal reminiscences brought forward by Kopal's former students and colleagues, and reflected the state of the art of the dyn...

  19. Data on overlapping brain disorders and emerging drug targets in human Dopamine Receptors Interaction Network

    Directory of Open Access Journals (Sweden)

    Avijit Podder

    2017-06-01

    Full Text Available Intercommunication of Dopamine Receptors (DRs with their associate protein partners is crucial to maintain regular brain function in human. Majority of the brain disorders arise due to malfunctioning of such communication process. Hence, contributions of genetic factors, as well as phenotypic indications for various neurological and psychiatric disorders are often attributed as sharing in nature. In our earlier research article entitled “Human Dopamine Receptors Interaction Network (DRIN: a systems biology perspective on topology, stability and functionality of the network” (Podder et al., 2014 [1], we had depicted a holistic interaction map of human Dopamine Receptors. Given emphasis on the topological parameters, we had characterized the functionality along with the vulnerable properties of the network. In support of this, we hereby provide an additional data highlighting the genetic overlapping of various brain disorders in the network. The data indicates the sharing nature of disease genes for various neurological and psychiatric disorders in dopamine receptors connecting protein-protein interactions network. The data also indicates toward an alternative approach to prioritize proteins for overlapping brain disorders as valuable drug targets in the network.

  20. 20 CFR 411.552 - What effect will the subsequent entitlement to title II benefits have on EN payments for title...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...

  1. Between Soft Legality and Strong Legitimacy : A Political Economy Approach to the Struggle for Basic Entitlements to Safe Water and Sanitation

    NARCIS (Netherlands)

    de Gaay Fortman, B.|info:eu-repo/dai/nl/068346581; Marcatelli, M.

    2015-01-01

    This article argues that the internationally declared “human right to safe water and sanitation,” although characterized by soft legality, may yet support universal access to such basic entitlements by virtue of its strong legitimacy. From a strategic perspective, human rights do indeed provide

  2. Measuring networks for environmental radioactivity monitoring in the European Community, - a pattern of diversity as varying as the peoples?

    International Nuclear Information System (INIS)

    Maushart, R.

    1991-01-01

    A new study entitled 'Monitoring of Environmental Radioactivity in the European Community', (RAES, 90), shows a survey of the methods currently applied in every country. The study compiles available quality assurance programs and makes suggestions for CEC initiatives. The study refers to the current practice of monitoring in European countries as 'enormous diversity of methods' in member countries. Further suggestions for standardization of the data measuring networks are put forward by a manufacturer of monitoring equipment. (orig./DG) [de

  3. The many tunes of perisomatic targeting interneurons in the hippocampal network

    Directory of Open Access Journals (Sweden)

    Tommas J Ellender

    2010-07-01

    Full Text Available The axonal targets of perisomatic targeting interneurons make them ideally suited to synchronise excitatory neurons. As such they have been implicated in rhythm generation of network activity in many brain regions including the hippocampus. However, several recent publications indicate that their roles extend beyond that of rhythm generation. Firstly, it has been shown that, in addition to rhythm generation, GABAergic perisomatic inhibition also serves as a current generator contributing significantly to hippocampal oscillatory EEG signals. Furthermore, GABAergic interneurons have a hitherto unexpected role in the initiation of hippocampal population bursts, both in the developing and adult hippocampus. In this review, we describe these new observations in detail and discuss the implications they have for our understanding of the mechanisms underlying physiological and pathological hippocampal network activities. This review is part of the Frontiers in Cellular Neuroscience's special topic entitled GABA signalling in health and disease based on the meeting at the CNCR Amsterdam.

  4. Graph-based unsupervised segmentation algorithm for cultured neuronal networks' structure characterization and modeling.

    Science.gov (United States)

    de Santos-Sierra, Daniel; Sendiña-Nadal, Irene; Leyva, Inmaculada; Almendral, Juan A; Ayali, Amir; Anava, Sarit; Sánchez-Ávila, Carmen; Boccaletti, Stefano

    2015-06-01

    Large scale phase-contrast images taken at high resolution through the life of a cultured neuronal network are analyzed by a graph-based unsupervised segmentation algorithm with a very low computational cost, scaling linearly with the image size. The processing automatically retrieves the whole network structure, an object whose mathematical representation is a matrix in which nodes are identified neurons or neurons' clusters, and links are the reconstructed connections between them. The algorithm is also able to extract any other relevant morphological information characterizing neurons and neurites. More importantly, and at variance with other segmentation methods that require fluorescence imaging from immunocytochemistry techniques, our non invasive measures entitle us to perform a longitudinal analysis during the maturation of a single culture. Such an analysis furnishes the way of individuating the main physical processes underlying the self-organization of the neurons' ensemble into a complex network, and drives the formulation of a phenomenological model yet able to describe qualitatively the overall scenario observed during the culture growth. © 2014 International Society for Advancement of Cytometry.

  5. Dopamine precursor depletion impairs structure and efficiency of resting state brain functional networks.

    Science.gov (United States)

    Carbonell, Felix; Nagano-Saito, Atsuko; Leyton, Marco; Cisek, Paul; Benkelfat, Chawki; He, Yong; Dagher, Alain

    2014-09-01

    Spatial patterns of functional connectivity derived from resting brain activity may be used to elucidate the topological properties of brain networks. Such networks are amenable to study using graph theory, which shows that they possess small world properties and can be used to differentiate healthy subjects and patient populations. Of particular interest is the possibility that some of these differences are related to alterations in the dopamine system. To investigate the role of dopamine in the topological organization of brain networks at rest, we tested the effects of reducing dopamine synthesis in 13 healthy subjects undergoing functional magnetic resonance imaging. All subjects were scanned twice, in a resting state, following ingestion of one of two amino acid drinks in a randomized, double-blind manner. One drink was a nutritionally balanced amino acid mixture, and the other was tyrosine and phenylalanine deficient. Functional connectivity between 90 cortical and subcortical regions was estimated for each individual subject under each dopaminergic condition. The lowered dopamine state caused the following network changes: reduced global and local efficiency of the whole brain network, reduced regional efficiency in limbic areas, reduced modularity of brain networks, and greater connection between the normally anti-correlated task-positive and default-mode networks. We conclude that dopamine plays a role in maintaining the efficient small-world properties and high modularity of functional brain networks, and in segregating the task-positive and default-mode networks. This article is part of the Special Issue Section entitled 'Neuroimaging in Neuropharmacology'. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Digital telephony and network integration

    CERN Document Server

    Keiser, Bernhard E

    1995-01-01

    What is "digital telephony"? To the authors, the term digital telephony denotes the technology used to provide a completely digital telecommunication system from end-to-end. This implies the use of digital technology from one end instru­ ment through transmission facilities and switching centers to another end instru­ ment. Digital telephony has become possible only because of the recent and on­ going surge of semiconductor developments, allowing microminiaturization and high reliability along with reduced costs. This book deals with both the future and the present. Thus, the first chapter is entitled, "A Network in Transition." As baselines, Chapters 2 and 11 provide the reader with the present status of teler-hone technology in terms of voice digiti­ zation as well as switching principles. The book is an outgrowth of the authors' consulting and teaching experience in the field since the early 1980s. The book has been written to provide both the engineering student and the practicing engineer a working k...

  7. Basic package of health entitlements and solidarity in the Federation of Bosnia and Herzegovina.

    Science.gov (United States)

    Hrabac, B; Ljubic, B; Bagaric, I

    2000-09-01

    The aim of this report is to provide an overview of the methodology for designing a basic package of health entitlements and solidarity in the Federation of Bosnia and Herzegovina which will, respecting the principles of solidarity and equity, guarantee equal rights to all citizens of the Federation. After the analysis of the situation, we specified the reasons for the reform, listed the objectives, and described the basis of the basic package design, the establishment of federal solidarity, and the plan of realization. We discussed the background ethical theories of our policy choice, explicitly stated the normative and technical criteria for priority setting, and deliberated Federal financing solidarity policy and allocation methodology, as well as criteria for "risk equalization" among cantons.

  8. Micro and Macro Content Analysis of English Textbook Entitled "Mosaic One Listening and Speaking (Student's Book)" in the Light of Communicative Competence

    Science.gov (United States)

    Al-Mashaqba, Nisreen Juma'a Hamed

    2017-01-01

    The purpose of this study is to investigate the extent to which the listening and speaking lessons which are presented in textbook entitled "Mosaic One Listening and speaking (Student's Book)" are characterized with appropriateness and meaningfulness in light of communicative competence and meet the Principles and features of…

  9. Counterstatement to Article Entitled "A Framework for Evaluation of Marine Spatial Data Geoportals Using Case Studies"

    Directory of Open Access Journals (Sweden)

    Seip Christian

    2015-12-01

    Full Text Available In December 2014 in volume 60 issue 4 a paper was published entitled “A Framework for Evaluation of Marine Spatial Data Geoportals Using Case Studies” by Marina Tavra, Vlado Cetl and Tea Duplancic Leder which is suspected to constitute academic misconduct. This comment reasons that the core of the paper was taken from another source and thus does not offer new and original scientific work and therefore does not add knowledge to the body of science. Furthermore it argues that apart from the plagiarism the paper shows major weaknesses and thus should have not been published even it was not plagiarized.

  10. [Luís Gomes Ferreira reports on the health of slaves in his work entitled Erário mineral (1735)].

    Science.gov (United States)

    Eugênio, Alisson

    2015-01-01

    The article analyzes the reports of Luís Gomes Ferreira published in his manual on practical medicine entitled Erário mineral, of 1735, on the most common illnesses in captivity. It is shown that such reports can be interpreted as a criticism of the social relations of the slave era by issuing some warnings to the landowners who failed to look after the health of their slaves.

  11. A REVIEW OF ENGLISH TEXTBOOK ENTITLED "SKILLFUL: READING AND WRITING, STUDENT'S BOOK 1" BY DAVID BOHLKE AND DOROTHY ZEMACH

    OpenAIRE

    Thunyalak Polsuk; Nutprapha K. Dennis, Ph.D

    2017-01-01

    This study aims to evaluate the usefulness of a commercial textbook entitle “Skillful: Reading & Writing, Student’s Book 1”, written by David Bohlke with Dorothy E. Zemach as a series consultant, published by Macmillan publisher. The study also explores the appropriateness for considering to teaching university EFL students. The result of this study assists English teachers in choosing textbooks which will be most appropriate to the learners at various level to develop their reading and writi...

  12. Columbia River System Operation Review final environmental impact statement. Appendix P: Canadian Entitlement Allocation Agreements (CEAA)

    International Nuclear Information System (INIS)

    1995-11-01

    The System Operation Review (SOR) is a study and environmental compliance process being used by the three Federal agencies to analyze future operations of the system and river use issues. The goal of the SOR is to achieve a coordinated system operation strategy for the river that better meets the needs of all river users. This technical appendix addresses only the effects of alternative system operating strategies for managing the Columbia River system. The purpose of this technical appendix is to provide the environmental review necessary to enter into agreements regarding the distribution between Federal and non-Federal project owners with respect to delivery of the Canadian Entitlement obligation to Canada for the period 1998 through 2024

  13. POLITENESS PRINCIPLE ANALYSIS IN CARTOON MOVIE ENTITLED STAND BY ME DORAEMON

    Directory of Open Access Journals (Sweden)

    Eko Mulyono

    2016-04-01

    Full Text Available This article examines the use of politeness principle in cartoon movie entitled “Stand By Me Doraemon”. It aims at giving a description on the use of politeness principle in this movie so that this is the source of data as well. The data are collected by note taking technique and then analyzed descriptively. After analyzing the data, the researcher finds the use of politeness principle in the movie script. They are utterances of the use of politeness principle covering the kinds of maxim in politeness principle. The utterances covey the use of tact maxim, generosity maxim, approbation maxim, modesty maxim, agreement maxim, and sympathy maxim. Then, it focused also in politeness scale such as formality scale, hesitancy scale, and equality scale. The finding result showed that there are 25 politeness principle found in cartoon movie “Stand By Me Doraemon”. 1 tact maxim, 3 generosity maxim, 6 approbation maxim, 1 modesty maxim, 2 agreement maxim, 3 sympathy maxim, 2 formality scale, 4 hesitancy scale, and 3 equality scale. Approbation maxim is the maxim of the most numerous in the movie. This is because the characters in this film seek to avoid conflict and create an environment that is comfortable in communication.   Key words: politeness principle, cartoon movie, utterance, maxim, scale.

  14. A Comparison of the Nomological Networks Associated With Forced-Choice and Likert Formats of the Narcissistic Personality Inventory.

    Science.gov (United States)

    Miller, Joshua D; Gentile, Brittany; Carter, Nathan T; Crowe, Michael; Hoffman, Brian J; Campbell, W Keith

    2018-01-01

    The Narcissistic Personality Inventory (NPI) is one of the most popular measures of narcissism. However, its use of a forced-choice response set might negatively affect some of its psychometric properties. The purpose of this research was to compare a Likert version of the NPI, in which only the narcissistic response of each pair was given, to the original NPI, in 3 samples of participants (N = 1,109). To this end, we compared the nomological networks of the forced-choice and Likert formats of the NPI in relation to alternative measures of narcissism, narcissistic personality disorder, entitlement, self-esteem, general personality traits (reported by self and informants), interpersonal styles, and general pathological traits included in the DSM-5. The Likert format NPI-total and subscales-manifested similar construct validity to the original forced-choice format across all criteria with only minor differences that seem to be due mainly to the increased reliability and variability found in the Likert NPI Entitlement/Exploitativeness subscale. These results provide evidence that a version of the NPI that employs a Likert format can justifiably be used in place of the original.

  15. Overworked and underpaid: on the nature of gender differences in personal entitlement.

    Science.gov (United States)

    Major, B; McFarlin, D B; Gagnon, D

    1984-12-01

    This research investigated gender differences in feelings of personal entitlement with respect to monetary payment for work performed. Two experiments were conducted to test the hypothesis that women's internal standards of fair pay for their work are lower than men's and to examine possible causes of this difference. In Experiment 1, men and women were asked to pay themselves in a private situation what they thought was fair pay for a fixed amount of work. Social comparison information was varied. As predicted, women paid themselves less money than men in the absence, but not the presence, of social comparison information. In Experiment 2, men and women were asked to do as much work as they thought was fair for a fixed, prepaid, amount of money. Subjects believed that their work was either monitored or unmonitored. Women worked significantly longer, did more work, and did more correct work than men in both public and private work settings. Furthermore, women, but not men, worked longer when they believed their work was monitored than when they believed it was unmonitored. Possible explanations for these gender differences are discussed.

  16. Hybrid modeling of the crosstalk between signaling and transcriptional networks using ordinary differential equations and multi-valued logic.

    Science.gov (United States)

    Khan, Faiz M; Schmitz, Ulf; Nikolov, Svetoslav; Engelmann, David; Pützer, Brigitte M; Wolkenhauer, Olaf; Vera, Julio

    2014-01-01

    A decade of successful results indicates that systems biology is the appropriate approach to investigate the regulation of complex biochemical networks involving transcriptional and post-transcriptional regulations. It becomes mandatory when dealing with highly interconnected biochemical networks, composed of hundreds of compounds, or when networks are enriched in non-linear motifs like feedback and feedforward loops. An emerging dilemma is to conciliate models of massive networks and the adequate description of non-linear dynamics in a suitable modeling framework. Boolean networks are an ideal representation of massive networks that are humble in terms of computational complexity and data demand. However, they are inappropriate when dealing with nested feedback/feedforward loops, structural motifs common in biochemical networks. On the other hand, models of ordinary differential equations (ODEs) cope well with these loops, but they require enormous amounts of quantitative data for a full characterization of the model. Here we propose hybrid models, composed of ODE and logical sub-modules, as a strategy to handle large scale, non-linear biochemical networks that include transcriptional and post-transcriptional regulations. We illustrate the construction of this kind of models using as example a regulatory network centered on E2F1, a transcription factor involved in cancer. The hybrid modeling approach proposed is a good compromise between quantitative/qualitative accuracy and scalability when considering large biochemical networks with a small highly interconnected core, and module of transcriptionally regulated genes that are not part of critical regulatory loops. This article is part of a Special Issue entitled: Computational Proteomics, Systems Biology & Clinical Implications. Guest Editor: Yudong Cai. Copyright © 2013 Elsevier B.V. All rights reserved.

  17. European network on the determination of site end points for radiologically contaminated land

    International Nuclear Information System (INIS)

    Booth, Peter; Lennon, Chris

    2007-01-01

    Nexia Solutions are currently running a small European network entitled 'European Network on the Determination of Site End Points for Radiologically Contaminated Land (ENDSEP)'. Other network members include NRG (Netherlands), UKAEA (UK), CEA (France), SOGIN (Italy), Wismut (Germany), Saxon State Agency of Environment and Geology (Germany). The network is focused on the technical and socio-economical issues associated with the determination of end points for sites potentially, or actually, impacted by radiological contamination. Such issues will cover: - Those associated with the run up to establishing a site end point; - Those associated with verifying that the end points have been met; and Those associated with post closure. The network's current high level objectives can be summarized as follows: Share experience and best practice in the key issues running up to determining site end points; Gain a better understanding of the potential effects of recent and forthcoming EU legislation; Assess consistency between approaches; Highlight potential gaps within the remit of site end point determination and management; and - Consider the formulation of research projects with a view to sharing time and expense. The programme of work revolves around the following key tasks: - Share information, experience and existing good practice. - Look to determine sustainable approaches to contaminated land site end point management. - Through site visits, gain first hand experience of determining an appropriate end point strategy, and identifying and resolving end point issues. Highlight the key data gaps and consider the development of programmes to either close out these gaps or to build confidence in the approaches taken. Production of position papers on each technical are a highlighting how different countries approach/resolve a specific problem. (authors)

  18. Combating global warming. Possible rules, regulations and administrative arrangements for a global market in CO2 emission entitlements

    International Nuclear Information System (INIS)

    1994-12-01

    When in 1991 the UNCTAD secretariat launched its research into the idea of controlling carbon dioxide emissions through a system of 'tradeable permits', there was little support for this approach. Some felt that the idea was premature and should not detract from efforts to introduce more conventional measures, such as environmental taxes and new regulations. However, in a few short years, the idea of using tradeable market-based instruments to combat global warming has gained widespread acceptance. The UNCTAD secretariat's 1992 study on a global system of tradeable carbon emission entitlements (UNCTAD/RDP/DFP/1), was widely regarded as a major breakthrough in this area. This study argued that tradeable permits were both an efficient means of controlling man-made carbon dioxide emissions at minimum cost, and an effective mechanism for transferring resources to developing countries and countries in transition, to help them to contribute to the international effort to abate emissions of greenhouse gases. The study contained a detailed assessment of key technical elements of a tradeable CO 2 entitlements system, including permit allocation techniques, resource transfers, equity/distributional implications, institutional and administrative requirements. The present publication explores the institutional requirements for both policy-making and the organization of a global market in CO 2 emission allowances. It shows that one can start with a simple pilot scheme based on the joint implementation of commitments, which constitutes the cornerstone of the Framework Convention, and evolve gradually to a more complete system on the basis of 'learning by doing'. Since the use of markets can dramatically lower the cost of controlling greenhouse gas emissions, it is clearly in the self-interest of major emitters to act as 'market leaders' willing to pioneer

  19. Cross-cultural invariance of NPI-13: Entitlement as culturally specific, leadership and grandiosity as culturally universal.

    Science.gov (United States)

    Żemojtel-Piotrowska, Magdalena; Piotrowski, Jarosław; Rogoza, Radosław; Baran, Tomasz; Hitokoto, Hidefumi; Maltby, John

    2018-04-15

    The current study explores the problem with the lack of measurement invariance for the Narcissistic Personality Inventory (NPI) by addressing two issues: conceptual heterogeneity of narcissism and methodological issues related to the binary character of data. We examine the measurement invariance of the 13-item version of the NPI in three populations in Japan, Poland and the UK. Analyses revealed that leadership/authority and grandiose exhibitionism dimensions of the NPI were cross-culturally invariant, while entitlement/exploitativeness was culturally specific. Therefore, we proposed NPI-9 as indicating scalar invariance, and we examined the pattern of correlations between NPI-9 and other variables across three countries. The results suggest that NPI-9 is valid brief scale measuring general levels of narcissism in cross-cultural studies, while the NPI-13 remains suitable for research within specific countries. © 2018 International Union of Psychological Science.

  20. Pakistan's national legislation entitled: 'Export Control on Goods, Technologies, Material and Equipment related to Nuclear and Biological Weapons and their Delivery Systems Act, 2004'

    International Nuclear Information System (INIS)

    2004-01-01

    The Director General has received a letter from the Permanent Mission of Pakistan, dated 4 November 2004, concerning Pakistan's national legislation entitled 'Export Control on Goods, Technologies, Material and Equipment related to Nuclear and Biological Weapons and their Delivery Systems Act, 2004'. As requested by the Permanent Mission of Pakistan, the letter and the Export Control Act of 2004, are reproduced herein for the information of the Member States

  1. COST network genderSTE: Networking Gender Equality in Research and Innovation in Europe and beyond

    Directory of Open Access Journals (Sweden)

    Inés Sánchez de Madariaga

    2013-06-01

    Full Text Available Gender is one of five priorities of the European Research Area, as stated in the Communication adopted in July 2012 entitled A Reinforced European Research Area Partnership for Excellence and Growth (EC 2012c. Following this Communication, the EC has fully integrated gender dimensions in its proposal for a regulation on the new research framework program Horizon 2020¸ which includes in article 15 a provision for gender mainstreaming (EC 2011b. One final upcoming policy instrument announced by the EC is the Recommendation on Gender, Science and Innovation that will address member states and be adopted in the next months. Against this European policy background , the international COST network genderSTE (Gender, Science, Technology and Environment aims at enhancing a better integration of gender dimensions in science and technology at three main levels: i promoting women’s careers in science and technology through structural change of institutions (as recommended by EC by disseminating existing research and practice; ii promoting a better integration of gender in the content of science, research and technology, by dissemination existing research on the topic, ie the UE-US Gendered Innovations Project; iii identifying gender dimensions relevant to environment-related Horizon2020 Grand Challenges and other urban EC initiatives.  

  2. Plasma Physics Network Newsletter. No. 1

    International Nuclear Information System (INIS)

    1989-08-01

    This is the first issue of a quarterly newsletter published by the International Atomic Energy Agency in order to provide news of potential interest of fusion scientists in developing countries. According to the foreword to this first issue, the purpose of the newsletter, as well as the organization called ''Third World Network'', is to ''start the process of unifying the developing country fusion community into some type of cohesive entity and to bring the efforts of the developing countries in the plasma physics research area to the attention of the world fusion community at large''. Furthermore, this first issue contains information about (i) Nuclear Fusion Research in Argentina, (ii) Chinese Fusion Efforts, (iii) Plasma and Fusion Physics in Egypt, (iv) Fusion Research in India, (v) Fusion Research in the Republic of Korea, (vi) Fusion Programmes in Malaysia, (vi) the Agency's Fusion Programme, (vii) a proposal for a workshop on computational plasma physics, sponsored by the Third World Plasma Research Network, (viii) the announcement of the formation of the ''Asian African Association for Plasma Training'', - for the promotion of the initiation/strengthening of plasma research, especially experimental, in developing countries in Asia and Africa, as well as the cooperation and sharing of technology among plasma physicists in the developing countries in the region; (ix) a communication entitled ''Fusion Research in ''Small'' Countries'', I.R. Jones, School of Physical Sciences, The Flinders University of South Australia, Bedford Park, Australia, on the desirability of the pursuit of fusion research in ''small'' countries, i.e., those countries that do not have a national fusion research programme; (x) and, finally, a newsletter on the ITER project

  3. Plasma Physics Network Newsletter. No. 2

    International Nuclear Information System (INIS)

    1990-06-01

    The IAEA Fellowship Programme providing for in general up to two years of training at a host laboratory or university is accessible for Member State scientists (contact the editor); so are IAEA research contracts (up to $ 5000 per year for up to 3 years). An overview of meetings on fusion or fusion-related topics is given for June-October 1990. It is announced that the full IFCR status report on fusion is due to be published in the September issues of Nuclear Fusion, and that the ''Third World Plasma Research Network'' (TWPRN) has been set up to ''provide an international forum for plasma research centres of the Third World countries'' to promote ''closer interactions among them'' and to strengthen their scientific programmes. The network also ''envisages active participation of small scale research programmes from developed countries that pursue basic plasma studies and development objectives''. Furthermore, this newsletter contains (1) the minutes of the steering committee meeting of the TWPRN, New Delhi, November 1989; (2) a contribution from A. Rodrigo, Argentina, entitled ''Collaboration and Scientific Exchange in Latin American Plasma Physics Laboratories'', listing for each country (Argentina, Brazil, Chile, Colombia, Mexico, and Venezuela) (i) key contact persons, (ii) main areas for collaboration/scientific exchange, and (iii) list of foreign laboratories having close contacts; (3) ''Plasma Research at the Institute of Nuclear Science and Technology of Bangladesh'', by U.A. Mofiz, giving an overview of plasma research activities there; (4) A summary by P.K. Kaw and A. Sen of the 1989 International Conference on Plasma Physics held in New Delhi; (5) the announcement of the first South-North International Workshop on Fusion Theory, Tipaza, Algeria, September 16-23, 1990

  4. Integrated network for structural integrity monitoring of critical components in nuclear facilities, RIMIS

    International Nuclear Information System (INIS)

    Roth, Maria; Constantinescu, Dan Mihai; Brad, Sebastian; Ducu, Catalin; Malinovschi, Viorel

    2008-01-01

    The round table aims to join specialists working in the research area of the Romanian R and D Institutes and Universities involved in structural integrity assessment of materials, especially those working in the nuclear field, together with the representatives of the end user, the Cernavoda NPP. This scientific event will offer the opportunity to disseminate the theoretical, experimental and modelling activities, carried out to date, in the framework of the National Program 'Research of Excellence', Module I 2006-2008, managed by the National Authority for Scientific Research. Entitled 'Integrated Network for Structural Integrity Monitoring of Critical Components in Nuclear Facilities, RIMIS, the project has two main objectives: 1. - to elaborate a procedure applicable to the structural integrity assessment of critical components used in Romanian nuclear facilities (CANDU type Reactor, Hydrogen Isotopes Separation installations); 2. - to integrate the national networking into a similar one of European level, and to enhance the scientific significance of Romanian R and D organisations as well as to increase the contribution in solving major issues of the nuclear field. The topics of the round table will be focused on: 1. Development of a Structural Integrity Assessment Methodology applicable to the nuclear facilities components; 2. Experimental investigation methods and procedures; 3. Numeric simulation of nuclear components behaviour; 4. Further activities to finalize the assessment procedure. Also participations and contributions to sustain the activity in the European Network NULIFE, FP6 will be discussed. (authors)

  5. Fourth meeting entitled “Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data”

    CERN Document Server

    Vilanova, Anna; Burgeth, Bernhard; Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data

    2014-01-01

    Arising from the fourth Dagstuhl conference entitled Visualization and Processing of Tensors and Higher Order Descriptors for Multi-Valued Data (2011), this book offers a broad and vivid view of current work in this emerging field. Topics covered range from applications of the analysis of tensor fields to research on their mathematical and analytical properties. Part I, Tensor Data Visualization, surveys techniques for visualization of tensors and tensor fields in engineering, discusses the current state of the art and challenges, and examines tensor invariants and glyph design, including an overview of common glyphs. The second Part, Representation and Processing of Higher-order Descriptors, describes a matrix representation of local phase, outlines mathematical morphological operations techniques, extended for use in vector images, and generalizes erosion to the space of diffusion weighted MRI. Part III, Higher Order Tensors and Riemannian-Finsler Geometry, offers powerful mathematical language to model and...

  6. Accrual of ROCs LECs and REGOs. Phase 3a: pre-determined entitlements to ROCs for small microgenerators

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This report describes a proposed scheme to enable microgenerators in the UK to claim Renewable Obligation Certificates (ROCs) on the basis of predetermined estimates of output rather than data from meters. The aim of the scheme, which has been developed following discussions with representatives of the microgeneration community in the UK, is to make it easier for small generators to access to ROCs and thus encourage householders and smaller commercial/business users to install renewable microgeneration technologies. The work was commissioned as part of the review of the Renewables Obligation. The report considers: background information; the Australian scheme for small generating units; eligibility and entitlements; the operation of the scheme; new procedural and legislative requirements; measures to protect and improve the Renewables Obligation; alterative approaches; scheme benefits; and recommendations. An overview of the scheme's key features is given in the report's executive summary.

  7. An Analysis of Figurative Language Elements upon an American Short Story Entitled “The Monkey’s Paw

    Directory of Open Access Journals (Sweden)

    Nur Muhammad Ardiansyah

    2018-04-01

    Full Text Available This article describes the study of semantic in a specified domain of figurative language upon a selected work of American English literature, in form of short story written by the renowned writer and author, William Wymark Jacobs, entitled as ‘The Monkey’s Paw’. Several objectives are deduced by the researcher in quest of finding the forms of this figurative language within the passage. Briefly, figurative language itself is a feature of every languages, which emphasized the use of expression to symbolize a different meaning from the usual literal interpretation. In our analysis of ‘The Monkey’s Paw’, the varieties of figurative language: Metaphor, Personification, Hyperbole, Symbolism, also another terms used to represent unusual words construction or combination such as Onomatopoeia, Idiom, and even Imagery, are discussed in order in relation with true meaning discovery behind each figurative language properties.

  8. Government circular No. 109 of 26 May 1981 concerning acreage reservation for main natural gas transmission network in Denmark. 3. Reservation stage and addition to the 1. reservation stage. To all the municipal councils, county councils and the capital council

    Energy Technology Data Exchange (ETDEWEB)

    1981-01-01

    The Danish Ministry of Environment recommends the administration of counties, cities and rural areas to plan no construction works or objects in the land areas shown in detailed maps, as the main transmission network of the Danish natural gas distribution system has to be constructed in the closest future. The county councils are encouraged to participate in local planning and to coordinate it with national authorities and planning board, who are entitled to introduce required changes.

  9. Government circular No. 109 of 26 May 1981 concerning acreage reservation for main natural gas transmission network in Denmark. 3. reservation stage and addition to the 1. reservation stage. To all the municipal councils, county councils and the capital council

    Energy Technology Data Exchange (ETDEWEB)

    1981-01-01

    The Danish Ministry of Environment recommends the administration of counties, cities and rural areas to plan no construction works or objects in the land areas shown in detailed maps, as the main transmission network of the Danish natural gas distribution system has to be constructed in the closest future. The county councils are encouraged to participate in local planning and to coordinate it with national authorities and planning board, who are entitled to introduce required changes.

  10. General practice and the Internet revolution. Use of an Internet social network to communicate information on prevention in France.

    Science.gov (United States)

    Veuillotte, Isabelle; Morel, Gilles; Pitois, Stephane; Haler, Renaud; Mercier, Patricia; Aubry, Catherine; Cannet, Didier

    2015-03-01

    The popularity of social networks and the huge number of exchanges have made them immensely important for the communication of information. This French study explored prevention in hereditary breast cancer using a social Internet network to communicate information. The principal objective was to inform French women aged from 20 to 50 years, using the social network Facebook, about the warning signs of breast cancer in cases of a predisposition to the disease due to a genetic mutation. The secondary objectives were to inform people about screening. An information page entitled "hereditary breast cancer: and if I was concerned?" was distributed in 3 different ways: from friend to friend, via groups of persons, and by targeted advertising. Four articles and 11 messages were distributed over 27 days. The total number of visits for this period amounted to 1019. A total of 81 percent of the Internauts were women and 55 percent of the visitors were aged between 25 and 44 years. Other information campaigns concerning public health issues could be conducted using this tool. A legal framework is necessary to preserve the quality of the medical information provided. This new means of communication, used for prevention purposes, will add to other frequently used methods of communication. © The Author(s) 2013.

  11. Exclusive purpose: abstinence-only proponents create federal entitlement in welfare reform.

    Science.gov (United States)

    Daley, D

    1997-01-01

    Since 1981, the US government has funded a program promoting sexual abstinence among young people through its Office of Population's Adolescent Family Life Demonstration Grants program (AFLA). A 1983 court challenge which held that AFLA violated the separation of church and state by endorsing a particular religious viewpoint was settled out of court in 1993 with stipulations that AFLA-funded sexuality education must not include religious references, must be medically accurate, must respect the principle of self-determination of teenagers regarding contraceptive referrals, and must not be implemented on church property. Critics continue to charge that AFLA's abstinence-only programs have failed to receive proper evaluation. While AFLA has no broad-based support, it is backed by the same small group of Congressional proponents who are attempting to promote broad-scale, federally-funded abstinence-only programs. Thus, the August 1996 welfare reform legislation represents the broadest attack on the provision of comprehensive sexuality education in the US. While opponents of sexuality education could not restrict the content of education programs, they could restrict programs through health policy and funding mechanisms. Congress, thus, mandated $50 million a year for 1998-2002 to a matching grant with entitlement status, which was tagged on to final versions of the larger welfare reform bill. The intent of this action was to use federal law to change the social norm of premarital sexual activity. Funds will not go to programs which discuss contraception. Additional problems with the statute include misinformation, ambiguity, and a lack of evaluation requirements. It remains for states to decide whether to accept the restricted funds and for parties on both sides of the issue to continue to lobby for their positions.

  12. National Health Service Principles as Experienced by Vulnerable London Migrants in "Austerity Britain": A Qualitative Study of Rights, Entitlements, and Civil-Society Advocacy.

    Science.gov (United States)

    Rafighi, Elham; Poduval, Shoba; Legido-Quigley, Helena; Howard, Natasha

    2016-05-08

    Recent British National Health Service (NHS) reforms, in response to austerity and alleged 'health tourism,' could impose additional barriers to healthcare access for non-European Economic Area (EEA) migrants. This study explores policy reform challenges and implications, using excerpts from the perspectives of non-EEA migrants and health advocates in London. A qualitative study design was selected. Data were collected through document review and 22 in-depth interviews with non-EEA migrants and civil-society organisation representatives. Data were analysed thematically using the NHS principles. The experiences of those 'vulnerable migrants' (ie, defined as adult non-EEA asylum-seekers, refugees, undocumented, low-skilled, and trafficked migrants susceptible to marginalised healthcare access) able to access health services were positive, with healthcare professionals generally demonstrating caring attitudes. However, general confusion existed about entitlements due to recent NHS changes, controversy over 'health tourism,' and challenges registering for health services or accessing secondary facilities. Factors requiring greater clarity or improvement included accessibility, communication, and clarity on general practitioner (GP) responsibilities and migrant entitlements. Legislation to restrict access to healthcare based on immigration status could further compromise the health of vulnerable individuals in Britain. This study highlights current challenges in health services policy and practice and the role of non-governmental organizations (NGOs) in healthcare advocacy (eg, helping the voices of the most vulnerable reach policy-makers). Thus, it contributes to broadening national discussions and enabling more nuanced interpretation of ongoing global debates on immigration and health. © 2016 by Kerman University of Medical Sciences

  13. Federalism, entitlements, and discretionary grants: the fiscal context of national support for immunization programs.

    Science.gov (United States)

    Miller, V J

    2000-10-01

    This paper defines the appropriation and resource allocation structure of federal government programs that deliver vaccines to the public through state and local governments, with a special focus on the Centers for Disease Control and Prevention (CDC) Section 317 program. The paper places these programs in the context of the overall intergovernmental finance system of the United States, and the manner in which that system has responded to societal changes in other areas, such as unemployment insurance and environmental protection. The paper concludes that a changing environment for vaccine financing, and uncertain appropriations for state government immunization infrastructure, may have made the current CDC Section 317 program inadequate. Increased entitlement resources for federally funded vaccines have not been matched with increased and stable resources for the balance of program costs. To the contrary, funding provided to the Section 317 program has proven unstable, and its discretionary appropriations have proven vulnerable to both executive and legislative branch earmarking for such activities as overseas disease eradication or home state earmarking by congressional appropriations subcommittee members. In addition, the rigidity of some CDC program requirements makes it difficult for states to effectively use program funds. Consideration should be given to strengthening the Section 317 program and its relationships to other federal aid programs to ensure that adequate immunization protections are provided in all states to adequately protect all citizens.

  14. CoCMA: Energy-Efficient Coverage Control in Cluster-Based Wireless Sensor Networks Using a Memetic Algorithm

    Directory of Open Access Journals (Sweden)

    Yung-Chung Wang

    2009-06-01

    Full Text Available Deployment of wireless sensor networks (WSNs has drawn much attention in recent years. Given the limited energy for sensor nodes, it is critical to implement WSNs with energy efficiency designs. Sensing coverage in networks, on the other hand, may degrade gradually over time after WSNs are activated. For mission-critical applications, therefore, energy-efficient coverage control should be taken into consideration to support the quality of service (QoS of WSNs. Usually, coverage-controlling strategies present some challenging problems: (1 resolving the conflicts while determining which nodes should be turned off to conserve energy; (2 designing an optimal wake-up scheme that avoids awakening more nodes than necessary. In this paper, we implement an energy-efficient coverage control in cluster-based WSNs using a Memetic Algorithm (MA-based approach, entitled CoCMA, to resolve the challenging problems. The CoCMA contains two optimization strategies: a MA-based schedule for sensor nodes and a wake-up scheme, which are responsible to prolong the network lifetime while maintaining coverage preservation. The MA-based schedule is applied to a given WSN to avoid unnecessary energy consumption caused by the redundant nodes. During the network operation, the wake-up scheme awakens sleeping sensor nodes to recover coverage hole caused by dead nodes. The performance evaluation of the proposed CoCMA was conducted on a cluster-based WSN (CWSN under either a random or a uniform deployment of sensor nodes. Simulation results show that the performance yielded by the combination of MA and wake-up scheme is better than that in some existing approaches. Furthermore, CoCMA is able to activate fewer sensor nodes to monitor the required sensing area.

  15. Possible administrative structures and procedures (for implementing a tradeable entitlement approach to controlling global warming)

    International Nuclear Information System (INIS)

    Tietenberg, T.; Victor, D.G.

    1994-01-01

    The United Nations Framework Convention on Climate Change was opened for signature at the United Nations Conference on Environment and Development (UNCED) held at Rio de Janeiro in June 1992. By August 1994, it had been signed by representatives of some 166 countries; with 93 ratifications. Reducing greenhouse gas emissions to 1990 levels by the year 2000 was specified as a voluntary target within the Convention. Making this target mandatory was originally supported by the European Union, Japan and most other countries, but opposed by the United States. Following the change of administrations, however, the new United States President announced his support for both the concept of holding emissions at their 1990 levels and the deadline for achieving that target. Limiting greenhouse gas emissions to specific levels now appears to be an internationally recognized objective. In this paper we examine how to implement a tradeable entitlements system for greenhouse-gas emissions, using the United Nations Framework Convention on Climate Change as our point of departure. Using this particular point of departure establishes certain parameters of our inquiry. Currently no mandatory targets for emission reductions have been accepted by the participating States. Furthermore, even the stabilization goal, to the extent it is a factor at all, will be a factor only for the industrialized countries

  16. National Health Service Principles as Experienced by Vulnerable London Migrants in “Austerity Britain”: A Qualitative Study of Rights, Entitlements, and Civil-Society Advocacy

    Directory of Open Access Journals (Sweden)

    Elham Rafighi

    2016-10-01

    Full Text Available Background: Recent British National Health Service (NHS reforms, in response to austerity and alleged ‘health tourism,’ could impose additional barriers to healthcare access for non-European Economic Area (EEA migrants. This study explores policy reform challenges and implications, using excerpts from the perspectives of non-EEA migrants and health advocates in London. Methods: A qualitative study design was selected. Data were collected through document review and 22 indepth interviews with non-EEA migrants and civil-society organisation representatives. Data were analysed thematically using the NHS principles. Results: The experiences of those ‘vulnerable migrants’ (ie, defined as adult non-EEA asylum-seekers, refugees, undocumented, low-skilled, and trafficked migrants susceptible to marginalised healthcare access able to access health services were positive, with healthcare professionals generally demonstrating caring attitudes. However, general confusion existed about entitlements due to recent NHS changes, controversy over ‘health tourism,’ and challenges registering for health services or accessing secondary facilities. Factors requiring greater clarity or improvement included accessibility, communication, and clarity on general practitioner (GP responsibilities and migrant entitlements. Conclusion: Legislation to restrict access to healthcare based on immigration status could further compromise the health of vulnerable individuals in Britain. This study highlights current challenges in health services policy and practice and the role of non-governmental organizations (NGOs in healthcare advocacy (eg, helping the voices of the most vulnerable reach policy-makers. Thus, it contributes to broadening national discussions and enabling more nuanced interpretation of ongoing global debates on immigration and health.

  17. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  18. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  19. Communication dated 25 July 2008 received from the Permanent Mission of India concerning a document entitled 'Implementation of the India-United States Joint Statement of July 18, 2005: India's Separation Plan'

    International Nuclear Information System (INIS)

    2008-01-01

    The Secretariat has received a communication dated 25 July 2008 from the Permanent Mission of India to the Agency, attaching a document entitled 'Implementation of the India-United States Joint Statement of July 18, 2005: India's Separation Plan'. As requested by the Permanent Mission of India to the Agency, the communication and its attachment are herewith circulated for information

  20. Monitoring groundwater: optimising networks to take account of cost effectiveness, legal requirements and enforcement realities

    Science.gov (United States)

    Allan, A.; Spray, C.

    2013-12-01

    The quality of monitoring networks and modeling in environmental regulation is increasingly important. This is particularly true with respect to groundwater management, where data may be limited, physical processes poorly understood and timescales very long. The powers of regulators may be fatally undermined by poor or non-existent networks, primarily through mismatches between the legal standards that networks must meet, actual capacity and the evidentiary standards of courts. For example, in the second and third implementation reports on the Water Framework Directive, the European Commission drew attention to gaps in the standards of mandatory monitoring networks, where the standard did not meet the reality. In that context, groundwater monitoring networks should provide a reliable picture of groundwater levels and a ';coherent and comprehensive' overview of chemical status so that anthropogenically influenced long-term upward trends in pollutant levels can be tracked. Confidence in this overview should be such that 'the uncertainty from the monitoring process should not add significantly to the uncertainty of controlling the risk', with densities being sufficient to allow assessment of the impact of abstractions and discharges on levels in groundwater bodies at risk. The fact that the legal requirements for the quality of monitoring networks are set out in very vague terms highlights the many variables that can influence the design of monitoring networks. However, the quality of a monitoring network as part of the armory of environmental regulators is potentially of crucial importance. If, as part of enforcement proceedings, a regulator takes an offender to court and relies on conclusions derived from monitoring networks, a defendant may be entitled to question those conclusions. If the credibility, reliability or relevance of a monitoring network can be undermined, because it is too sparse, for example, this could have dramatic consequences on the ability of a

  1. Selection and integration of a network of parallel processors in the real time acquisition system of the 4π DIAMANT multidetector: modeling, realization and evaluation of the software installed on this network

    International Nuclear Information System (INIS)

    Guirande, F.

    1997-01-01

    The increase in sensitivity of 4π arrays such as EUROBALL or DIAMANT has led to an increase in the data flow rate into the data acquisition system. If at the electronic level, the data flow has been distributed onto several data acquisition buses, it is necessary in the data processing system to increase the processing power. This work regards the modelling and implementation of the software allocated onto an architecture of parallel processors. Object analysis and formal methods were used, benchmark and evolution in the future of this architecture are presented. The thesis consists of two parts. Part A, devoted to 'Nuclear Spectroscopy with 4 π multidetectors', contains a first chapter entitled 'The Physics of 4π multidetectors' and a second chapter entitled 'Integral architecture of 4π multidetectors'. Part B, devoted to 'Parallel acquisition system of DIAMANT' contains three chapters entitled 'Material architecture', 'Software architecture' and 'Validation and Performances'. Four appendices and a term glossary close this work. (author)

  2. Mars Comm/Nav MicroSat Network Using the Multi-Mission Bus Launched Piggyback by Ariane 5

    Science.gov (United States)

    Hastrup, R. C.; Cesarone, R. J.; Morabito, D. D.

    1999-01-01

    Recently, NASA's Jet Propulsion Laboratory completed a Mars Exploration Program Architecture Definition Study with strong international participation. The recommendations of this study include establishment of a low cost in-situ communications and navigation satellite network to provide enabling and enhancing support for the international exploration of Mars. This would be the first step toward establishing a "virtual presence throughout the solar system" as called for in NASA's Strategic Plan. Response to the proposed comm/nav satellite network has been very favorably received, as reflected by the inclusion of a line item in NASA's budget submittal to Congress, which provides funding for implementation of the network with first launch in the 2003 opportunity. Funding has already been provided for a phase A study being conducted this year. This paper presents the planned implementation of the comm/nav network, which will utilize microsats based on a multi-mission spacecraft bus being designed for launch by the Ariane 5 as a secondary payload. A companion paper at this conference, entitled "The Multi-Purpose Mars Micro-Mission System Design Utilizing Ariane 5 Piggyback Launch", describes the multimission bus design. This paper addresses the application of the multi-mission bus to the comm/nav microsat mission. Following an introduction, which provides the background that has led to the proposed comm/nav network, the paper discusses the projected user needs with emphasis on the various possible robotic missions (landers, rovers, ascent vehicles, balloons, aircraft, etc.) progressing toward eventual piloted missions. Next, the paper describes the concept for an evolving network of comm/nav microsats and the expected capability to satisfy the user needs. Results of communications and navigation performance analysis are summarized for attractive satellite constellation configurations. The important comm/nav microsat functional requirements on the multi

  3. Chaperone-protease networks in mitochondrial protein homeostasis.

    Science.gov (United States)

    Voos, Wolfgang

    2013-02-01

    As essential organelles, mitochondria are intimately integrated into the metabolism of a eukaryotic cell. The maintenance of the functional integrity of the mitochondrial proteome, also termed protein homeostasis, is facing many challenges both under normal and pathological conditions. First, since mitochondria are derived from bacterial ancestor cells, the proteins in this endosymbiotic organelle have a mixed origin. Only a few proteins are encoded on the mitochondrial genome, most genes for mitochondrial proteins reside in the nuclear genome of the host cell. This distribution requires a complex biogenesis of mitochondrial proteins, which are mostly synthesized in the cytosol and need to be imported into the organelle. Mitochondrial protein biogenesis usually therefore comprises complex folding and assembly processes to reach an enzymatically active state. In addition, specific protein quality control (PQC) processes avoid an accumulation of damaged or surplus polypeptides. Mitochondrial protein homeostasis is based on endogenous enzymatic components comprising a diverse set of chaperones and proteases that form an interconnected functional network. This review describes the different types of mitochondrial proteins with chaperone functions and covers the current knowledge of their roles in protein biogenesis, folding, proteolytic removal and prevention of aggregation, the principal reactions of protein homeostasis. This article is part of a Special Issue entitled: Protein Import and Quality Control in Mitochondria and Plastids. Copyright © 2012 Elsevier B.V. All rights reserved.

  4. Percolation of interdependent network of networks

    International Nuclear Information System (INIS)

    Havlin, Shlomo; Stanley, H. Eugene; Bashan, Amir; Gao, Jianxi; Kenett, Dror Y.

    2015-01-01

    Complex networks appear in almost every aspect of science and technology. Previous work in network theory has focused primarily on analyzing single networks that do not interact with other networks, despite the fact that many real-world networks interact with and depend on each other. Very recently an analytical framework for studying the percolation properties of interacting networks has been introduced. Here we review the analytical framework and the results for percolation laws for a Network Of Networks (NONs) formed by n interdependent random networks. The percolation properties of a network of networks differ greatly from those of single isolated networks. In particular, because the constituent networks of a NON are connected by node dependencies, a NON is subject to cascading failure. When there is strong interdependent coupling between networks, the percolation transition is discontinuous (first-order) phase transition, unlike the well-known continuous second-order transition in single isolated networks. Moreover, although networks with broader degree distributions, e.g., scale-free networks, are more robust when analyzed as single networks, they become more vulnerable in a NON. We also review the effect of space embedding on network vulnerability. It is shown that for spatially embedded networks any finite fraction of dependency nodes will lead to abrupt transition

  5. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  6. Motif Penggunaan dan Kepuasan Menggunakan Path (Studi Korelasional Tentang Pengaruh Motif Penggunaan dan Kepuasan Menggunakan Jejaring sosial Path di Kalangan Masyarakat Pasar VI Kelurahan Padang Bulan Medan)

    OpenAIRE

    Dipta, Anna Mira

    2015-01-01

    This study entitled Effect of using and gratification of using social networking Path among the people in Padang Bulan Medan (CorrelationalEffect of using and gratification of using social networking Path among the people in Padang Bulan Medan). Path is a social network similar to its predecessor facebook. Path exclusive can only be used with smartphones based on IOS and android operating system. Path is a private social networking service application designed to bring users closer to family....

  7. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  8. Networks of networks – An introduction

    International Nuclear Information System (INIS)

    Kenett, Dror Y.; Perc, Matjaž; Boccaletti, Stefano

    2015-01-01

    Graphical abstract: Interdependent network reciprocity. Only those blue cooperative domains that are initially present on both networks survive. Abstract: This is an introduction to the special issue titled “Networks of networks” that is in the making at Chaos, Solitons & Fractals. Recent research and reviews attest to the fact that networks of networks are the next frontier in network science [1–7]. Not only are interactions limited and thus inadequately described by well-mixed models, it is also a fact that the networks that should be an integral part of such models are often interconnected, thus making the processes that are unfolding on them interdependent. From the World economy and transportation systems to social media, it is clear that processes taking place in one network might significantly affect what is happening in many other networks. Within an interdependent system, each type of interaction has a certain relevance and meaning, so that treating all the links identically inevitably leads to information loss. Networks of networks, interdependent networks, or multilayer networks are therefore a much better and realistic description of such systems, and this Special Issue is devoted to their structure, dynamics and evolution, as well as to the study of emergent properties in multi-layered systems in general. Topics of interest include but are not limited to the spread of epidemics and information, percolation, diffusion, synchronization, collective behavior, and evolutionary games on networks of networks. Interdisciplinary work on all aspects of networks of networks, regardless of background and motivation, is very welcome.

  9. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  10. Advancing methods for research on household water insecurity: Studying entitlements and capabilities, socio-cultural dynamics, and political processes, institutions and governance.

    Science.gov (United States)

    Wutich, Amber; Budds, Jessica; Eichelberger, Laura; Geere, Jo; Harris, Leila; Horney, Jennifer; Jepson, Wendy; Norman, Emma; O'Reilly, Kathleen; Pearson, Amber; Shah, Sameer; Shinn, Jamie; Simpson, Karen; Staddon, Chad; Stoler, Justin; Teodoro, Manuel P; Young, Sera

    2017-11-01

    Household water insecurity has serious implications for the health, livelihoods and wellbeing of people around the world. Existing methods to assess the state of household water insecurity focus largely on water quality, quantity or adequacy, source or reliability, and affordability. These methods have significant advantages in terms of their simplicity and comparability, but are widely recognized to oversimplify and underestimate the global burden of household water insecurity. In contrast, a broader definition of household water insecurity should include entitlements and human capabilities, sociocultural dynamics, and political institutions and processes. This paper proposes a mix of qualitative and quantitative methods that can be widely adopted across cultural, geographic, and demographic contexts to assess hard-to-measure dimensions of household water insecurity. In doing so, it critically evaluates existing methods for assessing household water insecurity and suggests ways in which methodological innovations advance a broader definition of household water insecurity.

  11. Health Improvement and Educational Attainment in Secondary Schools: Complementary or Competing Priorities? Exploratory Analyses From the School Health Research Network in Wales.

    Science.gov (United States)

    Littlecott, Hannah J; Long, Sara; Hawkins, Jemma; Murphy, Simon; Hewitt, Gillian; Eccles, Gemma; Fletcher, Adam; Moore, Graham F

    2018-01-01

    Implementing health improvement is often perceived as diverting resource away from schools' core business, reflecting an assumption of a "zero-sum game" between health and education. There is some evidence that health behaviors may affect young people's educational outcomes. However, associations between implementation of school health improvement and educational outcomes remains underinvestigated. The study linked school-level data on free school meal (FSM) entitlement, educational outcomes, and school attendance, obtained from government websites, with data from the School Environment Questionnaire (SEQ) on health improvement activity collected in Wales (2015/2016). Spearman's rank correlation coefficients and linear regression models tested the extent of association between health improvement activity and attendance and educational outcomes. SEQ data were provided by 100/115 network schools (87%), of whom data on educational performance were obtained from 97. The percentage of pupils entitled to FSM predicted most of the between-school variance in achievement and attendance. Linear regression models demonstrated significant positive associations of all measures of health improvement activity with attainment at Key Stage (KS) 3, apart from mental health education in the curriculum and organizational commitment to health. Student and parent involvement in planning health activities were associated with improved school attendance. There were no significant associations between health improvement and KS4 attainment. Implementing health improvement activity does not have a detrimental effect on schools' educational performance. There is tentative evidence of the reverse, with better educational outcomes in schools with more extensive health improvement policies and practices. Further research should investigate processes by which this occurs and variations by socioeconomic status.

  12. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  13. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  14. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  15. Topology of the European Network of Earth Observation Networks and the need for an European Network of Networks

    Science.gov (United States)

    Masó, Joan; Serral, Ivette; McCallum, Ian; Blonda, Palma; Plag, Hans-Peter

    2016-04-01

    ConnectinGEO (Coordinating an Observation Network of Networks EnCompassing saTellite and IN-situ to fill the Gaps in European Observations" is an H2020 Coordination and Support Action with the primary goal of linking existing Earth Observation networks with science and technology (S&T) communities, the industry sector, the Group on Earth Observations (GEO), and Copernicus. The project will end in February 2017. ConnectinGEO will initiate a European Network of Earth Observation Networks (ENEON) that will encompass space-based, airborne and in-situ observations networks. ENEON will be composed of project partners representing thematic observation networks along with the GEOSS Science and Technology Stakeholder Network, GEO Communities of Practices, Copernicus services, Sentinel missions and in-situ support data representatives, representatives of the European space-based, airborne and in-situ observations networks. This communication presents the complex panorama of Earth Observations Networks in Europe. The list of networks is classified by discipline, variables, geospatial scope, etc. We also capture the membership and relations with other networks and umbrella organizations like GEO. The result is a complex interrelation between networks that can not be clearly expressed in a flat list. Technically the networks can be represented as nodes with relations between them as lines connecting the nodes in a graph. We have chosen RDF as a language and an AllegroGraph 3.3 triple store that is visualized in several ways using for example Gruff 5.7. Our final aim is to identify gaps in the EO Networks and justify the need for a more structured coordination between them.

  16. What specifications for a centre or network of excellence in clinical research?

    Science.gov (United States)

    Diebolt, Vincent; Lang, Marie; Thoby, Frédérique

    2016-02-01

    The Giens 2015 Workshop Round Table entitled "What specifications for a centre or network of excellence in clinical research?" took a viewpoint distinct from earlier work and studies on changes in clinical research activities in France. The purpose of the present work was to identify, starting from concrete examples, the main strengths and advantages of clinical research activity in France related, in part, to the background environment and also to the specific characteristics of the investigation centres considered to be among the most high-performance units in activity. The criteria retained were grouped into a set of specifications that could be used to establish a "label of excellence" upon which the different teams and clinical research centres could model themselves. It was thus considered that belonging to a centre or structured network with at least a national configuration, when this is possible for the medial topic in question, constitutes a real advantage. Four benchmarks were identified: the scientific and clinical expertise of the head investigator, as well as the qualification and operational capacity of the centre's team; definition and measurement of performance using clearly displayed indicators and evaluation procedures; the quality of the overall trial "process" and of each of its component steps; communication, because know-how and promotion go hand in hand, with the main objective of informing the professional and general public about the value of the research centre meeting the above-mentioned criteria, about its networks of competencies, and more generally, about the important assets of the background of clinical research in France. This sector of research is funded by the public authorities via calls for public grants, financial aids for structures supporting clinical research in the University Hospital Centres and other healthcare institutions allowing for a professionalization of the research occupations, and the national public health

  17. FOSER - Future of Software Engineering Research

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The 2010 Report of the Presidents Council of Advisors on Science and Technology PCAST, entitled ?Designing a Digital Future: Federally Funded Research and...

  18. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  19. Deterministic bound for avionics switched networks according to networking features using network calculus

    Directory of Open Access Journals (Sweden)

    Feng HE

    2017-12-01

    Full Text Available The state of the art avionics system adopts switched networks for airborne communications. A major concern in the design of the networks is the end-to-end guarantee ability. Analytic methods have been developed to compute the worst-case delays according to the detailed configurations of flows and networks within avionics context, such as network calculus and trajectory approach. It still lacks a relevant method to make a rapid performance estimation according to some typically switched networking features, such as networking scale, bandwidth utilization and average flow rate. The goal of this paper is to establish a deterministic upper bound analysis method by using these networking features instead of the complete network configurations. Two deterministic upper bounds are proposed from network calculus perspective: one is for a basic estimation, and another just shows the benefits from grouping strategy. Besides, a mathematic expression for grouping ability is established based on the concept of network connecting degree, which illustrates the possibly minimal grouping benefit. For a fully connected network with 4 switches and 12 end systems, the grouping ability coming from grouping strategy is 15–20%, which just coincides with the statistical data (18–22% from the actual grouping advantage. Compared with the complete network calculus analysis method for individual flows, the effectiveness of the two deterministic upper bounds is no less than 38% even with remarkably varied packet lengths. Finally, the paper illustrates the design process for an industrial Avionics Full DupleX switched Ethernet (AFDX networking case according to the two deterministic upper bounds and shows that a better control for network connecting, when designing a switched network, can improve the worst-case delays dramatically. Keywords: Deterministic bound, Grouping ability, Network calculus, Networking features, Switched networks

  20. AN ANALYSIS OF FIGURATIVE LANGUAGES USED IN COELHOS’S NOVEL ENTITLED “ALCHEMIST”

    Directory of Open Access Journals (Sweden)

    Trisna Dinillah Harya

    2017-05-01

    Full Text Available The title of this study is, “An Analysis of Figurative Languages Used in Paulo Coelho’s novel Entitled “The Alchemist”. The objectives of the study are to describe the types of the figurative language found in the book and to identify the contextual meaning of the figurative language. The method used in collecting the data related to the subject of this research is documentation method because the researcher collected the data from novel. This study was conducted by collecting any relevant data and information about the topic or problem of the study from novels and internet that are available for the analysis. The data collection used the following steps: reading the novel, and then selecting the data that used the types of figurative language. While the steps to analyze the data are identifying the types of figurative language according to Leech, identifying the contextual meaning of the figurative language, and the last is interpreting the data.The result shows that there are 70 sentences that have figurative language. From all the sentences, there are 30 items or 42.9% of simile, 27 items or 38.6% of personification, 12 items or 17.1% of metaphor, and 1 item or 1.4% of hyperbole. It can be indicated that the dominant type of figurative language in the novel is simile. The author uses simile to explain circumstances, to describe the characters, to express emotion of the characters, and to make his writing more vivid and entertaining. It can be concluded that figurative language has important roles in this novel. That‘s why the author used so many sentences that have figurative language in this novel. Using figurative language makes the novel more interesting to read, and helps the readers to imagine the story, the character based on the illustration that the author has already given in the story.

  1. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  2. Flood forecasting for the upper reach of the Red River Basin, North ...

    African Journals Online (AJOL)

    This is a multilayer feed forward neural network with a back- ... 2 with the input layer, one hidden layer, andthe output layer with only one node . Theactivation ..... Thepaper is aresult of theresearch project entitled FLOod Control. Decision ...

  3. Data center networks and network architecture

    Science.gov (United States)

    Esaki, Hiroshi

    2014-02-01

    This paper discusses and proposes the architectural framework, which is for data center networks. The data center networks require new technical challenges, and it would be good opportunity to change the functions, which are not need in current and future networks. Based on the observation and consideration on data center networks, this paper proposes; (i) Broadcast-free layer 2 network (i.e., emulation of broadcast at the end-node), (ii) Full-mesh point-to-point pipes, and (iii) IRIDES (Invitation Routing aDvertisement for path Engineering System).

  4. Evaluation results after seven years of operation for the permanent Hellenic Seismological Network of Crete (HSNC).

    Science.gov (United States)

    Vallianatos, F.; Hloupis, G.; Papadopoulos, I.

    2012-04-01

    The Hellenic arc and the adjacent areas of the Greek mainland are the most active in western Eurasia and some of the most seismically active zones of the world. The seismicity of South Aegean is extremely high and is characterised by the frequent occurrence of large shallow and intermediate depth earthquakes. Until 2004, the installed seismological stations from several providers (NOA, GEOFON, MEDNET) provide average interstation distance around 130km resulting to catalogues with minimum magnitude of completeness (Mc) equals to 3.7. Towards to the direction of providing dense and state of the art instrumental coverage of seismicity in the South Aegean, HSNC begun its operation in 2004. Today it consists of (12) permanent seismological stations equipped with short period and broadband seismographs coupled with 3rd generation 24bit data loggers as well as from (2) accelerographs . The addition of HSNC along with combined use of all the active networks in South Aegean area (NOA, GEOFON, AUTH) decrease the average interstation distance to 60km and provide catalogues with Mc≥3.2. Data transmission and telemetry is implemented by a hybrid network consisting of dedicated wired ADSL links as well as VSAT links by using a unique private satellite hub. Real time data spread over collaborating networks (AUTH) and laboratories (Department of Earth Science - UCL) while at the same time, events are appended automatically and manually to EMSC database. Additional value to the network is provided by means of prototype systems which deployed in-situ for the purposes of: a) Acquiring aftershock data in the minimum time after main event. This is a mobile seismological network called RaDeSeis (Rapid Deployment Seismological network) which consists of a central station acting also as the central communication hub and wifi coupled mobile stations. b) The development of dedicated hardware and software solutions for rapid installation times (around 1 hour for each station) leading to

  5. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  6. A European network for food-borne parasites (Euro-FBP: meeting report on ‘Analytical methods for food-borne parasites in human and veterinary diagnostics and in food matrices’

    Directory of Open Access Journals (Sweden)

    Christian Klotz

    2017-11-01

    Full Text Available Abstract Food-borne parasites (FBPs are a neglected topic in food safety, partly due to a lack of awareness of their importance for public health, especially as symptoms tend not to develop immediately after exposure. In addition, methodological difficulties with both diagnosis in infected patients and detection in food matrices result in under-detection and therefore the potential for underestimation of their burden on our societies. This, in consequence, leads to lower prioritization for basic research, e.g. for development new and more advanced detection methods for different food matrices and diagnostic samples, and thus a vicious circle of neglect and lack of progress is propagated. The COST Action FA1408, A European Network for Foodborne Parasites (Euro-FBP aims to combat the impact of FBP on public health by facilitating the multidisciplinary cooperation and partnership between groups of researchers and between researchers and stakeholders. The COST Action TD1302, the European Network for cysticercosis/taeniosis, CYSTINET, has a specific focus on Taenia solium and T. saginata, two neglected FBPs, and aims to advance knowledge and understanding of these zoonotic disease complexes via collaborations in a multidisciplinary scientific network. This report summarizes the results of a meeting within the Euro-FBP consortium entitled ‘Analytical methods for food-borne parasites in human and veterinary diagnostics and in food matrices’ and of the joined Euro-FBP and CYSTINET meeting.

  7. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  8. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  9. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  10. Gradient networks on uncorrelated random scale-free networks

    International Nuclear Information System (INIS)

    Pan Guijun; Yan Xiaoqing; Huang Zhongbing; Ma Weichuan

    2011-01-01

    Uncorrelated random scale-free (URSF) networks are useful null models for checking the effects of scale-free topology on network-based dynamical processes. Here, we present a comparative study of the jamming level of gradient networks based on URSF networks and Erdos-Renyi (ER) random networks. We find that the URSF networks are less congested than ER random networks for the average degree (k)>k c (k c ∼ 2 denotes a critical connectivity). In addition, by investigating the topological properties of the two kinds of gradient networks, we discuss the relations between the topological structure and the transport efficiency of the gradient networks. These findings show that the uncorrelated scale-free structure might allow more efficient transport than the random structure.

  11. Reconfigurable network systems and software-defined networking

    OpenAIRE

    Zilberman, N.; Watts, P. M.; Rotsos, C.; Moore, A. W.

    2015-01-01

    Modern high-speed networks have evolved from relatively static networks to highly adaptive networks facilitating dynamic reconfiguration. This evolution has influenced all levels of network design and management, introducing increased programmability and configuration flexibility. This influence has extended from the lowest level of physical hardware interfaces to the highest level of network management by software. A key representative of this evolution is the emergence of software-defined n...

  12. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  13. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  14. Epilepsy as a Network Disorder (1): What can we learn from other network disorders such as autistic spectrum disorder and mood disorders?

    Science.gov (United States)

    Kanner, Andres M; Scharfman, Helen; Jette, Nathalie; Anagnostou, Evdokia; Bernard, Christophe; Camfield, Carol; Camfield, Peter; Legg, Karen; Dinstein, Ilan; Giacobbe, Peter; Friedman, Alon; Pohlmann-Eden, Bernd

    2017-12-01

    Epilepsy is a neurologic condition which often occurs with other neurologic and psychiatric disorders. The relation between epilepsy and these conditions is complex. Some population-based studies have identified a bidirectional relation, whereby not only patients with epilepsy are at increased risk of suffering from some of these neurologic and psychiatric disorders (migraine, stroke, dementia, autism, depression, anxiety disorders, Attention deficit hyperactivity disorder (ADHD), and psychosis), but also patients with these conditions are at increased risk of suffering from epilepsy. The existence of common pathogenic mechanisms has been postulated as a potential explanation of this phenomenon. To reassess the relationships between neurological and psychiatric conditions in general, and specifically autism, depression, Alzheimer's disease, schizophrenia, and epilepsy, a recent meeting brought together basic researchers and clinician scientists entitled "Epilepsy as a Network Disorder." This was the fourth in a series of conferences, the "Fourth International Halifax Conference and Retreat". This manuscript summarizes the proceedings on potential relations between Epilepsy on the one hand and autism and depression on the other. A companion manuscript provides a summary of the proceedings about the relation between epilepsy and Alzheimer's disease and schizophrenia, closed by the role of translational research in clarifying these relationships. The review of the topics in these two manuscripts will provide a better understanding of the mechanisms operant in some of the common neurologic and psychiatric comorbidities of epilepsy. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  16. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  17. Network marketing on a small-world network

    Science.gov (United States)

    Kim, Beom Jun; Jun, Tackseung; Kim, Jeong-Yoo; Choi, M. Y.

    2006-02-01

    We investigate a dynamic model of network marketing in a small-world network structure artificially constructed similarly to the Watts-Strogatz network model. Different from the traditional marketing, consumers can also play the role of the manufacturer's selling agents in network marketing, which is stimulated by the referral fee the manufacturer offers. As the wiring probability α is increased from zero to unity, the network changes from the one-dimensional regular directed network to the star network where all but one player are connected to one consumer. The price p of the product and the referral fee r are used as free parameters to maximize the profit of the manufacturer. It is observed that at α=0 the maximized profit is constant independent of the network size N while at α≠0, it increases linearly with N. This is in parallel to the small-world transition. It is also revealed that while the optimal value of p stays at an almost constant level in a broad range of α, that of r is sensitive to a change in the network structure. The consumer surplus is also studied and discussed.

  18. Weighted Scale-Free Network Properties of Ecological Network

    International Nuclear Information System (INIS)

    Lee, Jae Woo; Maeng, Seong Eun

    2013-01-01

    We investigate the scale-free network properties of the bipartite ecological network, in particular, the plant-pollinator network. In plant-pollinator network, the pollinators visit the plant to get the nectars. In contrast to the other complex network, the plant-pollinator network has not only the trophic relationships among the interacting partners but also the complexities of the coevolutionary effects. The interactions between the plant and pollinators are beneficial relations. The plant-pollinator network is a bipartite and weighted network. The networks have two types of the nodes: plant and pollinator. We consider the visiting frequency of a pollinator to a plant as the weighting value of the link. We defined the strength of a node as the sum of the weighting value of the links. We reported the cumulative distribution function (CDF) of the degree and the strength of the plant-pollinator network. The CDF of the plants followed stretched exponential functions for both degree and strength, but the CDF of the pollinators showed the power law for both degree and strength. The average strength of the links showed the nonlinear dependence on the degree of the networks.

  19. 75 FR 6570 - Approval and Promulgation of Air Quality Implementation Plans; Louisiana; Baton Rouge 1-Hour...

    Science.gov (United States)

    2010-02-10

    ... from John S. Seitz, Director, Office of Air Quality Planning and Standards, entitled ``Reasonable... Environmental Law Clinic on behalf of the Louisiana Environmental Action Network (LEAN) (hereinafter LEAN... submitted by LCA, and to adverse comments received from LEAN. LCA submitted the following additional...

  20. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  1. Proceedings of the 12. meeting of the International Post-Combustion CO{sub 2} Capture Network

    Energy Technology Data Exchange (ETDEWEB)

    Topper, J. [IEA Greenhouse Gas R and D Programme, Cheltenham, Gloucestershire (United Kingdom)] (comp.)

    2009-07-01

    This conference provided a forum to discuss new developments in post combustion capture of carbon dioxide (CO{sub 2}) emissions from fossil-fueled power plants. Since the creation of the Post-Combustion Capture Network in 2000, these conferences have provided exposure to latest research findings, acted as a conduit for trial of latest ideas and served as a means of encouraging trans-national co-operation. As host of the conference, the University of Regina is among the leading institutions in the world with expertise in working on solvent based capture and promoting international activity through the International Test Centre. The topics of discussion ranged from amine based solvent investigations; ammonia as an alternative means of capture; pilot plant progress reports; simulation and modelling studies; latest developments by technology providers; national programs with a special interest in demonstration plant proposals; and more novel techniques such as membranes. The sessions of the conference were entitled: fundamental studies; pilot plant work and scale-up; modelling and plant studies; and commercial and other aspects. This meeting featured 49 presentations, of which 46 have been catalogued separately for inclusion in this database. refs., figs.

  2. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  3. Undermining and Strengthening Social Networks through Network Modification

    Science.gov (United States)

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  4. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  5. Recent advances on failure and recovery in networks of networks

    International Nuclear Information System (INIS)

    Shekhtman, Louis M.; Danziger, Michael M.; Havlin, Shlomo

    2016-01-01

    Until recently, network science has focused on the properties of single isolated networks that do not interact or depend on other networks. However it has now been recognized that many real-networks, such as power grids, transportation systems, and communication infrastructures interact and depend on other networks. Here, we will present a review of the framework developed in recent years for studying the vulnerability and recovery of networks composed of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes, like for example certain people, play a role in two networks, i.e. in a multiplex. Dependency relations may act recursively and can lead to cascades of failures concluding in sudden fragmentation of the system. We review the analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. The general theory and behavior of interdependent networks has many novel features that are not present in classical network theory. Interdependent networks embedded in space are significantly more vulnerable compared to non-embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences. Finally, when recovery of components is possible, global spontaneous recovery of the networks and hysteresis phenomena occur. The theory developed for this process points to an optimal repairing strategy for a network of networks. Understanding realistic effects present in networks of networks is required in order to move towards determining system vulnerability.

  6. vhv supply networks, problems of network structure

    Energy Technology Data Exchange (ETDEWEB)

    Raimbault, J

    1966-04-01

    The present and future power requirements of the Paris area and the structure of the existing networks are discussed. The various limitations that will have to be allowed for to lay down the structure of a regional transmission network leading in the power of the large national transmission network to within the Paris built up area are described. The theoretical solution that has been adopted, and the features of its final achievement, which is planned for about the year 2000, and the intermediate stages are given. The problem of the structure of the National Power Transmission network which is to supply the regional network was studied. To solve this problem, a 730 kV voltage network will have to be introduced.

  7. Network configuration of global R&D networks

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Srai, Jagjit Singh

    2011-01-01

    , network configuration of global R&D has tended to focus on strategic elements with limited attention given operational effectiveness, or to interfaces with downstream manufacturing operations. Within OM literature, the drivers of configuration of global networks within, engineering, production, supply...... to R&D networks emerged, e.g. product features were more prominent in R&D networks. Furthermore, the study has shown extensive interaction with other operations, including many downstream manufacturing operations. By extending the OM configuration concepts to the configuration of R&D networks......Companies are increasingly globalising their R&D activities, both within the firms and with external partners, with consequent implications for their interaction with manufacturing operations. Previous research in R&D networks has focused on coordination, governance and support elements. However...

  8. Innovation in Multiple Networks and Networks of Networks: The Case of the Fruit Sector in Emilia‐Romagna

    Directory of Open Access Journals (Sweden)

    Davide Viaggi

    2013-02-01

    Full Text Available In the paper we examine the issue of food systems in which farms participate in multiple networks that, for their part, tend also to be members of networks of networks. The issue is addressed through a descriptive analysis of the fruit sector in Emilia‐Romagna (Italy. The farms in the area tend to join a different network for each product/product type. Innovation networks are embedded in commercialization or input provider networks, but separate (parallel networks also exist, particularly for basic research activities. Networks of networks are largely a product of the cooperative system. The paper concludes by emphasising the need for further research in multiple networking strategies and the connection betweencommercialisation networks and innovation.

  9. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  10. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  11. Spatial networks

    Science.gov (United States)

    Barthélemy, Marc

    2011-02-01

    Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, and neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields, ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated with the length of edges which in turn has dramatic effects on the topological structure of these networks. We will thoroughly explain the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spatial networks, such as phase transitions, random walks, synchronization, navigation, resilience, and disease spread.

  12. Development of realtime disaster mitigation system for urban gas supply network

    Energy Technology Data Exchange (ETDEWEB)

    Shimizu, Y.; Koganemaru, K.; Nakayama, W. [Technology Research Inst., Tokyo Gas Co. Ltd., Tokyo (Japan); Yamazaki, F. [Chiba University, Chiba (Japan); Isoyama, R.; Ishida, E. [Japan Engineering Consultants Co. Ltd., Tokyo (Japan)

    2004-07-01

    In response to the Kobe earthquake in 1995, efforts were initiated to develop a real-time system to mitigate earthquake-induced damages in gas supply networks which aimed at collecting information quickly and, if necessary, carrying out emergency measures. A new compact seismograph was recently developed, entitled New SI Sensor (SI). This device houses an electronic circuit which determines the SI value more precisely, detects the onset of liquefaction, and transmits the whole time history of seismic acceleration to head quarters. Consequently, a new safety system called SUPer-dense REaltime Monitoring of Earthquake (SUPREME) was developed which makes use of 3,800 new SI sensors. This paper introduces the structure of this new system. The remote shut-off using SUPREME results in quick gas supply shut-off and effectively reduce the risk of gas leakage during earthquakes. With enhanced use of geographic information systems, SUPREME can also conduct damage assessment for gas pipelines. To estimate the distribution of SI values and liquefied depth more precisely, digital map, geological map, topographical map and borehole logging data of about 60,000 sites were collected and compiled. Site amplification factors for SI values were estimated at the boring points. Then, spatial distribution of the site amplification factor was estimated based on weighted average of the amplification factors of surrounding boring points and the geological and topographical maps. 9 refs., 2 tabs., 14 figs.

  13. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  14. Inferring general relations between network characteristics from specific network ensembles.

    Science.gov (United States)

    Cardanobile, Stefano; Pernice, Volker; Deger, Moritz; Rotter, Stefan

    2012-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their ability to generate networks with large structural variability. In particular, we consider the statistical constraints which the respective construction scheme imposes on the generated networks. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This makes it possible to infer global features from local ones using regression models trained on networks with high generalization power. Our results confirm and extend previous findings regarding the synchronization properties of neural networks. Our method seems especially relevant for large networks, which are difficult to map completely, like the neural networks in the brain. The structure of such large networks cannot be fully sampled with the present technology. Our approach provides a method to estimate global properties of under-sampled networks in good approximation. Finally, we demonstrate on three different data sets (C. elegans neuronal network, R. prowazekii metabolic network, and a network of synonyms extracted from Roget's Thesaurus) that real-world networks have statistical relations compatible with those obtained using regression models.

  15. Search Results | Page 34 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Results 331 - 340 of 439 ... ... INCOME GENERATION 10 Apply INCOME GENERATION filter ... Women's Economic Rights and Entitlement on Separation and Divorce (India) ... But, there still exists a considerable gap in innovation capability between ... Asia-Pacific Research and Training Network on Trade (ARTNET) - Phase II.

  16. Maximum entropy networks are more controllable than preferential attachment networks

    International Nuclear Information System (INIS)

    Hou, Lvlin; Small, Michael; Lao, Songyang

    2014-01-01

    A maximum entropy (ME) method to generate typical scale-free networks has been recently introduced. We investigate the controllability of ME networks and Barabási–Albert preferential attachment networks. Our experimental results show that ME networks are significantly more easily controlled than BA networks of the same size and the same degree distribution. Moreover, the control profiles are used to provide insight into control properties of both classes of network. We identify and classify the driver nodes and analyze the connectivity of their neighbors. We find that driver nodes in ME networks have fewer mutual neighbors and that their neighbors have lower average degree. We conclude that the properties of the neighbors of driver node sensitively affect the network controllability. Hence, subtle and important structural differences exist between BA networks and typical scale-free networks of the same degree distribution. - Highlights: • The controllability of maximum entropy (ME) and Barabási–Albert (BA) networks is investigated. • ME networks are significantly more easily controlled than BA networks of the same degree distribution. • The properties of the neighbors of driver node sensitively affect the network controllability. • Subtle and important structural differences exist between BA networks and typical scale-free networks

  17. Network Learning and Innovation in SME Formal Networks

    Directory of Open Access Journals (Sweden)

    Jivka Deiters

    2013-02-01

    Full Text Available The driver for this paper is the need to better understand the potential for learning and innovation that networks canprovide especially for small and medium sized enterprises (SMEs which comprise by far the majority of enterprises in the food sector. With the challenges the food sector is facing in the near future, learning and innovation or more focused, as it is being discussed in the paper, ‘learning for innovation’ are not just opportunities but pre‐conditions for the sustainability of the sector. Network initiatives that could provide appropriate support involve social interaction and knowledge exchange, learning, competence development, and coordination (organization and management of implementation. The analysis identifies case studies in any of these orientations which serve different stages of the innovation process: invention and implementation. The variety of network case studies cover networks linked to a focus group for training, research, orconsulting, networks dealing with focused market oriented product or process development, promotional networks, and networks for open exchange and social networking.

  18. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  19. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  20. Application of Butterfly Clos-Network in Network-on-Chip

    Directory of Open Access Journals (Sweden)

    Hui Liu

    2014-01-01

    Full Text Available This paper studied the topology of NoC (Network-on-Chip. By combining the characteristics of the Clos network and butterfly network, a new topology named BFC (Butterfly Clos-network network was proposed. This topology integrates several modules, which belongs to the same layer but different dimensions, into a new module. In the BFC network, a bidirectional link is used to complete information exchange, instead of information exchange between different layers in the original network. During the routing period, other nondestination nodes can be used as middle stages to transfer data packets to complete the routing mission. Therefore, this topology has the characteristic of multistage. Simulation analyses show that BFC inherits the rich path diversity of Clos network, and it has a better performance than butterfly network in throughput and delay in a quite congested traffic pattern.

  1. Biological Networks Entropies: Examples in Neural Memory Networks, Genetic Regulation Networks and Social Epidemic Networks

    Directory of Open Access Journals (Sweden)

    Jacques Demongeot

    2018-01-01

    Full Text Available Networks used in biological applications at different scales (molecule, cell and population are of different types: neuronal, genetic, and social, but they share the same dynamical concepts, in their continuous differential versions (e.g., non-linear Wilson-Cowan system as well as in their discrete Boolean versions (e.g., non-linear Hopfield system; in both cases, the notion of interaction graph G(J associated to its Jacobian matrix J, and also the concepts of frustrated nodes, positive or negative circuits of G(J, kinetic energy, entropy, attractors, structural stability, etc., are relevant and useful for studying the dynamics and the robustness of these systems. We will give some general results available for both continuous and discrete biological networks, and then study some specific applications of three new notions of entropy: (i attractor entropy, (ii isochronal entropy and (iii entropy centrality; in three domains: a neural network involved in the memory evocation, a genetic network responsible of the iron control and a social network accounting for the obesity spread in high school environment.

  2. Temporal networks

    CERN Document Server

    Saramäki, Jari

    2013-01-01

    The concept of temporal networks is an extension of complex networks as a modeling framework to include information on when interactions between nodes happen. Many studies of the last decade examine how the static network structure affect dynamic systems on the network. In this traditional approach  the temporal aspects are pre-encoded in the dynamic system model. Temporal-network methods, on the other hand, lift the temporal information from the level of system dynamics to the mathematical representation of the contact network itself. This framework becomes particularly useful for cases where there is a lot of structure and heterogeneity both in the timings of interaction events and the network topology. The advantage compared to common static network approaches is the ability to design more accurate models in order to explain and predict large-scale dynamic phenomena (such as, e.g., epidemic outbreaks and other spreading phenomena). On the other hand, temporal network methods are mathematically and concept...

  3. Mitigating Inter-Network Interference in LoRa Networks

    OpenAIRE

    Voigt, Thiemo; Bor, Martin; Roedig, Utz; Alonso, Juan

    2017-01-01

    Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the use of multiple base stations as methods of dealing with inter-network interference. Directional a...

  4. Maximal network reliability for a stochastic power transmission network

    International Nuclear Information System (INIS)

    Lin, Yi-Kuei; Yeh, Cheng-Ta

    2011-01-01

    Many studies regarded a power transmission network as a binary-state network and constructed it with several arcs and vertices to evaluate network reliability. In practice, the power transmission network should be stochastic because each arc (transmission line) combined with several physical lines is multistate. Network reliability is the probability that the network can transmit d units of electric power from a power plant (source) to a high voltage substation at a specific area (sink). This study focuses on searching for the optimal transmission line assignment to the power transmission network such that network reliability is maximized. A genetic algorithm based method integrating the minimal paths and the Recursive Sum of Disjoint Products is developed to solve this assignment problem. A real power transmission network is adopted to demonstrate the computational efficiency of the proposed method while comparing with the random solution generation approach.

  5. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  6. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  7. Exploring biological network structure with clustered random networks

    Directory of Open Access Journals (Sweden)

    Bansal Shweta

    2009-12-01

    Full Text Available Abstract Background Complex biological systems are often modeled as networks of interacting units. Networks of biochemical interactions among proteins, epidemiological contacts among hosts, and trophic interactions in ecosystems, to name a few, have provided useful insights into the dynamical processes that shape and traverse these systems. The degrees of nodes (numbers of interactions and the extent of clustering (the tendency for a set of three nodes to be interconnected are two of many well-studied network properties that can fundamentally shape a system. Disentangling the interdependent effects of the various network properties, however, can be difficult. Simple network models can help us quantify the structure of empirical networked systems and understand the impact of various topological properties on dynamics. Results Here we develop and implement a new Markov chain simulation algorithm to generate simple, connected random graphs that have a specified degree sequence and level of clustering, but are random in all other respects. The implementation of the algorithm (ClustRNet: Clustered Random Networks provides the generation of random graphs optimized according to a local or global, and relative or absolute measure of clustering. We compare our algorithm to other similar methods and show that ours more successfully produces desired network characteristics. Finding appropriate null models is crucial in bioinformatics research, and is often difficult, particularly for biological networks. As we demonstrate, the networks generated by ClustRNet can serve as random controls when investigating the impacts of complex network features beyond the byproduct of degree and clustering in empirical networks. Conclusion ClustRNet generates ensembles of graphs of specified edge structure and clustering. These graphs allow for systematic study of the impacts of connectivity and redundancies on network function and dynamics. This process is a key step in

  8. Modelling dendritic ecological networks in space: anintegrated network perspective

    Science.gov (United States)

    Peterson, Erin E.; Ver Hoef, Jay M.; Isaak, Dan J.; Falke, Jeffrey A.; Fortin, Marie-Josée; Jordon, Chris E.; McNyset, Kristina; Monestiez, Pascal; Ruesch, Aaron S.; Sengupta, Aritra; Som, Nicholas; Steel, E. Ashley; Theobald, David M.; Torgersen, Christian E.; Wenger, Seth J.

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of ecological networks, or in 2-D space, may be inadequate for studying the influence of structure and connectivity on ecological processes within DENs. We propose a conceptual taxonomy of network analysis methods that account for DEN characteristics to varying degrees and provide a synthesis of the different approaches within

  9. Energy-aware virtual network embedding in flexi-grid networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng

    2017-11-27

    Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.

  10. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  11. Deploying temporary networks for upscaling of sparse network stations

    Science.gov (United States)

    Coopersmith, Evan J.; Cosh, Michael H.; Bell, Jesse E.; Kelly, Victoria; Hall, Mark; Palecki, Michael A.; Temimi, Marouane

    2016-10-01

    Soil observations networks at the national scale play an integral role in hydrologic modeling, drought assessment, agricultural decision support, and our ability to understand climate change. Understanding soil moisture variability is necessary to apply these measurements to model calibration, business and consumer applications, or even human health issues. The installation of soil moisture sensors as sparse, national networks is necessitated by limited financial resources. However, this results in the incomplete sampling of the local heterogeneity of soil type, vegetation cover, topography, and the fine spatial distribution of precipitation events. To this end, temporary networks can be installed in the areas surrounding a permanent installation within a sparse network. The temporary networks deployed in this study provide a more representative average at the 3 km and 9 km scales, localized about the permanent gauge. The value of such temporary networks is demonstrated at test sites in Millbrook, New York and Crossville, Tennessee. The capacity of a single U.S. Climate Reference Network (USCRN) sensor set to approximate the average of a temporary network at the 3 km and 9 km scales using a simple linear scaling function is tested. The capacity of a temporary network to provide reliable estimates with diminishing numbers of sensors, the temporal stability of those networks, and ultimately, the relationship of the variability of those networks to soil moisture conditions at the permanent sensor are investigated. In this manner, this work demonstrates the single-season installation of a temporary network as a mechanism to characterize the soil moisture variability at a permanent gauge within a sparse network.

  12. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  13. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  14. Local mobility and topology in gels

    International Nuclear Information System (INIS)

    Higgins, J.S.; Ma, K.; Hall, R.H.; Warner, M.

    1981-04-01

    In the first section of this two part report entitled 'Separation of the motion around cross-link points from main chain motion in network samples' by Higgins, Ma and Hall, experimental evidence for topologically dependent diffusion in gels and rubbers is presented from high resolution neutron scattering experiments on deuterium labelled model trifunctional networks which show that the junction points move more slowly than the free chain centres by a factor of about two. In the second part by Warner entitled 'The dynamics of particular points on a polymer chain', the diffusional dynamics of particular points of a polymer chain is calculated in the Rouse approximation. The points considered correspond, in the case of incoherent neutron scattering, to the proton-labelled free ends of chains, crosslinks between chains in rubbers or gels, or the central monomers in branched or star polymers. Results derived are also relevant to NMR, ESR and computer simulation experiments. (U.K.)

  15. Creative Network Communities in the Translocal Space of Digital Networks

    Directory of Open Access Journals (Sweden)

    Rasa Smite

    2013-01-01

    Full Text Available What should sociological research be in the age of Web 2.0? Considering that the task of “network sociology” is not only empirical research but also the interpretation of tendencies of the network culture, this research explores the rise of network communities within Eastern and Western Europe in the early Internet era. I coined the term creative networks to distinguish these early creative and social activities from today’s popular social networking. Thus I aimed to interpret the meaning of social action; the motivation of creative community actors, their main fields of activities and social organization forms; and the potential that these early developments contain for the future sustainability of networks. Data comprise interviews with networking experts and founders and members of various networks. Investigating respondents’ motivations for creating online networks and communities, and interpreting those terms, allows for comparing the creative networks of the 1990s with today’s social networks and for drawing conclusions.

  16. Comparison analysis on vulnerability of metro networks based on complex network

    Science.gov (United States)

    Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan

    2018-04-01

    This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.

  17. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  18. Network architecture in a converged optical + IP network

    Science.gov (United States)

    Wakim, Walid; Zottmann, Harald

    2012-01-01

    As demands on Provider Networks continue to grow at exponential rates, providers are forced to evaluate how to continue to grow the network while increasing service velocity, enhancing resiliency while decreasing the total cost of ownership (TCO). The bandwidth growth that networks are experiencing is in the form packet based multimedia services such as video, video conferencing, gaming, etc... mixed with Over the Top (OTT) content providers such as Netflix, and the customer's expectations that best effort is not enough you end up with a situation that forces the provider to analyze how to gain more out of the network with less cost. In this paper we will discuss changes in the network that are driving us to a tighter integration between packet and optical layers and how to improve on today's multi - layer inefficiencies to drive down network TCO and provide for a fully integrated and dynamic network that will decrease time to revenue.

  19. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  20. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  1. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  2. From network structure to network reorganization: implications for adult neurogenesis

    International Nuclear Information System (INIS)

    Schneider-Mizell, Casey M; Zochowski, Michal R; Sander, Leonard M; Parent, Jack M; Ben-Jacob, Eshel

    2010-01-01

    Networks can be dynamical systems that undergo functional and structural reorganization. One example of such a process is adult hippocampal neurogenesis, in which new cells are continuously born and incorporate into the existing network of the dentate gyrus region of the hippocampus. Many of these introduced cells mature and become indistinguishable from established neurons, joining the existing network. Activity in the network environment is known to promote birth, survival and incorporation of new cells. However, after epileptogenic injury, changes to the connectivity structure around the neurogenic niche are known to correlate with aberrant neurogenesis. The possible role of network-level changes in the development of epilepsy is not well understood. In this paper, we use a computational model to investigate how the structural and functional outcomes of network reorganization, driven by addition of new cells during neurogenesis, depend on the original network structure. We find that there is a stable network topology that allows the network to incorporate new neurons in a manner that enhances activity of the persistently active region, but maintains global network properties. In networks having other connectivity structures, new cells can greatly alter the distribution of firing activity and destroy the initial activity patterns. We thus find that new cells are able to provide focused enhancement of network only for small-world networks with sufficient inhibition. Network-level deviations from this topology, such as those caused by epileptogenic injury, can set the network down a path that develops toward pathological dynamics and aberrant structural integration of new cells

  3. Correlated network of networks enhances robustness against catastrophic failures.

    Science.gov (United States)

    Min, Byungjoon; Zheng, Muhua

    2018-01-01

    Networks in nature rarely function in isolation but instead interact with one another with a form of a network of networks (NoN). A network of networks with interdependency between distinct networks contains instability of abrupt collapse related to the global rule of activation. As a remedy of the collapse instability, here we investigate a model of correlated NoN. We find that the collapse instability can be removed when hubs provide the majority of interconnections and interconnections are convergent between hubs. Thus, our study identifies a stable structure of correlated NoN against catastrophic failures. Our result further suggests a plausible way to enhance network robustness by manipulating connection patterns, along with other methods such as controlling the state of node based on a local rule.

  4. How to construct the statistic network? An association network of herbaceous

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2012-06-01

    Full Text Available In present study I defined a new type of network, the statistic network. The statistic network is a weighted and non-deterministic network. In the statistic network, a connection value, i.e., connection weight, represents connection strength and connection likelihood between two nodes and its absolute value falls in the interval (0,1]. The connection value is expressed as a statistical measure such as correlation coefficient, association coefficient, or Jaccard coefficient, etc. In addition, all connections of the statistic network can be statistically tested for their validity. A connection is true if the connection value is statistically significant. If all connection values of a node are not statistically significant, it is an isolated node. An isolated node has not any connection to other nodes in the statistic network. Positive and negative connection values denote distinct connectiontypes (positive or negative association or interaction. In the statistic network, two nodes with the greater connection value will show more similar trend in the change of their states. At any time we can obtain a sample network of the statistic network. A sample network is a non-weighted and deterministic network. Thestatistic network, in particular the plant association network that constructed from field sampling, is mostly an information network. Most of the interspecific relationships in plant community are competition and cooperation. Therefore in comparison to animal networks, the methodology of statistic network is moresuitable to construct plant association networks. Some conclusions were drawn from this study: (1 in the plant association network, most connections are weak and positive interactions. The association network constructed from Spearman rank correlation has most connections and isolated taxa are fewer. From net linear correlation,linear correlation, to Spearman rank correlation, the practical number of connections and connectance in the

  5. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  6. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  7. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  8. Network reconfiguration and neuronal plasticity in rhythm-generating networks.

    Science.gov (United States)

    Koch, Henner; Garcia, Alfredo J; Ramirez, Jan-Marino

    2011-12-01

    Neuronal networks are highly plastic and reconfigure in a state-dependent manner. The plasticity at the network level emerges through multiple intrinsic and synaptic membrane properties that imbue neurons and their interactions with numerous nonlinear properties. These properties are continuously regulated by neuromodulators and homeostatic mechanisms that are critical to maintain not only network stability and also adapt networks in a short- and long-term manner to changes in behavioral, developmental, metabolic, and environmental conditions. This review provides concrete examples from neuronal networks in invertebrates and vertebrates, and illustrates that the concepts and rules that govern neuronal networks and behaviors are universal.

  9. Psychology and social networks: a dynamic network theory perspective.

    Science.gov (United States)

    Westaby, James D; Pfaff, Danielle L; Redding, Nicholas

    2014-04-01

    Research on social networks has grown exponentially in recent years. However, despite its relevance, the field of psychology has been relatively slow to explain the underlying goal pursuit and resistance processes influencing social networks in the first place. In this vein, this article aims to demonstrate how a dynamic network theory perspective explains the way in which social networks influence these processes and related outcomes, such as goal achievement, performance, learning, and emotional contagion at the interpersonal level of analysis. The theory integrates goal pursuit, motivation, and conflict conceptualizations from psychology with social network concepts from sociology and organizational science to provide a taxonomy of social network role behaviors, such as goal striving, system supporting, goal preventing, system negating, and observing. This theoretical perspective provides psychologists with new tools to map social networks (e.g., dynamic network charts), which can help inform the development of change interventions. Implications for social, industrial-organizational, and counseling psychology as well as conflict resolution are discussed, and new opportunities for research are highlighted, such as those related to dynamic network intelligence (also known as cognitive accuracy), levels of analysis, methodological/ethical issues, and the need to theoretically broaden the study of social networking and social media behavior. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  10. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  11. Animal transportation networks

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-01-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. PMID:25165598

  12. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  13. Enhancing stewardship in Latin America and Caribbean small-scale fisheries : challenges and opportunities

    NARCIS (Netherlands)

    Gasalla, M.A.; de Castro, F.

    2016-01-01

    This thematic series, entitled “Enhancing Stewardship in Latin America and Caribbean Small-Scale Fisheries”, emerged as part of a joint effort to bridge Latin-American scholars interested in networking on small-scale fisheries in the region. Built on results presented at two meetings (‘Too Big to

  14. Reactive surfactants in heterophase polymerization

    NARCIS (Netherlands)

    Guyot, A.; Tauer, K.; Asua, J.M.; Es, van J.J.G.S.; Gauthier, C.; Hellgren, A.C.; Sherrington, D.C.; Montoya-Goni, A.; Sjöberg, M.; Sindt, O.; Vidal, F.F.M.; Unzue, M.; Schoonbrood, H.A.S.; Schipper, E.T.W.M.; Lacroix-Desmazes, P.

    1999-01-01

    This paper summarizes the work carried out during 3 years in a Network of the program "Human Capital and Mobility" of the European Union CHRX 93-0159 entitled "Reactive surfactants in heterophase polymerization for high performance polymers". A series of about 25 original papers will be published in

  15. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  16. Client satisfaction in a faith-based health network: findings from a survey in Uganda.

    Science.gov (United States)

    Shumba, Constance Sibongile; Kabali, Kenneth; Miyonga, Jonathan; Mugadu, Jairus; Lakidi, Luke; Kerchan, Patrick; Tumwesigye, Tonny

    2017-09-01

    Client satisfaction surveys are important in evaluating quality of the healthcare processes and contribute to health service improvements by assisting health program managers to develop appropriate strategies. The goal of this study was to assess clients' level of satisfaction with services provided by private-not-for-profit member health facilities affiliated to Uganda Protestant Medical Bureau. This was a cross-sectional descriptive study using an interviewer-administered questionnaire conducted in 254/278 (91%) of UPMB member health facilities between 27th April and 14th July 2014 among 927 clients. The tool measured ten dimensions of the care-seeking experience namely; health facility access; waiting time; health providers; support staff; rights; payments; facilities and environment; consent; confidentiality; and the overall care seeking experience. Logistic regression was utilised for multivariate analysis. Overall client satisfaction was found to be high within the UPMB network (84.2%). Most of the client satisfaction dimensions were rated above 70% except payments and rights. There was evidence of association with marital status; single/never married were 3.05 times more likely to be dissatisfied compared to widowed. Clients attending HCIII were less likely to be dissatisfied compared to those attending HCII (OR=0.51, 95% CI: 0.25-1.05). Post-secondary education (OR=1.79; 95% CI 1.01-3.17), being formally employed (OR=2.78, 95% CI: 0.91-8.48) or unemployed (OR=3.34, 95% CI: 1.00-11.17), attendance at a hospital (OR=2.15, 95% CI: 1.36- 3.41) were also associated with high dissatisfaction levels with payments. This study found a high level of satisfaction with services in the UPMB network but recorded low client satisfaction with the dimensions of rights and payments. Health workers should take time to explain rights and entitlement as well as charges levied to clients.

  17. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  18. From Offline Social Networks to Online Social Networks: Changes in Entrepreneurship

    Directory of Open Access Journals (Sweden)

    Yang SONG

    2015-01-01

    Full Text Available The paper reviewed studies of entrepreneurship based on the emergency of online social networks. Similar to offline social networks, entrepreneurs’ online social networks have their own unique characteristics. We first reviewed the offline network based research on entrepreneurship. Then we reviewed the studies of entrepreneurship in the context of online social networks including those focusing on topics of network structures and network ties. We highlighted online network communities based on the data collected from LinkedIn, Facebook and Twitter. Our research implies that both researcher and entrepreneurs are facing new opportunities due to the emergence of online social networks.

  19. Investigation of the network delay on Profibus-DP based network

    OpenAIRE

    Yılmaz, C.; Gürdal, O.; Sayan, H.H.

    2008-01-01

    The mathematical model of the network-induced delay control systems (NDCS) is given. Also the role of the NDCS’s components such as controller, sensor and network environment on the network-induced delay are included in the mathematical model of the system. The network delay is investigated on Profibus-DP based network application and experimental results obtained are presented graphically. The experimental results obtained show that the network induced delay is randomly changed according to ...

  20. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  1. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  2. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  3. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  4. Network Performance Improvement under Epidemic Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    In this paper we investigate epidemic failure spreading in large- scale GMPLS-controlled transport networks. By evaluating the effect of the epidemic failure spreading on the network, we design several strategies for cost-effective network performance improvement via differentiated repair times....... First we identify the most vulnerable and the most strategic nodes in the network. Then, via extensive simulations we show that strategic placement of resources for improved failure recovery has better performance than randomly assigning lower repair times among the network nodes. Our OPNET simulation...... model can be used during the network planning process for facilitating cost- effective network survivability design....

  5. Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks

    Directory of Open Access Journals (Sweden)

    Laisen Nie

    2018-01-01

    Full Text Available Wireless mesh network is prevalent for providing a decentralized access for users and other intelligent devices. Meanwhile, it can be employed as the infrastructure of the last few miles connectivity for various network applications, for example, Internet of Things (IoT and mobile networks. For a wireless mesh backbone network, it has obtained extensive attention because of its large capacity and low cost. Network traffic prediction is important for network planning and routing configurations that are implemented to improve the quality of service for users. This paper proposes a network traffic prediction method based on a deep learning architecture and the Spatiotemporal Compressive Sensing method. The proposed method first adopts discrete wavelet transform to extract the low-pass component of network traffic that describes the long-range dependence of itself. Then, a prediction model is built by learning a deep architecture based on the deep belief network from the extracted low-pass component. Otherwise, for the remaining high-pass component that expresses the gusty and irregular fluctuations of network traffic, the Spatiotemporal Compressive Sensing method is adopted to predict it. Based on the predictors of two components, we can obtain a predictor of network traffic. From the simulation, the proposed prediction method outperforms three existing methods.

  6. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    Science.gov (United States)

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.

  7. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm

    2017-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how such gender......Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how...... such gendering of entrepreneurs’ networks differ between societies and cultures. Research Design: Based on survey data from the Global Entrepreneurships Monitor, a sample of 16,365 entrepreneurs is used to compare the gendering of entrepreneurs’ networks in China, and five countries largely located around...... the Persian Gulf, namely Yemen, Iran, Saudi Arabia, Qatar and United Arab Emirates. Findings: Analyses show that female entrepreneurs tend to have slightly larger private sphere networks than male entrepreneurs. The differences between male and female entrepreneurs’ networking in the public sphere...

  8. Networks: structure and action : steering in and steering by policy networks

    NARCIS (Netherlands)

    Dassen, A.

    2010-01-01

    This thesis explores the opportunities to build a structural policy network model that is rooted in social network theories. By making a distinction between a process of steering in networks, and a process of steering by networks, it addresses the effects of network structures on network dynamics as

  9. Modelling dendritic ecological networks in space: An integrated network perspective

    Science.gov (United States)

    Erin E. Peterson; Jay M. Ver Hoef; Dan J. Isaak; Jeffrey A. Falke; Marie-Josee Fortin; Chris E. Jordan; Kristina McNyset; Pascal Monestiez; Aaron S. Ruesch; Aritra Sengupta; Nicholas Som; E. Ashley Steel; David M. Theobald; Christian E. Torgersen; Seth J. Wenger

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of...

  10. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network

    Directory of Open Access Journals (Sweden)

    Kim Hyun

    2011-12-01

    Full Text Available Abstract Background Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. Results We herein introduce a framework for network modularization and Bayesian network analysis (FMB to investigate organism’s metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. Conclusions After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  11. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network.

    Science.gov (United States)

    Kim, Hyun Uk; Kim, Tae Yong; Lee, Sang Yup

    2011-01-01

    Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. We herein introduce a framework for network modularization and Bayesian network analysis (FMB) to investigate organism's metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  12. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  13. A Network of Networks Perspective on Global Trade.

    Science.gov (United States)

    Maluck, Julian; Donner, Reik V

    2015-01-01

    Mutually intertwined supply chains in contemporary economy result in a complex network of trade relationships with a highly non-trivial topology that varies with time. In order to understand the complex interrelationships among different countries and economic sectors, as well as their dynamics, a holistic view on the underlying structural properties of this network is necessary. This study employs multi-regional input-output data to decompose 186 national economies into 26 industry sectors and utilizes the approach of interdependent networks to analyze the substructure of the resulting international trade network for the years 1990-2011. The partition of the network into national economies is observed to be compatible with the notion of communities in the sense of complex network theory. By studying internal versus cross-subgraph contributions to established complex network metrics, new insights into the architecture of global trade are obtained, which allow to identify key elements of global economy. Specifically, financial services and business activities dominate domestic trade whereas electrical and machinery industries dominate foreign trade. In order to further specify each national sector's role individually, (cross-)clustering coefficients and cross-betweenness are obtained for different pairs of subgraphs. The corresponding analysis reveals that specific industrial sectors tend to favor distinct directionality patterns and that the cross-clustering coefficient for geographically close country pairs is remarkably high, indicating that spatial factors are still of paramount importance for the organization of trade patterns in modern economy. Regarding the evolution of the trade network's substructure, globalization is well-expressed by trends of several structural characteristics (e.g., link density and node strength) in the interacting network framework. Extreme events, such as the financial crisis 2008/2009, are manifested as anomalies superimposed to

  14. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  15. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  16. Enabling software defined networking experiments in networked critical infrastructures

    Directory of Open Access Journals (Sweden)

    Béla Genge

    2014-05-01

    Full Text Available Nowadays, the fact that Networked Critical Infrastructures (NCI, e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques from the field of IP networks can bring significant advantages. In this paper we explore the interconnection of NCI communication infrastructures with Software Defined Networking (SDN-enabled network topologies. SDN provides the means to create virtual networking services and to implement global networking decisions. It relies on OpenFlow to enable communication with remote devices and has been recently categorized as the “Next Big Technology”, which will revolutionize the way decisions are implemented in switches and routers. Therefore, the paper documents the first steps towards enabling an SDN-NCI and presents the impact of a Denial of Service experiment over traffic resulting from an XBee sensor network which is routed across an emulated SDN network.

  17. Spatiotemporal Recurrent Convolutional Networks for Traffic Prediction in Transportation Networks

    Directory of Open Access Journals (Sweden)

    Haiyang Yu

    2017-06-01

    Full Text Available Predicting large-scale transportation network traffic has become an important and challenging topic in recent decades. Inspired by the domain knowledge of motion prediction, in which the future motion of an object can be predicted based on previous scenes, we propose a network grid representation method that can retain the fine-scale structure of a transportation network. Network-wide traffic speeds are converted into a series of static images and input into a novel deep architecture, namely, spatiotemporal recurrent convolutional networks (SRCNs, for traffic forecasting. The proposed SRCNs inherit the advantages of deep convolutional neural networks (DCNNs and long short-term memory (LSTM neural networks. The spatial dependencies of network-wide traffic can be captured by DCNNs, and the temporal dynamics can be learned by LSTMs. An experiment on a Beijing transportation network with 278 links demonstrates that SRCNs outperform other deep learning-based algorithms in both short-term and long-term traffic prediction.

  18. Spatiotemporal Recurrent Convolutional Networks for Traffic Prediction in Transportation Networks.

    Science.gov (United States)

    Yu, Haiyang; Wu, Zhihai; Wang, Shuqin; Wang, Yunpeng; Ma, Xiaolei

    2017-06-26

    Predicting large-scale transportation network traffic has become an important and challenging topic in recent decades. Inspired by the domain knowledge of motion prediction, in which the future motion of an object can be predicted based on previous scenes, we propose a network grid representation method that can retain the fine-scale structure of a transportation network. Network-wide traffic speeds are converted into a series of static images and input into a novel deep architecture, namely, spatiotemporal recurrent convolutional networks (SRCNs), for traffic forecasting. The proposed SRCNs inherit the advantages of deep convolutional neural networks (DCNNs) and long short-term memory (LSTM) neural networks. The spatial dependencies of network-wide traffic can be captured by DCNNs, and the temporal dynamics can be learned by LSTMs. An experiment on a Beijing transportation network with 278 links demonstrates that SRCNs outperform other deep learning-based algorithms in both short-term and long-term traffic prediction.

  19. Evaluation of Network Reliability for Computer Networks with Multiple Sources

    Directory of Open Access Journals (Sweden)

    Yi-Kuei Lin

    2012-01-01

    Full Text Available Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN. This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs. Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu to one sink (New York that goes through a submarine and land surface cable between Taiwan and the United States.

  20. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  1. Accelerating networks

    International Nuclear Information System (INIS)

    Smith, David M D; Onnela, Jukka-Pekka; Johnson, Neil F

    2007-01-01

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  2. Network traffic anomaly prediction using Artificial Neural Network

    Science.gov (United States)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  3. Phoebus: Network Middleware for Next-Generation Network Computing

    Energy Technology Data Exchange (ETDEWEB)

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  4. Identification of important nodes in directed biological networks: a network motif approach.

    Directory of Open Access Journals (Sweden)

    Pei Wang

    Full Text Available Identification of important nodes in complex networks has attracted an increasing attention over the last decade. Various measures have been proposed to characterize the importance of nodes in complex networks, such as the degree, betweenness and PageRank. Different measures consider different aspects of complex networks. Although there are numerous results reported on undirected complex networks, few results have been reported on directed biological networks. Based on network motifs and principal component analysis (PCA, this paper aims at introducing a new measure to characterize node importance in directed biological networks. Investigations on five real-world biological networks indicate that the proposed method can robustly identify actually important nodes in different networks, such as finding command interneurons, global regulators and non-hub but evolutionary conserved actually important nodes in biological networks. Receiver Operating Characteristic (ROC curves for the five networks indicate remarkable prediction accuracy of the proposed measure. The proposed index provides an alternative complex network metric. Potential implications of the related investigations include identifying network control and regulation targets, biological networks modeling and analysis, as well as networked medicine.

  5. Functional Module Analysis for Gene Coexpression Networks with Network Integration.

    Science.gov (United States)

    Zhang, Shuqin; Zhao, Hongyu; Ng, Michael K

    2015-01-01

    Network has been a general tool for studying the complex interactions between different genes, proteins, and other small molecules. Module as a fundamental property of many biological networks has been widely studied and many computational methods have been proposed to identify the modules in an individual network. However, in many cases, a single network is insufficient for module analysis due to the noise in the data or the tuning of parameters when building the biological network. The availability of a large amount of biological networks makes network integration study possible. By integrating such networks, more informative modules for some specific disease can be derived from the networks constructed from different tissues, and consistent factors for different diseases can be inferred. In this paper, we have developed an effective method for module identification from multiple networks under different conditions. The problem is formulated as an optimization model, which combines the module identification in each individual network and alignment of the modules from different networks together. An approximation algorithm based on eigenvector computation is proposed. Our method outperforms the existing methods, especially when the underlying modules in multiple networks are different in simulation studies. We also applied our method to two groups of gene coexpression networks for humans, which include one for three different cancers, and one for three tissues from the morbidly obese patients. We identified 13 modules with three complete subgraphs, and 11 modules with two complete subgraphs, respectively. The modules were validated through Gene Ontology enrichment and KEGG pathway enrichment analysis. We also showed that the main functions of most modules for the corresponding disease have been addressed by other researchers, which may provide the theoretical basis for further studying the modules experimentally.

  6. Network Analysis Tools: from biological networks to clusters and pathways.

    Science.gov (United States)

    Brohée, Sylvain; Faust, Karoline; Lima-Mendez, Gipsi; Vanderstocken, Gilles; van Helden, Jacques

    2008-01-01

    Network Analysis Tools (NeAT) is a suite of computer tools that integrate various algorithms for the analysis of biological networks: comparison between graphs, between clusters, or between graphs and clusters; network randomization; analysis of degree distribution; network-based clustering and path finding. The tools are interconnected to enable a stepwise analysis of the network through a complete analytical workflow. In this protocol, we present a typical case of utilization, where the tasks above are combined to decipher a protein-protein interaction network retrieved from the STRING database. The results returned by NeAT are typically subnetworks, networks enriched with additional information (i.e., clusters or paths) or tables displaying statistics. Typical networks comprising several thousands of nodes and arcs can be analyzed within a few minutes. The complete protocol can be read and executed in approximately 1 h.

  7. Energy-aware virtual network embedding in flexi-grid optical networks

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin

    2018-01-01

    Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.

  8. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  9. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    The present article examines the network structure and governance of inter-organisational innovation networks. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals with the overall...... structural relations between the actors in the network. These streams of research do contain references to each other but mostly rely on a static conception of the relationship between network structure and the applied network governance. The paper is based on a primarily qualitative case study of a loosely...... coupled Danish inter-organisational innovation network. The proposition is that a reciprocal relation between network governance and network structure can be identified....

  10. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  11. Network rewiring dynamics with convergence towards a star network.

    Science.gov (United States)

    Whigham, P A; Dick, G; Parry, M

    2016-10-01

    Network rewiring as a method for producing a range of structures was first introduced in 1998 by Watts & Strogatz ( Nature 393 , 440-442. (doi:10.1038/30918)). This approach allowed a transition from regular through small-world to a random network. The subsequent interest in scale-free networks motivated a number of methods for developing rewiring approaches that converged to scale-free networks. This paper presents a rewiring algorithm (RtoS) for undirected, non-degenerate, fixed size networks that transitions from regular, through small-world and scale-free to star-like networks. Applications of the approach to models for the spread of infectious disease and fixation time for a simple genetics model are used to demonstrate the efficacy and application of the approach.

  12. In-Network Adaptation of Video Streams Using Network Processors

    Directory of Open Access Journals (Sweden)

    Mohammad Shorfuzzaman

    2009-01-01

    problem can be addressed, near the network edge, by applying dynamic, in-network adaptation (e.g., transcoding of video streams to meet available connection bandwidth, machine characteristics, and client preferences. In this paper, we extrapolate from earlier work of Shorfuzzaman et al. 2006 in which we implemented and assessed an MPEG-1 transcoding system on the Intel IXP1200 network processor to consider the feasibility of in-network transcoding for other video formats and network processor architectures. The use of “on-the-fly” video adaptation near the edge of the network offers the promise of simpler support for a wide range of end devices with different display, and so forth, characteristics that can be used in different types of environments.

  13. Analysis of Semantic Networks using Complex Networks Concepts

    DEFF Research Database (Denmark)

    Ortiz-Arroyo, Daniel

    2013-01-01

    In this paper we perform a preliminary analysis of semantic networks to determine the most important terms that could be used to optimize a summarization task. In our experiments, we measure how the properties of a semantic network change, when the terms in the network are removed. Our preliminar...

  14. Network survivability performance

    Science.gov (United States)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  15. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  16. Network analysis literacy a practical approach to the analysis of networks

    CERN Document Server

    Zweig, Katharina A

    2014-01-01

    Network Analysis Literacy focuses on design principles for network analytics projects. The text enables readers to: pose a defined network analytic question; build a network to answer the question; choose or design the right network analytic methods for a particular purpose, and more.

  17. Network-Embedded Management and Applications Understanding Programmable Networking Infrastructure

    CERN Document Server

    Wolter, Ralf

    2013-01-01

    Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...

  18. 'Pizza, patients and points of view': Involving young people in the design of a post registration module entitled the adolescent with cancer.

    Science.gov (United States)

    Fallon, Sue; Smith, Joanna; Morgan, Sue; Stoner, Mandy; Austin, Catriona

    2008-03-01

    Health policy and education directives emphasise the need to involve service users and carers in healthcare, from service design and delivery to the education of healthcare professionals. This paper describes a pilot project aimed at eliciting teenagers and young people with cancer views in relation to the content of a continuing professional development module entitled 'adolescents with cancer'. Seven young people participated in the project. The project design was based on the PARTICIPATION - spice it up [Shephard, C., Treseder, P., 2002. spice it up! Dynamix, Swansea] framework, which aims to ensure effective and appropriate involvement of service users and carers. 'Post-it ideas storm' 'diamond ranking' and 'dot voting' were used to elicit the young people's views. The teenagers and young people could clearly articulate the qualities they felt nurses should have when caring for adolescents with cancer. They also identified topics they felt were important to include in the module, with an understanding of, and using, humour being given the highest priority. This was not originally included in the module timetable but as a direct result of consulting with the young people changes were made to reflect their views.

  19. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  20. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  1. Network function virtualization concepts and applicability in 5G networks

    CERN Document Server

    Zhang, Ying

    2018-01-01

    A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. Network Function Virtualization: Concepts and Applicability in 5G Networks reviews new technologies that enable NFV, such as Software Defined Networks (SDN), network virtualization, and cloud computing. It also provides an in-depth investigation of the most advanced open source initiatives in this area, including OPNFV, Openstack, and Opendaylight. Finally, this book goes beyond li...

  2. A Squeezed Artificial Neural Network for the Symbolic Network Reliability Functions of Binary-State Networks.

    Science.gov (United States)

    Yeh, Wei-Chang

    Network reliability is an important index to the provision of useful information for decision support in the modern world. There is always a need to calculate symbolic network reliability functions (SNRFs) due to dynamic and rapid changes in network parameters. In this brief, the proposed squeezed artificial neural network (SqANN) approach uses the Monte Carlo simulation to estimate the corresponding reliability of a given designed matrix from the Box-Behnken design, and then the Taguchi method is implemented to find the appropriate number of neurons and activation functions of the hidden layer and the output layer in ANN to evaluate SNRFs. According to the experimental results of the benchmark networks, the comparison appears to support the superiority of the proposed SqANN method over the traditional ANN-based approach with at least 16.6% improvement in the median absolute deviation in the cost of extra 2 s on average for all experiments.Network reliability is an important index to the provision of useful information for decision support in the modern world. There is always a need to calculate symbolic network reliability functions (SNRFs) due to dynamic and rapid changes in network parameters. In this brief, the proposed squeezed artificial neural network (SqANN) approach uses the Monte Carlo simulation to estimate the corresponding reliability of a given designed matrix from the Box-Behnken design, and then the Taguchi method is implemented to find the appropriate number of neurons and activation functions of the hidden layer and the output layer in ANN to evaluate SNRFs. According to the experimental results of the benchmark networks, the comparison appears to support the superiority of the proposed SqANN method over the traditional ANN-based approach with at least 16.6% improvement in the median absolute deviation in the cost of extra 2 s on average for all experiments.

  3. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  4. Computer network time synchronization the network time protocol

    CERN Document Server

    Mills, David L

    2006-01-01

    What started with the sundial has, thus far, been refined to a level of precision based on atomic resonance: Time. Our obsession with time is evident in this continued scaling down to nanosecond resolution and beyond. But this obsession is not without warrant. Precision and time synchronization are critical in many applications, such as air traffic control and stock trading, and pose complex and important challenges in modern information networks.Penned by David L. Mills, the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol

  5. Resilience of networks formed of interdependent modular networks

    Science.gov (United States)

    Shekhtman, Louis M.; Shai, Saray; Havlin, Shlomo

    2015-12-01

    Many infrastructure networks have a modular structure and are also interdependent with other infrastructures. While significant research has explored the resilience of interdependent networks, there has been no analysis of the effects of modularity. Here we develop a theoretical framework for attacks on interdependent modular networks and support our results through simulations. We focus, for simplicity, on the case where each network has the same number of communities and the dependency links are restricted to be between pairs of communities of different networks. This is particularly realistic for modeling infrastructure across cities. Each city has its own infrastructures and different infrastructures are dependent only within the city. However, each infrastructure is connected within and between cities. For example, a power grid will connect many cities as will a communication network, yet a power station and communication tower that are interdependent will likely be in the same city. It has previously been shown that single networks are very susceptible to the failure of the interconnected nodes (between communities) (Shai et al 2014 arXiv:1404.4748) and that attacks on these nodes are even more crippling than attacks based on betweenness (da Cunha et al 2015 arXiv:1502.00353). In our example of cities these nodes have long range links which are more likely to fail. For both treelike and looplike interdependent modular networks we find distinct regimes depending on the number of modules, m. (i) In the case where there are fewer modules with strong intraconnections, the system first separates into modules in an abrupt first-order transition and then each module undergoes a second percolation transition. (ii) When there are more modules with many interconnections between them, the system undergoes a single transition. Overall, we find that modular structure can significantly influence the type of transitions observed in interdependent networks and should be

  6. A Network of Networks Perspective on Global Trade

    Science.gov (United States)

    Maluck, Julian; Donner, Reik V.

    2015-01-01

    Mutually intertwined supply chains in contemporary economy result in a complex network of trade relationships with a highly non-trivial topology that varies with time. In order to understand the complex interrelationships among different countries and economic sectors, as well as their dynamics, a holistic view on the underlying structural properties of this network is necessary. This study employs multi-regional input-output data to decompose 186 national economies into 26 industry sectors and utilizes the approach of interdependent networks to analyze the substructure of the resulting international trade network for the years 1990–2011. The partition of the network into national economies is observed to be compatible with the notion of communities in the sense of complex network theory. By studying internal versus cross-subgraph contributions to established complex network metrics, new insights into the architecture of global trade are obtained, which allow to identify key elements of global economy. Specifically, financial services and business activities dominate domestic trade whereas electrical and machinery industries dominate foreign trade. In order to further specify each national sector’s role individually, (cross-)clustering coefficients and cross-betweenness are obtained for different pairs of subgraphs. The corresponding analysis reveals that specific industrial sectors tend to favor distinct directionality patterns and that the cross-clustering coefficient for geographically close country pairs is remarkably high, indicating that spatial factors are still of paramount importance for the organization of trade patterns in modern economy. Regarding the evolution of the trade network’s substructure, globalization is well-expressed by trends of several structural characteristics (e.g., link density and node strength) in the interacting network framework. Extreme events, such as the financial crisis 2008/2009, are manifested as anomalies superimposed

  7. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  8. SCM: A method to improve network service layout efficiency with network evolution

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of “software defined network + network function virtualization” (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently. PMID:29267299

  9. SCM: A method to improve network service layout efficiency with network evolution.

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of "software defined network + network function virtualization" (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently.

  10. Allocating resources between network nodes for providing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a

  11. Multilayer Brain Networks

    Science.gov (United States)

    Vaiana, Michael; Muldoon, Sarah Feldt

    2018-01-01

    The field of neuroscience is facing an unprecedented expanse in the volume and diversity of available data. Traditionally, network models have provided key insights into the structure and function of the brain. With the advent of big data in neuroscience, both more sophisticated models capable of characterizing the increasing complexity of the data and novel methods of quantitative analysis are needed. Recently, multilayer networks, a mathematical extension of traditional networks, have gained increasing popularity in neuroscience due to their ability to capture the full information of multi-model, multi-scale, spatiotemporal data sets. Here, we review multilayer networks and their applications in neuroscience, showing how incorporating the multilayer framework into network neuroscience analysis has uncovered previously hidden features of brain networks. We specifically highlight the use of multilayer networks to model disease, structure-function relationships, network evolution, and link multi-scale data. Finally, we close with a discussion of promising new directions of multilayer network neuroscience research and propose a modified definition of multilayer networks designed to unite and clarify the use of the multilayer formalism in describing real-world systems.

  12. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2015-05-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other\\'s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network\\'s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network\\'s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. © 2015 IEEE.

  13. Optical network control plane for multi-domain networking

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva

    This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic...... process are not enough for efficient TE in mesh multi-domain networks. Enhancing the protocol with multi-path dissemination capability, combined with the employment of an end-to-end TE metric proves to be a highly efficient solution. Simulation results show good performance characteristics of the proposed...... is not as essential for improved network performance as the length of the provided paths. Second, the issue of multi-domain survivability support is analyzed. An AS-disjoint paths is beneficial not only for resilience support, but also for facilitating adequate network reactions to changes in the network, which...

  14. Resilience of networks to environmental stress: From regular to random networks

    Science.gov (United States)

    Eom, Young-Ho

    2018-04-01

    Despite the huge interest in network resilience to stress, most of the studies have concentrated on internal stress damaging network structure (e.g., node removals). Here we study how networks respond to environmental stress deteriorating their external conditions. We show that, when regular networks gradually disintegrate as environmental stress increases, disordered networks can suddenly collapse at critical stress with hysteresis and vulnerability to perturbations. We demonstrate that this difference results from a trade-off between node resilience and network resilience to environmental stress. The nodes in the disordered networks can suppress their collapses due to the small-world topology of the networks but eventually collapse all together in return. Our findings indicate that some real networks can be highly resilient against environmental stress to a threshold yet extremely vulnerable to the stress above the threshold because of their small-world topology.

  15. Introductory note on Emergent Unconscious Knowledge Networks (Asygnodic Networks

    Directory of Open Access Journals (Sweden)

    Henry Bakis

    2016-05-01

    Full Text Available This note introduces the following paper on the concept of Emergent Unconscious Knowledge Networks (Asygnodic Networks created by E. Roche and M. Blaine. The concept of asyngnosis explains a large number of diverse phenomena involving organizations, groups and decision making. It will present the genesis and definition of Asygnodic Networks and will focus on how they raise challenges to traditional theories of decision making and emerging social networks.

  16. Maximization Network Throughput Based on Improved Genetic Algorithm and Network Coding for Optical Multicast Networks

    Science.gov (United States)

    Wei, Chengying; Xiong, Cuilian; Liu, Huanlin

    2017-12-01

    Maximal multicast stream algorithm based on network coding (NC) can improve the network's throughput for wavelength-division multiplexing (WDM) networks, which however is far less than the network's maximal throughput in terms of theory. And the existing multicast stream algorithms do not give the information distribution pattern and routing in the meantime. In the paper, an improved genetic algorithm is brought forward to maximize the optical multicast throughput by NC and to determine the multicast stream distribution by hybrid chromosomes construction for multicast with single source and multiple destinations. The proposed hybrid chromosomes are constructed by the binary chromosomes and integer chromosomes, while the binary chromosomes represent optical multicast routing and the integer chromosomes indicate the multicast stream distribution. A fitness function is designed to guarantee that each destination can receive the maximum number of decoding multicast streams. The simulation results showed that the proposed method is far superior over the typical maximal multicast stream algorithms based on NC in terms of network throughput in WDM networks.

  17. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  18. Managerial Challenges Within Networks - Emphasizing the Paradox of Network Participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    2003-01-01

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... and thereby sort out the paradox of network participation. Trust and information are mechanisms employed to absorb uncertainty. The relationship between trust and the requirement for information depends on the maturity of the relationship. When trust becomes too important as uncertainty absorption mechanism...

  19. Managerial challenges within networks: emphasizing the paradox of network participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... and thereby sort out the paradox of network participation. Trust and information are mechanisms employed to absorb uncertainty. The relationship between trust and the requirement for information depends on the maturity of the relationship. When trust becomes too important as uncertainty absorption mechanism...

  20. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  1. Temporal network epidemiology

    CERN Document Server

    Holme, Petter

    2017-01-01

    This book covers recent developments in epidemic process models and related data on temporally varying networks. It is widely recognized that contact networks are indispensable for describing, understanding, and intervening to stop the spread of infectious diseases in human and animal populations; “network epidemiology” is an umbrella term to describe this research field. More recently, contact networks have been recognized as being highly dynamic. This observation, also supported by an increasing amount of new data, has led to research on temporal networks, a rapidly growing area. Changes in network structure are often informed by epidemic (or other) dynamics, in which case they are referred to as adaptive networks. This volume gathers contributions by prominent authors working in temporal and adaptive network epidemiology, a field essential to understanding infectious diseases in real society.

  2. Collaborative multi-layer network coding for cellular cognitive radio networks

    KAUST Repository

    Sorour, Sameh

    2013-06-01

    In this paper, we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in underlay cellular cognitive radio networks. This scheme allows the collocated primary and cognitive radio base-stations to collaborate with each other, in order to minimize their own and each other\\'s packet recovery overheads, and thus improve their throughput, without any coordination between them. This non-coordinated collaboration is done using a novel multi-layer instantly decodable network coding scheme, which guarantees that each network\\'s help to the other network does not result in any degradation in its own performance. It also does not cause any violation to the primary networks interference thresholds in the same and adjacent cells. Yet, our proposed scheme both guarantees the reduction of the recovery overhead in collocated primary and cognitive radio networks, and allows early recovery of their packets compared to non-collaborative schemes. Simulation results show that a recovery overhead reduction of 15% and 40% can be achieved by our proposed scheme in the primary and cognitive radio networks, respectively, compared to the corresponding non-collaborative scheme. © 2013 IEEE.

  3. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  4. Morphological neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, G.X.; Sussner, P. [Univ. of Florida, Gainesville, FL (United States)

    1996-12-31

    The theory of artificial neural networks has been successfully applied to a wide variety of pattern recognition problems. In this theory, the first step in computing the next state of a neuron or in performing the next layer neural network computation involves the linear operation of multiplying neural values by their synaptic strengths and adding the results. Thresholding usually follows the linear operation in order to provide for nonlinearity of the network. In this paper we introduce a novel class of neural networks, called morphological neural networks, in which the operations of multiplication and addition are replaced by addition and maximum (or minimum), respectively. By taking the maximum (or minimum) of sums instead of the sum of products, morphological network computation is nonlinear before thresholding. As a consequence, the properties of morphological neural networks are drastically different than those of traditional neural network models. In this paper we consider some of these differences and provide some particular examples of morphological neural network.

  5. Directed network modules

    International Nuclear Information System (INIS)

    Palla, Gergely; Farkas, Illes J; Pollner, Peter; Derenyi, Imre; Vicsek, Tamas

    2007-01-01

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs

  6. Network connectivity value.

    Science.gov (United States)

    Dragicevic, Arnaud; Boulanger, Vincent; Bruciamacchie, Max; Chauchard, Sandrine; Dupouey, Jean-Luc; Stenger, Anne

    2017-04-21

    In order to unveil the value of network connectivity, we formalize the construction of ecological networks in forest environments as an optimal control dynamic graph-theoretic problem. The network is based on a set of bioreserves and patches linked by ecological corridors. The node dynamics, built upon the consensus protocol, form a time evolutive Mahalanobis distance weighted by the opportunity costs of timber production. We consider a case of complete graph, where the ecological network is fully connected, and a case of incomplete graph, where the ecological network is partially connected. The results show that the network equilibrium depends on the size of the reception zone, while the network connectivity depends on the environmental compatibility between the ecological areas. Through shadow prices, we find that securing connectivity in partially connected networks is more expensive than in fully connected networks, but should be undertaken when the opportunity costs are significant. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  8. A COMPARATIVE STUDY OF SYSTEM NETWORK ARCHITECTURE Vs DIGITAL NETWORK ARCHITECTURE

    OpenAIRE

    Seema; Mukesh Arya

    2011-01-01

    The efficient managing system of sources is mandatory for the successful running of any network. Here this paper describes the most popular network architectures one of developed by IBM, System Network Architecture (SNA) and other is Digital Network Architecture (DNA). As we know that the network standards and protocols are needed for the network developers as well as users. Some standards are The IEEE 802.3 standards (The Institute of Electrical and Electronics Engineers 1980) (LAN), IBM Sta...

  9. A research on the application of software defined networking in satellite network architecture

    Science.gov (United States)

    Song, Huan; Chen, Jinqiang; Cao, Suzhi; Cui, Dandan; Li, Tong; Su, Yuxing

    2017-10-01

    Software defined network is a new type of network architecture, which decouples control plane and data plane of traditional network, has the feature of flexible configurations and is a direction of the next generation terrestrial Internet development. Satellite network is an important part of the space-ground integrated information network, while the traditional satellite network has the disadvantages of difficult network topology maintenance and slow configuration. The application of SDN technology in satellite network can solve these problems that traditional satellite network faces. At present, the research on the application of SDN technology in satellite network is still in the stage of preliminary study. In this paper, we start with introducing the SDN technology and satellite network architecture. Then we mainly introduce software defined satellite network architecture, as well as the comparison of different software defined satellite network architecture and satellite network virtualization. Finally, the present research status and development trend of SDN technology in satellite network are analyzed.

  10. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  11. CUFID-query: accurate network querying through random walk based network flow estimation.

    Science.gov (United States)

    Jeong, Hyundoo; Qian, Xiaoning; Yoon, Byung-Jun

    2017-12-28

    Functional modules in biological networks consist of numerous biomolecules and their complicated interactions. Recent studies have shown that biomolecules in a functional module tend to have similar interaction patterns and that such modules are often conserved across biological networks of different species. As a result, such conserved functional modules can be identified through comparative analysis of biological networks. In this work, we propose a novel network querying algorithm based on the CUFID (Comparative network analysis Using the steady-state network Flow to IDentify orthologous proteins) framework combined with an efficient seed-and-extension approach. The proposed algorithm, CUFID-query, can accurately detect conserved functional modules as small subnetworks in the target network that are expected to perform similar functions to the given query functional module. The CUFID framework was recently developed for probabilistic pairwise global comparison of biological networks, and it has been applied to pairwise global network alignment, where the framework was shown to yield accurate network alignment results. In the proposed CUFID-query algorithm, we adopt the CUFID framework and extend it for local network alignment, specifically to solve network querying problems. First, in the seed selection phase, the proposed method utilizes the CUFID framework to compare the query and the target networks and to predict the probabilistic node-to-node correspondence between the networks. Next, the algorithm selects and greedily extends the seed in the target network by iteratively adding nodes that have frequent interactions with other nodes in the seed network, in a way that the conductance of the extended network is maximally reduced. Finally, CUFID-query removes irrelevant nodes from the querying results based on the personalized PageRank vector for the induced network that includes the fully extended network and its neighboring nodes. Through extensive

  12. A random network based, node attraction facilitated network evolution method

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-03-01

    Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.

  13. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  14. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described......Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  15. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  16. Allocating resources between network nodes for providing a network node function

    OpenAIRE

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a server (e.g. application server, a proxy server, cloud location, router). Examples of the second network node are an application server, a cloud location or a router. The available resources may b...

  17. Tinnitus: Network pathophysiology-network pharmacology

    Directory of Open Access Journals (Sweden)

    Ana Belen eElgoyhen

    2012-01-01

    Full Text Available Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for 1 in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single FDA-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in central nervous system pathologies is changing from that of magic bullets that target individual chemoreceptors or disease-causing genes into that of magic shotguns, promiscuous or dirty drugs that target disease-causing networks, also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  18. Tinnitus: network pathophysiology-network pharmacology.

    Science.gov (United States)

    Elgoyhen, Ana B; Langguth, Berthold; Vanneste, Sven; De Ridder, Dirk

    2012-01-01

    Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for one in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single Food and Drug Administration (FDA)-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system (CNS) disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in CNS pathologies is changing from that of "magic bullets" that target individual chemoreceptors or "disease-causing genes" into that of "magic shotguns," "promiscuous" or "dirty drugs" that target "disease-causing networks," also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  19. Cisco networking essentials

    CERN Document Server

    McMillan, Troy

    2015-01-01

    Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and c

  20. Gender Inequitable Masculinity and Sexual Entitlement in Rape Perpetration South Africa: Findings of a Cross-Sectional Study

    Science.gov (United States)

    Jewkes, Rachel; Sikweyiya, Yandisa; Morrell, Robert; Dunkle, Kristin

    2011-01-01

    Objective To describe the prevalence and patterns of rape perpetration in a randomly selected sample of men from the general adult population, to explore factors associated with rape and to describe how men explained their acts of rape. Design Cross-sectional household study with a two- stage randomly selected sample of men. Methods 1737 South African men aged 18–49 completed a questionnaire administered using an Audio-enhanced Personal Digital Assistant. Multivariable logistic regression models were built to identify factors associated with rape perpetration. Results In all 27.6% (466/1686) of men had raped a woman, whether an intimate partner, stranger or acquaintance, and whether perpetrated alone or with accomplices, and 4.7% had raped in the last 12 months. First rapes for 75% were perpetrated before age 20, and 53.9% (251) of those raping, did so on multiple occasions. The logistic regression model showed that having raped was associated with greater adversity in childhood, having been raped by a man and higher maternal education. It was associated with less equitable views on gender relations, having had more partners, and many more gender inequitable practices including transactional sex and physical partner violence. Also drug use, gang membership and a higher score on the dimensions of psychopathic personality, namely blame externalisation and Machiavellian egocentricity. Asked about why they did it, the most common motivations stemmed from ideas of sexual entitlement. Conclusions Perpetration of rape is so prevalent that population-based measures of prevention are essential to complement criminal justice system responses. Our findings show the importance of measures to build gender equity and change dominant ideas of masculinity and gender relations as part of rape prevention. Reducing men's exposure to trauma in childhood is also critically important. PMID:22216324

  1. Adverse Outcome Pathway Networks II: Network Analytics.

    Science.gov (United States)

    Villeneuve, Daniel L; Angrish, Michelle M; Fortin, Marie C; Katsiadaki, Ioanna; Leonard, Marc; Margiotta-Casaluci, Luigi; Munn, Sharon; O'Brien, Jason M; Pollesch, Nathan L; Smith, L Cody; Zhang, Xiaowei; Knapen, Dries

    2018-02-28

    Toxicological responses to stressors are more complex than the simple one biological perturbation to one adverse outcome model portrayed by individual adverse outcome pathways (AOPs). Consequently, the AOP framework was designed to facilitate de facto development of AOP networks that can aid understanding and prediction of pleiotropic and interactive effects more common to environmentally realistic, complex exposure scenarios. The present paper introduces nascent concepts related to the qualitative analysis of AOP networks. First, graph theory-based approaches for identifying important topological features are illustrated using two example AOP networks derived from existing AOP descriptions. Second, considerations for identifying the most significant path(s) through an AOP network from either a biological or risk assessment perspective are described. Finally, approaches for identifying interactions among AOPs that may result in additive, synergistic, or antagonistic responses, or previously undefined emergent patterns of response, are introduced. Along with a companion article (Knapen et al. part I), these concepts set the stage for development of tools and case studies that will facilitate more rigorous analysis of AOP networks, and the utility of AOP network-based predictions, for use in research and regulatory decision-making. Collectively, this work addresses one of the major themes identified through a SETAC Horizon Scanning effort focused on advancing the AOP framework. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  2. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  3. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  4. Research on Evolutionary Mechanism of Agile Supply Chain Network via Complex Network Theory

    Directory of Open Access Journals (Sweden)

    Nai-Ru Xu

    2016-01-01

    Full Text Available The paper establishes the evolutionary mechanism model of agile supply chain network by means of complex network theory which can be used to describe the growth process of the agile supply chain network and analyze the complexity of the agile supply chain network. After introducing the process and the suitability of taking complex network theory into supply chain network research, the paper applies complex network theory into the agile supply chain network research, analyzes the complexity of agile supply chain network, presents the evolutionary mechanism of agile supply chain network based on complex network theory, and uses Matlab to simulate degree distribution, average path length, clustering coefficient, and node betweenness. Simulation results show that the evolution result displays the scale-free property. It lays the foundations of further research on agile supply chain network based on complex network theory.

  5. Seeded Bayesian Networks: Constructing genetic networks from microarray data

    Directory of Open Access Journals (Sweden)

    Quackenbush John

    2008-07-01

    Full Text Available Abstract Background DNA microarrays and other genomics-inspired technologies provide large datasets that often include hidden patterns of correlation between genes reflecting the complex processes that underlie cellular metabolism and physiology. The challenge in analyzing large-scale expression data has been to extract biologically meaningful inferences regarding these processes – often represented as networks – in an environment where the datasets are often imperfect and biological noise can obscure the actual signal. Although many techniques have been developed in an attempt to address these issues, to date their ability to extract meaningful and predictive network relationships has been limited. Here we describe a method that draws on prior information about gene-gene interactions to infer biologically relevant pathways from microarray data. Our approach consists of using preliminary networks derived from the literature and/or protein-protein interaction data as seeds for a Bayesian network analysis of microarray results. Results Through a bootstrap analysis of gene expression data derived from a number of leukemia studies, we demonstrate that seeded Bayesian Networks have the ability to identify high-confidence gene-gene interactions which can then be validated by comparison to other sources of pathway data. Conclusion The use of network seeds greatly improves the ability of Bayesian Network analysis to learn gene interaction networks from gene expression data. We demonstrate that the use of seeds derived from the biomedical literature or high-throughput protein-protein interaction data, or the combination, provides improvement over a standard Bayesian Network analysis, allowing networks involving dynamic processes to be deduced from the static snapshots of biological systems that represent the most common source of microarray data. Software implementing these methods has been included in the widely used TM4 microarray analysis package.

  6. Hierarchical thinking in network biology: the unbiased modularization of biochemical networks.

    Science.gov (United States)

    Papin, Jason A; Reed, Jennifer L; Palsson, Bernhard O

    2004-12-01

    As reconstructed biochemical reaction networks continue to grow in size and scope, there is a growing need to describe the functional modules within them. Such modules facilitate the study of biological processes by deconstructing complex biological networks into conceptually simple entities. The definition of network modules is often based on intuitive reasoning. As an alternative, methods are being developed for defining biochemical network modules in an unbiased fashion. These unbiased network modules are mathematically derived from the structure of the whole network under consideration.

  7. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  8. Understanding resilience in industrial symbiosis networks: insights from network analysis.

    Science.gov (United States)

    Chopra, Shauhrat S; Khanna, Vikas

    2014-08-01

    Industrial symbiotic networks are based on the principles of ecological systems where waste equals food, to develop synergistic networks. For example, industrial symbiosis (IS) at Kalundborg, Denmark, creates an exchange network of waste, water, and energy among companies based on contractual dependency. Since most of the industrial symbiotic networks are based on ad-hoc opportunities rather than strategic planning, gaining insight into disruptive scenarios is pivotal for understanding the balance of resilience and sustainability and developing heuristics for designing resilient IS networks. The present work focuses on understanding resilience as an emergent property of an IS network via a network-based approach with application to the Kalundborg Industrial Symbiosis (KIS). Results from network metrics and simulated disruptive scenarios reveal Asnaes power plant as the most critical node in the system. We also observe a decrease in the vulnerability of nodes and reduction in single points of failure in the system, suggesting an increase in the overall resilience of the KIS system from 1960 to 2010. Based on our findings, we recommend design strategies, such as increasing diversity, redundancy, and multi-functionality to ensure flexibility and plasticity, to develop resilient and sustainable industrial symbiotic networks. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Network Experiences Lead to the Adaption of a Firm’s Network Competence

    Directory of Open Access Journals (Sweden)

    Bianka Kühne

    2011-12-01

    Full Text Available Networks become increasingly important as external sources of innovation for firms. Through networks firms get incontact with different actors with whom they can exchange information and collaborate. A firm’s ability to be asuccessful network actor depends on its network competence. This term can be defined as having the necessaryknowledge, skills and qualifications for networking as well as using them effectively. In this paper we investigate thelink between a firm’s network competence and the benefits resulting from it in a two‐way direction. First, thenetwork competence of the firm facilitates the adoption of information from other network actors which may leadto innovation success. Second the perceived network benefits shall in their turn influence the network competenceof the firm. Consequently, firms will adapt their network strategy corresponding their experiences. The objective ofthis paper is to investigate the dynamics of networking and its influence on the firm’s network competence. For thisexploratory research 3 Belgian networks are examined. In‐depth interviews are used in combination with semistructuredinterview guides to conduct the research. Our results indicate that some firms perceive benefits fromtheir network efforts, for others it is more a burden. Furthermore, in some of our cases we found that positiveexperiences with clear benefits motivate the firm to enhance its network competence. This is illustrated by the factthat collaborations are more frequently initiated, trust is more easily build, firms are more open to communicateinformation and the confidentiality threshold is overcome.

  10. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago V. V.; Giannitsarou, Chryssi; Johnson, Charles R.

    2016-01-01

    This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s00199-016-0992-1 We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and d...

  11. Ecological network analysis for a virtual water network.

    Science.gov (United States)

    Fang, Delin; Chen, Bin

    2015-06-02

    The notions of virtual water flows provide important indicators to manifest the water consumption and allocation between different sectors via product transactions. However, the configuration of virtual water network (VWN) still needs further investigation to identify the water interdependency among different sectors as well as the network efficiency and stability in a socio-economic system. Ecological network analysis is chosen as a useful tool to examine the structure and function of VWN and the interactions among its sectors. A balance analysis of efficiency and redundancy is also conducted to describe the robustness (RVWN) of VWN. Then, network control analysis and network utility analysis are performed to investigate the dominant sectors and pathways for virtual water circulation and the mutual relationships between pairwise sectors. A case study of the Heihe River Basin in China shows that the balance between efficiency and redundancy is situated on the left side of the robustness curve with less efficiency and higher redundancy. The forestation, herding and fishing sectors and industrial sectors are found to be the main controllers. The network tends to be more mutualistic and synergic, though some competitive relationships that weaken the virtual water circulation still exist.

  12. Network motif frequency vectors reveal evolving metabolic network organisation.

    Science.gov (United States)

    Pearcy, Nicole; Crofts, Jonathan J; Chuzhanova, Nadia

    2015-01-01

    At the systems level many organisms of interest may be described by their patterns of interaction, and as such, are perhaps best characterised via network or graph models. Metabolic networks, in particular, are fundamental to the proper functioning of many important biological processes, and thus, have been widely studied over the past decade or so. Such investigations have revealed a number of shared topological features, such as a short characteristic path-length, large clustering coefficient and hierarchical modular structure. However, the extent to which evolutionary and functional properties of metabolism manifest via this underlying network architecture remains unclear. In this paper, we employ a novel graph embedding technique, based upon low-order network motifs, to compare metabolic network structure for 383 bacterial species categorised according to a number of biological features. In particular, we introduce a new global significance score which enables us to quantify important evolutionary relationships that exist between organisms and their physical environments. Using this new approach, we demonstrate a number of significant correlations between environmental factors, such as growth conditions and habitat variability, and network motif structure, providing evidence that organism adaptability leads to increased complexities in the resultant metabolic networks.

  13. Logistical networking: a global storage network

    International Nuclear Information System (INIS)

    Beck, Micah; Moore, Terry

    2005-01-01

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it

  14. Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation

    Science.gov (United States)

    2015-06-01

    virtualized environment. First, we automatically build topological ground truth according to various network generation models and create emulated Cisco ...to various network generation models and create emulated Cisco router networks by leveraging and modifying existing emulation software. We then au... markets , to verifying compliance with policy, as in recent “network neutrality” rules established in the United States. The Internet is a network of

  15. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  16. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  17. Security-Enhanced Autonomous Network Management for Space Networking, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  18. WDM Core Networks : regenerator placement and green networking

    OpenAIRE

    Youssef , Mayssa

    2011-01-01

    As Operators strive today to optimize their networks, considerations of cost, availability, eco-sustainability, and quality of service are beginning to converge. Solutions that reduce capital and operational expenditures not only save money, but also tend to reduce the environmental impact. In "opaque" networks, optical signals undergo expensive electrical regeneration systematically at each node. In "transparent" networks, signal quality deteriorates due to the accumulation of physical impai...

  19. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  20. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  1. Enhancing Sensor Network Data Quality via Collaborated Circuit and Network Operations

    Directory of Open Access Journals (Sweden)

    Lucas Vespa

    2013-04-01

    Full Text Available In many applications, the quality of data gathered by sensor networks is directly related to the signal-to-noise ratio (SNR of the sensor data being transmitted in the networks. Different from the SNR that is often used in measuring the quality of communication links, the SNR used in this work measures how accurately the data in the network packets represent the physical parameters being sensed. Hence, the signal here refers to the physical parameters that are being monitored by sensor networks; the noise is due to environmental interference and circuit noises at sensor nodes, and packet loss during network transmission. While issues affecting SNR at sensor nodes have been intensively investigated, the impact of network packet loss on data SNR has not attracted significant attention in sensor network design. This paper investigates the impact of packet loss on sensor network data SNR and shows that data SNR is dramatically affected by network packet loss. A data quality metric, based on data SNR, is developed and a cross-layer adaptive scheme is presented to minimize data quality degradation in congested sensor networks. The proposed scheme consists of adaptive downsampling and bit truncation at sensor nodes and intelligent traffic management techniques at the network level. Simulation results are presented to demonstrate the validity and effectiveness of the proposed techniques.

  2. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  3. Properties of healthcare teaming networks as a function of network construction algorithms.

    Directory of Open Access Journals (Sweden)

    Martin S Zand

    Full Text Available Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year, making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast

  4. Final Progress Report for Project Entitled: Quantum Dot Tracers for Use in Engineered Geothermal Systems

    Energy Technology Data Exchange (ETDEWEB)

    Rose, Peter [Univ. of Utah, Salt Lake City, UT (United States); Bartl, Michael [Univ. of Utah, Salt Lake City, UT (United States); Reimus, Paul [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Williams, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mella, Mike [Univ. of Utah, Salt Lake City, UT (United States)

    2015-09-12

    The objective of this project was to develop and demonstrate a new class of tracers that offer great promise for use in characterizing fracture networks in EGS reservoirs. From laboratory synthesis and testing through numerical modeling and field demonstrations, we have demonstrated the amazing versatility and applicability of quantum dot tracers. This report summarizes the results of four years of research into the design, synthesis, and characterization of semiconductor nanocrystals (quantum dots) for use as geothermal tracers.

  5. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    2011-01-01

    In the present article, we examine the network structure and governance of inter-organisational innovation networks over time. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals...

  6. Correlations in star networks: from Bell inequalities to network inequalities

    International Nuclear Information System (INIS)

    Tavakoli, Armin; Renou, Marc Olivier; Gisin, Nicolas; Brunner, Nicolas

    2017-01-01

    The problem of characterizing classical and quantum correlations in networks is considered. Contrary to the usual Bell scenario, where distant observers share a physical system emitted by one common source, a network features several independent sources, each distributing a physical system to a subset of observers. In the quantum setting, the observers can perform joint measurements on initially independent systems, which may lead to strong correlations across the whole network. In this work, we introduce a technique to systematically map a Bell inequality to a family of Bell-type inequalities bounding classical correlations on networks in a star-configuration. Also, we show that whenever a given Bell inequality can be violated by some entangled state ρ , then all the corresponding network inequalities can be violated by considering many copies of ρ distributed in the star network. The relevance of these ideas is illustrated by applying our method to a specific multi-setting Bell inequality. We derive the corresponding network inequalities, and study their quantum violations. (paper)

  7. Robust Learning of High-dimensional Biological Networks with Bayesian Networks

    Science.gov (United States)

    Nägele, Andreas; Dejori, Mathäus; Stetter, Martin

    Structure learning of Bayesian networks applied to gene expression data has become a potentially useful method to estimate interactions between genes. However, the NP-hardness of Bayesian network structure learning renders the reconstruction of the full genetic network with thousands of genes unfeasible. Consequently, the maximal network size is usually restricted dramatically to a small set of genes (corresponding with variables in the Bayesian network). Although this feature reduction step makes structure learning computationally tractable, on the downside, the learned structure might be adversely affected due to the introduction of missing genes. Additionally, gene expression data are usually very sparse with respect to the number of samples, i.e., the number of genes is much greater than the number of different observations. Given these problems, learning robust network features from microarray data is a challenging task. This chapter presents several approaches tackling the robustness issue in order to obtain a more reliable estimation of learned network features.

  8. Structural Behavioral Study on the General Aviation Network Based on Complex Network

    Science.gov (United States)

    Zhang, Liang; Lu, Na

    2017-12-01

    The general aviation system is an open and dissipative system with complex structures and behavioral features. This paper has established the system model and network model for general aviation. We have analyzed integral attributes and individual attributes by applying the complex network theory and concluded that the general aviation network has influential enterprise factors and node relations. We have checked whether the network has small world effect, scale-free property and network centrality property which a complex network should have by applying degree distribution of functions and proved that the general aviation network system is a complex network. Therefore, we propose to achieve the evolution process of the general aviation industrial chain to collaborative innovation cluster of advanced-form industries by strengthening network multiplication effect, stimulating innovation performance and spanning the structural hole path.

  9. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  10. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  11. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  12. A Quantum Cryptography Communication Network Based on Software Defined Network

    Directory of Open Access Journals (Sweden)

    Zhang Hongliang

    2018-01-01

    Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.

  13. Analyzing the factors affecting network lifetime cluster-based wireless sensor network

    International Nuclear Information System (INIS)

    Malik, A.S.; Qureshi, A.

    2010-01-01

    Cluster-based wireless sensor networks enable the efficient utilization of the limited energy resources of the deployed sensor nodes and hence prolong the node as well as network lifetime. Low Energy Adaptive Clustering Hierarchy (Leach) is one of the most promising clustering protocol proposed for wireless sensor networks. This paper provides the energy utilization and lifetime analysis for cluster-based wireless sensor networks based upon LEACH protocol. Simulation results identify some important factors that induce unbalanced energy utilization between the sensor nodes and hence affect the network lifetime in these types of networks. These results highlight the need for a standardized, adaptive and distributed clustering technique that can increase the network lifetime by further balancing the energy utilization among sensor nodes. (author)

  14. A Network Primer: Full-Fledged Educational Networks.

    Science.gov (United States)

    Lehrer, Ariella

    1988-01-01

    Discusses some of the factors included in choosing appropriate computer networks for the classroom. Describes such networks as those produced by Apple Computer, Corvus Systems, Velan, Berkeley Softworks, Tandy, LAN-TECH, Unisys, and International Business Machines (IBM). (TW)

  15. Network on Target: Remotely Configured Adaptive Tactical Networks

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Bourakov, Eugene

    2006-01-01

    The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer...

  16. Network planning study of the metro-optical-network-oriented 3G application

    Science.gov (United States)

    Gong, Qian; Xu, Rong; Lin, Jin Tong

    2005-02-01

    To compare with the 2G mobile communication, 3G technologies can supply the perfect service scope and performance. 3G is the trend of the mobile communication. So now to build the transmission network, it is needed to consider how the transmission network to support the 3G applications. For the 3G network architecture, it include the 2 part: Utran access network and core network. So the metro optical network should consider how to build the network to adapt the 3G applications. Include the metro core and access layer. In the metro core, we should consider the network should evolved towards the Mesh architecture with ASON function to realize the fast protection and restoration, quick end-to-end service provision, and high capacity cross-connect matrix etc. In the access layer, the network should have the ability to access the 3G services such as ATM interface with IMA function. In addition, the traffic grooming should be provided to improve the bandwidth utility. In this paper, first we present the MCC network situation, the network planning model will be introduced. Then we present the topology architecture, node capacity and traffic forecast. At last, based on our analysis, we will give a total solution to MCC to build their metro optical network toward to the mesh network with the consideration of 3G services.

  17. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  18. Community Detection for Multiplex Social Networks Based on Relational Bayesian Networks

    DEFF Research Database (Denmark)

    Jiang, Jiuchuan; Jaeger, Manfred

    2014-01-01

    Many techniques have been proposed for community detection in social networks. Most of these techniques are only designed for networks defined by a single relation. However, many real networks are multiplex networks that contain multiple types of relations and different attributes on the nodes...

  19. Networks of networks the last frontier of complexity

    CERN Document Server

    Scala, Antonio

    2014-01-01

    The present work is meant as a reference to provide an organic and comprehensive view of the most relevant results in the exciting new field of Networks of Networks (NetoNets). Seminal papers have recently been published posing the basis to study what happens when different networks interact, thus providing evidence for the emergence of new, unexpected behaviors and vulnerabilities. From those seminal works, the awareness on the importance understanding Networks of Networks (NetoNets) has spread to the entire community of Complexity Science. The reader will benefit from the experience of some of the most well-recognized leaders in this field. The contents have been aggregated under four headings; General Theory, Phenomenology, Applications and Risk Assessment. The reader will be impressed by the different applications of the general paradigm that span from physiology, to financial risk, to transports. We are currently making the first steps to reduce the distance between the language and the way of thinking o...

  20. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  1. Networking Ethics: A Survey of Bioethics Networks Across the U.S.

    Science.gov (United States)

    Fausett, Jennifer Kleiner; Gilmore-Szott, Eleanor; Hester, D Micah

    2016-06-01

    Ethics networks have emerged over the last few decades as a mechanism for individuals and institutions over various regions, cities and states to converge on healthcare-related ethical issues. However, little is known about the development and nature of such networks. In an effort to fill the gap in the knowledge about such networks, a survey was conducted that evaluated the organizational structure, missions and functions, as well as the outcomes/products of ethics networks across the country. Eighteen established bioethics networks were identified via consensus of three search processes and were approached for participation. The participants completed a survey developed for the purposes of this study and distributed via SurveyMonkey. Responses were obtained from 10 of the 18 identified and approached networks regarding topic areas of: Network Composition and Catchment Areas; Network Funding and Expenses; Personnel; Services; and Missions and Accomplishments. Bioethics networks are designed primarily to bring ethics education and support to professionals and hospitals. They do so over specifically defined areas-states, regions, or communities-and each is concerned about how to stay financially healthy. At the same time, the networks work off different organizational models, either as stand-alone organizations or as entities within existing organizational structures.

  2. In-network adaptation of SHVC video in software-defined networks

    Science.gov (United States)

    Awobuluyi, Olatunde; Nightingale, James; Wang, Qi; Alcaraz Calero, Jose Maria; Grecos, Christos

    2016-04-01

    Software Defined Networks (SDN), when combined with Network Function Virtualization (NFV) represents a paradigm shift in how future networks will behave and be managed. SDN's are expected to provide the underpinning technologies for future innovations such as 5G mobile networks and the Internet of Everything. The SDN architecture offers features that facilitate an abstracted and centralized global network view in which packet forwarding or dropping decisions are based on application flows. Software Defined Networks facilitate a wide range of network management tasks, including the adaptation of real-time video streams as they traverse the network. SHVC, the scalable extension to the recent H.265 standard is a new video encoding standard that supports ultra-high definition video streams with spatial resolutions of up to 7680×4320 and frame rates of 60fps or more. The massive increase in bandwidth required to deliver these U-HD video streams dwarfs the bandwidth requirements of current high definition (HD) video. Such large bandwidth increases pose very significant challenges for network operators. In this paper we go substantially beyond the limited number of existing implementations and proposals for video streaming in SDN's all of which have primarily focused on traffic engineering solutions such as load balancing. By implementing and empirically evaluating an SDN enabled Media Adaptation Network Entity (MANE) we provide a valuable empirical insight into the benefits and limitations of SDN enabled video adaptation for real time video applications. The SDN-MANE is the video adaptation component of our Video Quality Assurance Manager (VQAM) SDN control plane application, which also includes an SDN monitoring component to acquire network metrics and a decision making engine using algorithms to determine the optimum adaptation strategy for any real time video application flow given the current network conditions. Our proposed VQAM application has been implemented and

  3. ATM Tactical Network - a challenge for the military networks

    NARCIS (Netherlands)

    Waveren, C.J. van; Luiijf, H.A.M.; Burakowski, W.; Kopertowski, Z.

    1997-01-01

    The next generation of tactical networks will be based on the ATM technology. The POST-2000 tactical network is just in the designing phase. The objective of this paper is to point out the main problems which should be solved to adopt ATM technology into the tactical network environment. The

  4. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  5. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  6. Optimal Network-Topology Design

    Science.gov (United States)

    Li, Victor O. K.; Yuen, Joseph H.; Hou, Ting-Chao; Lam, Yuen Fung

    1987-01-01

    Candidate network designs tested for acceptability and cost. Optimal Network Topology Design computer program developed as part of study on topology design and analysis of performance of Space Station Information System (SSIS) network. Uses efficient algorithm to generate candidate network designs consisting of subsets of set of all network components, in increasing order of total costs and checks each design to see whether it forms acceptable network. Technique gives true cost-optimal network and particularly useful when network has many constraints and not too many components. Program written in PASCAL.

  7. Integrating Networking into ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2018-01-01

    Networking is foundational to the ATLAS distributed infrastructure and there are many ongoing activities related to networking both within and outside of ATLAS. We will report on the progress in a number of areas exploring ATLAS's use of networking and our ability to monitor the network, analyze metrics from the network, and tune and optimize application and end-host parameters to make the most effective use of the network. Specific topics will include work on Open vSwitch for production systems, network analytics, FTS testing and tuning, and network problem alerting and alarming.

  8. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Science.gov (United States)

    Messinger, Gioia; Goldberg, Giora

    2006-09-01

    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  9. Network Transformations in Economy

    Directory of Open Access Journals (Sweden)

    Bolychev O.

    2014-09-01

    Full Text Available In the context of ever-increasing market competition, networked interactions play a special role in the economy. The network form of entrepreneurship is increasingly viewed as an effective organizational structure to create a market value embedded in innovative business solutions. The authors study the characteristics of a network as an economic category and emphasize certain similarities between Rus sian and international approaches to identifying interactions of economic systems based on the network principle. The paper focuses on the types of networks widely used in the economy. The authors analyze the transformation of business networks along two lines: from an intra- to an inter-firm network and from an inter-firm to an inter-organizational network. The possible forms of network formation are described depending on the strength of connections and the type of integration. The drivers and reasons behind process of transition from a hierarchical model of the organizational structure to a network type are identified. The authors analyze the advantages of creating inter-firm networks and discuss the features of inter-organizational networks as compares to inter-firm ones. The article summarizes the reasons for and advantages of participation in inter-rganizational networks and identifies the main barriers to the formation of inter-organizational network.

  10. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  11. Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking

    Science.gov (United States)

    2016-11-01

    Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory...performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are...devices, and the ad-hoc nature of the network . Group Centric Networking (GCN) is a proposed networking protocol that addresses challenges specific to

  12. A Collaborative Learning Network Approach to Improvement: The CUSP Learning Network.

    Science.gov (United States)

    Weaver, Sallie J; Lofthus, Jennifer; Sawyer, Melinda; Greer, Lee; Opett, Kristin; Reynolds, Catherine; Wyskiel, Rhonda; Peditto, Stephanie; Pronovost, Peter J

    2015-04-01

    Collaborative improvement networks draw on the science of collaborative organizational learning and communities of practice to facilitate peer-to-peer learning, coaching, and local adaption. Although significant improvements in patient safety and quality have been achieved through collaborative methods, insight regarding how collaborative networks are used by members is needed. Improvement Strategy: The Comprehensive Unit-based Safety Program (CUSP) Learning Network is a multi-institutional collaborative network that is designed to facilitate peer-to-peer learning and coaching specifically related to CUSP. Member organizations implement all or part of the CUSP methodology to improve organizational safety culture, patient safety, and care quality. Qualitative case studies developed by participating members examine the impact of network participation across three levels of analysis (unit, hospital, health system). In addition, results of a satisfaction survey designed to evaluate member experiences were collected to inform network development. Common themes across case studies suggest that members found value in collaborative learning and sharing strategies across organizational boundaries related to a specific improvement strategy. The CUSP Learning Network is an example of network-based collaborative learning in action. Although this learning network focuses on a particular improvement methodology-CUSP-there is clear potential for member-driven learning networks to grow around other methods or topic areas. Such collaborative learning networks may offer a way to develop an infrastructure for longer-term support of improvement efforts and to more quickly diffuse creative sustainment strategies.

  13. Evolutionary features of academic articles co-keyword network and keywords co-occurrence network: Based on two-mode affiliation network

    Science.gov (United States)

    Li, Huajiao; An, Haizhong; Wang, Yue; Huang, Jiachen; Gao, Xiangyun

    2016-05-01

    Keeping abreast of trends in the articles and rapidly grasping a body of article's key points and relationship from a holistic perspective is a new challenge in both literature research and text mining. As the important component, keywords can present the core idea of the academic article. Usually, articles on a single theme or area could share one or some same keywords, and we can analyze topological features and evolution of the articles co-keyword networks and keywords co-occurrence networks to realize the in-depth analysis of the articles. This paper seeks to integrate statistics, text mining, complex networks and visualization to analyze all of the academic articles on one given theme, complex network(s). All 5944 ;complex networks; articles that were published between 1990 and 2013 and are available on the Web of Science are extracted. Based on the two-mode affiliation network theory, a new frontier of complex networks, we constructed two different networks, one taking the articles as nodes, the co-keyword relationships as edges and the quantity of co-keywords as the weight to construct articles co-keyword network, and another taking the articles' keywords as nodes, the co-occurrence relationships as edges and the quantity of simultaneous co-occurrences as the weight to construct keyword co-occurrence network. An integrated method for analyzing the topological features and evolution of the articles co-keyword network and keywords co-occurrence networks is proposed, and we also defined a new function to measure the innovation coefficient of the articles in annual level. This paper provides a useful tool and process for successfully achieving in-depth analysis and rapid understanding of the trends and relationships of articles in a holistic perspective.

  14. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  15. Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks

    DEFF Research Database (Denmark)

    Hillmann, Robert; Trier, Matthias

    2012-01-01

    . The dissemination patterns analyzed in this study consist of network motifs based on triples of actors and the ties among them. These motifs are associated with common social network effects to derive meaningful insights about dissemination activities. The data basis includes several thousand social networks...... with textual messages classified according to embedded positive and negative sentiments. Based on this data, sub-networks are extracted and analyzed with a dynamic network motif analysis to determine dissemination patterns and associated network effects. Results indicate that the emergence of digital social...... networks exhibits a strong tendency towards reciprocity, followed by the dominance of hierarchy as an intermediate step leading to social clustering with hubs and transitivity effects for both positive and negative sentiments to the same extend. Sentiments embedded in exchanged textual messages do only...

  16. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  17. Networks in ATLAS

    Science.gov (United States)

    McKee, Shawn; ATLAS Collaboration

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage

  18. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  19. Northern emporia and maritime networks. Modelling past communication using archaeological network analysis

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2015-01-01

    preserve patterns of thisinteraction. Formal network analysis and modelling holds the potential to identify anddemonstrate such patterns, where traditional methods often prove inadequate. Thearchaeological study of communication networks in the past, however, calls for radically different analytical...... this is not a problem of network analysis, but network synthesis: theclassic problem of cracking codes or reconstructing black-box circuits. It is proposedthat archaeological approaches to network synthesis must involve a contextualreading of network data: observations arising from individual contexts, morphologies...

  20. Social networks in primates: smart and tolerant species have more efficient networks.

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J J; Pelé, Marie; Bergstrom, Mackenzie L; Borgeaud, Christèle; Brosnan, Sarah F; Crofoot, Margaret C; Fedigan, Linda M; Fichtel, Claudia; Hopper, Lydia M; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-12-23

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities.

  1. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  2. Network on Target: Remotely Configured Adaptive Tactical Networks

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Bourakov, Eugene

    2006-01-01

    .... The node mobility as well as ad hoc network topology reconfiguration becomes a powerful control option, which network operators or intelligent management agents could apply to provide for self...

  3. Analysis of Network Parameters Influencing Performance of Hybrid Multimedia Networks

    Directory of Open Access Journals (Sweden)

    Dominik Kovac

    2013-10-01

    Full Text Available Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP calls or file transfers. Such a heterogeneous system has to be able satisfy all network and end-user requirements which are increasing constantly. Therefore the simulation tools enabling deep analysis in order to find the key performance indicators and factors which influence the overall quality for specific network service the most are highly needed. This paper provides a study on the network parameters like communication technology, routing protocol, QoS mechanism, etc. and their effect on the performance of hybrid multimedia network. The analysis was performed in OPNET Modeler environment and the most interesting results are discussed at the end of this paper

  4. Software defined wireless sensor networks application opportunities for efficient network management: a survey

    CSIR Research Space (South Africa)

    Modieginyane, KM

    2017-03-01

    Full Text Available Wireless Sensor Networks (WSNs) are commonly used information technologies of modern networking and computing platforms. Today's network computing applications are faced with a high demand of powerful network functionalities. Functional network...

  5. Stories in Networks and Networks in Stories: A Tri-Modal Model for Mixed-Methods Social Network Research on Teachers

    Science.gov (United States)

    Baker-Doyle, Kira J.

    2015-01-01

    Social network research on teachers and schools has risen exponentially in recent years as an innovative method to reveal the role of social networks in education. However, scholars are still exploring ways to incorporate traditional quantitative methods of Social Network Analysis (SNA) with qualitative approaches to social network research. This…

  6. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  7. Game theory in communication networks cooperative resolution of interactive networking scenarios

    CERN Document Server

    Antoniou, Josephina

    2012-01-01

    A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game T

  8. Advanced network programming principles and techniques : network application programming with Java

    CERN Document Server

    Ciubotaru, Bogdan

    2013-01-01

    Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. Features: presents detailed coverage of network architectures; gently introduces the reader to the basic ideas underpinning comp

  9. An Inter-Networking Mechanism with Stepwise Synchronization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Masayuki Murata

    2011-08-01

    Full Text Available To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other.

  10. The Analysis of SARDANA HPON Networks Using the HPON Network Configurator

    Directory of Open Access Journals (Sweden)

    Rastislav Roka

    2013-01-01

    Full Text Available NG-PON systems present optical access infrastructures to support various applications of the many service providers. In the near future, we can expect NG-PON technologies with different motivations for developing of HPON networks. The HPON is a hybrid passive optical network in a way that utilizes on a physical layer both TDM and WDM multiplexing principles together. The HPON network utilizes similar or soft revised topologies as TDM-PON architectures. In this second paper, requirements for the SARDANA HPON networks are introduced. A main part of the paper is dedicated to presentation of the HPON network configurator that allows configurating and analyzing the SARDANA HPON characteristics from a viewpoint of various specific network parameters. Finally, a short introduction to the comparison of the SARDANA and SUCCESS HPON networks based on simulation results is presented.

  11. The Analysis of SUCCESS HPON Networks Using the HPON Network Configurator

    Directory of Open Access Journals (Sweden)

    Rastislav Roka

    2013-01-01

    Full Text Available NG-PON systems present optical access infrastructures to support various applications of the many service providers. In the near future, we can expect NG-PON technologies with different motivations for developing of HPON networks. The HPON is a hybrid passive optical network in a way that utilizes on a physical layer both TDM and WDM multiplexing principles together. The HPON network utilizes similar or soft revised topologies as TDM-PON architectures. In this first paper, design requirements for SUCCESS HPON networks are introduced. A main part of the paper is dedicated to presentation of the HPON network configurator that allows configurating and analyzing the SUCCESS HPON characteristics from a viewpoint of various specific network parameters. Finally, a short introduction to the comparison of the SUCCESS and SARDANA HPON networks based on simulation results is presented.

  12. An Entitlement Approach to Address the Water-Energy-Food Nexus in Rural India

    Science.gov (United States)

    Siegfried, T. U.; Fishman, R.; Modi, V.; Lall, U.

    2008-12-01

    prices and rainfall patterns due to climate change only enhance these concerns. Given these deficiencies, any corrective strategy should at least target the following long-term policy goals: a) increase the efficiency of rural electricity consumption in terms of grain production and rural income, b) providing the farmers greater flexibility with timely, high quality energy and more efficient means of production, c) enable proper energy accounting on the use side so as to recover costs at sufficient levels for the SEBs and thus enable long-term investments in energy infrastructure and d) secure and eventually increase agricultural production without depleting groundwater resources over the long run. We will present an entitlement approach with which the above issues can be addressed in the future. A case study example from the semi-arid Telangana Region in Andhra Pradesh will be discussed in depth and preliminary results shown.

  13. The Europeanization of Eurosceptics?

    DEFF Research Database (Denmark)

    Dutceac Segesten, Anamaria; Bossetta Jr, Michael Joseph

    NB: For those interested in our use of the Issuecrawler in this paper, please see our more recent web science paper entitled "Tracing Eurosceptic Party Networks via Hyperlink Network Analysis and #FAIL!ng: Can Web Crawlers Keep up with Web Design?", where we outline the limitations we uncovered...... Eurosceptic parties anno 2014 and do they facilitate a transnational communicative network attributing to a shared Eurosceptic agenda? Our analysis has three dimensions: descriptive, explanatory and normative. The descriptive dimension will contribute to the charting of this so far unexplored empirical domain...... or not non-Swedish Twitter users are participating in and/or affecting the Swedish Eurosceptic dialogue on social media....

  14. Neural Networks

    International Nuclear Information System (INIS)

    Smith, Patrick I.

    2003-01-01

    Physicists use large detectors to measure particles created in high-energy collisions at particle accelerators. These detectors typically produce signals indicating either where ionization occurs along the path of the particle, or where energy is deposited by the particle. The data produced by these signals is fed into pattern recognition programs to try to identify what particles were produced, and to measure the energy and direction of these particles. Ideally, there are many techniques used in this pattern recognition software. One technique, neural networks, is particularly suitable for identifying what type of particle caused by a set of energy deposits. Neural networks can derive meaning from complicated or imprecise data, extract patterns, and detect trends that are too complex to be noticed by either humans or other computer related processes. To assist in the advancement of this technology, Physicists use a tool kit to experiment with several neural network techniques. The goal of this research is interface a neural network tool kit into Java Analysis Studio (JAS3), an application that allows data to be analyzed from any experiment. As the final result, a physicist will have the ability to train, test, and implement a neural network with the desired output while using JAS3 to analyze the results or output. Before an implementation of a neural network can take place, a firm understanding of what a neural network is and how it works is beneficial. A neural network is an artificial representation of the human brain that tries to simulate the learning process [5]. It is also important to think of the word artificial in that definition as computer programs that use calculations during the learning process. In short, a neural network learns by representative examples. Perhaps the easiest way to describe the way neural networks learn is to explain how the human brain functions. The human brain contains billions of neural cells that are responsible for processing

  15. Default network modulation and large-scale network interactivity in healthy young and old adults.

    Science.gov (United States)

    Spreng, R Nathan; Schacter, Daniel L

    2012-11-01

    We investigated age-related changes in default, attention, and control network activity and their interactions in young and old adults. Brain activity during autobiographical and visuospatial planning was assessed using multivariate analysis and with intrinsic connectivity networks as regions of interest. In both groups, autobiographical planning engaged the default network while visuospatial planning engaged the attention network, consistent with a competition between the domains of internalized and externalized cognition. The control network was engaged for both planning tasks. In young subjects, the control network coupled with the default network during autobiographical planning and with the attention network during visuospatial planning. In old subjects, default-to-control network coupling was observed during both planning tasks, and old adults failed to deactivate the default network during visuospatial planning. This failure is not indicative of default network dysfunction per se, evidenced by default network engagement during autobiographical planning. Rather, a failure to modulate the default network in old adults is indicative of a lower degree of flexible network interactivity and reduced dynamic range of network modulation to changing task demands.

  16. Social networks in primates: smart and tolerant species have more efficient networks

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J. J.; Pelé, Marie; Bergstrom, Mackenzie L.; Borgeaud, Christèle; Brosnan, Sarah F.; Crofoot, Margaret C.; Fedigan, Linda M.; Fichtel, Claudia; Hopper, Lydia M.; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-01-01

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities. PMID:25534964

  17. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  18. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  19. Selection and integration of a network of parallel processors in the real time acquisition system of the 4{pi} DIAMANT multidetector: modeling, realization and evaluation of the software installed on this network; Choix et integration d`un reseau de processeurs paralleles dans le systeme d`acquisition temps reel du multidetecteur 4{pi} DIAMANT: modelisation, realisation et evaluation du logiciel implante sur ce reseau

    Energy Technology Data Exchange (ETDEWEB)

    Guirande, F. [Ecole Doctorale des Sciences Physiques et de l`Ingenieur, Bordeaux-1 Univ., 33 (France)

    1997-07-11

    The increase in sensitivity of 4{pi} arrays such as EUROBALL or DIAMANT has led to an increase in the data flow rate into the data acquisition system. If at the electronic level, the data flow has been distributed onto several data acquisition buses, it is necessary in the data processing system to increase the processing power. This work regards the modelling and implementation of the software allocated onto an architecture of parallel processors. Object analysis and formal methods were used, benchmark and evolution in the future of this architecture are presented. The thesis consists of two parts. Part A, devoted to `Nuclear Spectroscopy with 4 {pi} multidetectors`, contains a first chapter entitled `The Physics of 4{pi} multidetectors` and a second chapter entitled `Integral architecture of 4{pi} multidetectors`. Part B, devoted to `Parallel acquisition system of DIAMANT` contains three chapters entitled `Material architecture`, `Software architecture` and `Validation and Performances`. Four appendices and a term glossary close this work. (author) 58 refs.

  20. Epidemics on interconnected networks

    Science.gov (United States)

    Dickison, Mark; Havlin, S.; Stanley, H. E.

    2012-06-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties but will also interact with individuals in other networks. We study the susceptible-infected-recovered process on interconnected network systems and find two distinct regimes. In strongly coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength βc, below which the disease does not spread. In contrast, in weakly coupled network systems, a mixed phase exists below βc of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  1. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  2. Networks in Cell Biology

    Science.gov (United States)

    Buchanan, Mark; Caldarelli, Guido; De Los Rios, Paolo; Rao, Francesco; Vendruscolo, Michele

    2010-05-01

    Introduction; 1. Network views of the cell Paolo De Los Rios and Michele Vendruscolo; 2. Transcriptional regulatory networks Sarath Chandra Janga and M. Madan Babu; 3. Transcription factors and gene regulatory networks Matteo Brilli, Elissa Calistri and Pietro Lió; 4. Experimental methods for protein interaction identification Peter Uetz, Björn Titz, Seesandra V. Rajagopala and Gerard Cagney; 5. Modeling protein interaction networks Francesco Rao; 6. Dynamics and evolution of metabolic networks Daniel Segré; 7. Hierarchical modularity in biological networks: the case of metabolic networks Erzsébet Ravasz Regan; 8. Signalling networks Gian Paolo Rossini; Appendix 1. Complex networks: from local to global properties D. Garlaschelli and G. Caldarelli; Appendix 2. Modelling the local structure of networks D. Garlaschelli and G. Caldarelli; Appendix 3. Higher-order topological properties S. Ahnert, T. Fink and G. Caldarelli; Appendix 4. Elementary mathematical concepts A. Gabrielli and G. Caldarelli; References.

  3. An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks

    Directory of Open Access Journals (Sweden)

    Huanlin Liu

    2014-01-01

    Full Text Available Network coding can improve the optical multicast routing performance in terms of network throughput, bandwidth utilization, and traffic load balance. But network coding needs high encoding operations costs in all-optical WDM networks due to shortage of optical RAM. In the paper, the network coding operation is defined to evaluate the number of network coding operation cost in the paper. An optical multicast routing algorithm based on minimal number of network coding operations is proposed to improve the multicast capacity. Two heuristic criteria are designed to establish the multicast routing with low network coding cost and high multicast capacity. One is to select one path from the former K shortest paths with the least probability of dropping the multicast maximal capacity. The other is to select the path with lowest potential coding operations with the highest link shared degree among the multiple wavelength disjoint paths cluster from source to each destination. Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.

  4. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  5. Network bandwidth utilization forecast model on high bandwidth networks

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wuchert (William) [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sim, Alex [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-03-30

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2%. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  6. Software-Defined Networks as a Stage of the Network Technology Evolution

    Directory of Open Access Journals (Sweden)

    A. A. Krasotin

    2013-01-01

    Full Text Available The authors of the article focus on the concept of a software defined network. In the beginning, the brief historical account is given concerning software defined networks as a scientific concept, its formation and technological and scientific meaning. The software defined network concept is treated in the article not as the final state-of-the-art in networking, but rather as a possible step and direction in the development of a networking paradigm. The article touches on pros and cons as well of the software defined networking and gives an account of possible stages of development of this technology in the context of other technologies, considering its hybrid with MPLS, as an example. OpenFlow protocol constitutes the main part of the article. The authors further discuss various kinds of existing libraries realizing programmable management routines for a software defined network using OpenFlow. All of these libraries provide API for building modular applications for software defined network management. Touching on practical side of implementation the results of comparative tests of throughput and latency, achieved with these libraries are shown.

  7. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  8. Thin Watts-Strogatz networks.

    Science.gov (United States)

    de Moura, Alessandro P S

    2006-01-01

    A modified version of the Watts-Strogatz (WS) network model is proposed, in which the number of shortcuts scales with the network size N as Nalpha, with alpha infinity, whereas in the original WS model, this ratio is constant. We call such networks "thin Watts-Strogatz networks." We show that even though the fraction of shortcuts becomes vanishingly small for large networks, they still cause a kind of small-world effect, in the sense that the length L of the network increases sublinearly with the size. We develop a mean-field theory for these networks, which predicts that the length scales as N1-alpha ln N for large N. We also study how a search using only local information works in thin WS networks. We find that the search performance is enhanced compared to the regular network, and we predict that the search time tau scales as N1-alpha/2. These theoretical results are tested using numerical simulations. We comment on the possible relevance of thin WS networks for the design of high-performance low-cost communication networks.

  9. "Homeless Networks: Testing Peer and Homed Networks Against Location Choice"

    OpenAIRE

    Shinichiro Iwata; Koji Karato

    2007-01-01

    This paper examines the location choices of homeless people in Osaka City, and finds them concentrated because of homeless networks. The paper also shows that different types of homeless networks operate in two different homeless groups: (1) peer networks that provide a social tie inside homeless communities are observed in groups that had not had work experience in the day labor market; (2) homed networks that provide a social tie outside homeless communities affect location choice in the ex...

  10. Networks in ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2016-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  11. Networks in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00260714; The ATLAS collaboration

    2017-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  12. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  13. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  14. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  15. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-05-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other’s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network’s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network’s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. Furthermore, with the use of fractional cooperation, the average recovery overhead is further reduced by around 5% for the primary network and around 10% for the secondary network when a high fractional cooperation probability is used.

  16. Organization of complex networks

    Science.gov (United States)

    Kitsak, Maksim

    Many large complex systems can be successfully analyzed using the language of graphs and networks. Interactions between the objects in a network are treated as links connecting nodes. This approach to understanding the structure of networks is an important step toward understanding the way corresponding complex systems function. Using the tools of statistical physics, we analyze the structure of networks as they are found in complex systems such as the Internet, the World Wide Web, and numerous industrial and social networks. In the first chapter we apply the concept of self-similarity to the study of transport properties in complex networks. Self-similar or fractal networks, unlike non-fractal networks, exhibit similarity on a range of scales. We find that these fractal networks have transport properties that differ from those of non-fractal networks. In non-fractal networks, transport flows primarily through the hubs. In fractal networks, the self-similar structure requires any transport to also flow through nodes that have only a few connections. We also study, in models and in real networks, the crossover from fractal to non-fractal networks that occurs when a small number of random interactions are added by means of scaling techniques. In the second chapter we use k-core techniques to study dynamic processes in networks. The k-core of a network is the network's largest component that, within itself, exhibits all nodes with at least k connections. We use this k-core analysis to estimate the relative leadership positions of firms in the Life Science (LS) and Information and Communication Technology (ICT) sectors of industry. We study the differences in the k-core structure between the LS and the ICT sectors. We find that the lead segment (highest k-core) of the LS sector, unlike that of the ICT sector, is remarkably stable over time: once a particular firm enters the lead segment, it is likely to remain there for many years. In the third chapter we study how

  17. Specifying Orchestrating Capability in Network Organization and Interfirm Innovation Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    -tech industry. Besides interfirm networks, some organizational researchers are interested in the internal network organizational design. Prospector firms putting innovation on top of the agenda usually has a network organization which is more flexible. This paper analyzes how an SME from a traditional industry...

  18. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  19. Influence of choice of null network on small-world parameters of structural correlation networks.

    Directory of Open Access Journals (Sweden)

    S M Hadi Hosseini

    Full Text Available In recent years, coordinated variations in brain morphology (e.g., volume, thickness have been employed as a measure of structural association between brain regions to infer large-scale structural correlation networks. Recent evidence suggests that brain networks constructed in this manner are inherently more clustered than random networks of the same size and degree. Thus, null networks constructed by randomizing topology are not a good choice for benchmarking small-world parameters of these networks. In the present report, we investigated the influence of choice of null networks on small-world parameters of gray matter correlation networks in healthy individuals and survivors of acute lymphoblastic leukemia. Three types of null networks were studied: 1 networks constructed by topology randomization (TOP, 2 networks matched to the distributional properties of the observed covariance matrix (HQS, and 3 networks generated from correlation of randomized input data (COR. The results revealed that the choice of null network not only influences the estimated small-world parameters, it also influences the results of between-group differences in small-world parameters. In addition, at higher network densities, the choice of null network influences the direction of group differences in network measures. Our data suggest that the choice of null network is quite crucial for interpretation of group differences in small-world parameters of structural correlation networks. We argue that none of the available null models is perfect for estimation of small-world parameters for correlation networks and the relative strengths and weaknesses of the selected model should be carefully considered with respect to obtained network measures.

  20. Influence of Choice of Null Network on Small-World Parameters of Structural Correlation Networks

    Science.gov (United States)

    Hosseini, S. M. Hadi; Kesler, Shelli R.

    2013-01-01

    In recent years, coordinated variations in brain morphology (e.g., volume, thickness) have been employed as a measure of structural association between brain regions to infer large-scale structural correlation networks. Recent evidence suggests that brain networks constructed in this manner are inherently more clustered than random networks of the same size and degree. Thus, null networks constructed by randomizing topology are not a good choice for benchmarking small-world parameters of these networks. In the present report, we investigated the influence of choice of null networks on small-world parameters of gray matter correlation networks in healthy individuals and survivors of acute lymphoblastic leukemia. Three types of null networks were studied: 1) networks constructed by topology randomization (TOP), 2) networks matched to the distributional properties of the observed covariance matrix (HQS), and 3) networks generated from correlation of randomized input data (COR). The results revealed that the choice of null network not only influences the estimated small-world parameters, it also influences the results of between-group differences in small-world parameters. In addition, at higher network densities, the choice of null network influences the direction of group differences in network measures. Our data suggest that the choice of null network is quite crucial for interpretation of group differences in small-world parameters of structural correlation networks. We argue that none of the available null models is perfect for estimation of small-world parameters for correlation networks and the relative strengths and weaknesses of the selected model should be carefully considered with respect to obtained network measures. PMID:23840672

  1. A method for identifying hierarchical sub-networks / modules and weighting network links based on their similarity in sub-network / module affiliation

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-06-01

    Full Text Available Some networks, including biological networks, consist of hierarchical sub-networks / modules. Based on my previous study, in present study a method for both identifying hierarchical sub-networks / modules and weighting network links is proposed. It is based on the cluster analysis in which between-node similarity in sets of adjacency nodes is used. Two matrices, linkWeightMat and linkClusterIDs, are achieved by using the algorithm. Two links with both the same weight in linkWeightMat and the same cluster ID in linkClusterIDs belong to the same sub-network / module. Two links with the same weight in linkWeightMat but different cluster IDs in linkClusterIDs belong to two sub-networks / modules at the same hirarchical level. However, a link with an unique cluster ID in linkClusterIDs does not belong to any sub-networks / modules. A sub-network / module of the greater weight is the more connected sub-network / modules. Matlab codes of the algorithm are presented.

  2. Human Rights Discourse in the Sustainable Development Agenda Avoids Obligations and Entitlements Comment on "Rights Language in the Sustainable Development Agenda: Has Right to Health Discourse and Norms Shaped Health Goals?".

    Science.gov (United States)

    Williams, Carmel; Blaiklock, Alison

    2016-03-05

    Our commentary on Forman et al paper explores their thesis that right to health language can frame global health policy responses. We examined human rights discourse in the outcome documents from three 2015 United Nations (UN) summits and found rights-related terms are used in all three. However, a deeper examination of the discourse finds the documents do not convey the obligations and entitlements of human rights and international human rights law. The documents contain little that can be used to empower the participation of those already left behind and to hold States and the private sector to account for their human rights duties. This is especially worrying in a neoliberal era. © 2016 by Kerman University of Medical Sciences.

  3. Distance metric learning for complex networks: Towards size-independent comparison of network structures

    Science.gov (United States)

    Aliakbary, Sadegh; Motallebi, Sadegh; Rashidian, Sina; Habibi, Jafar; Movaghar, Ali

    2015-02-01

    Real networks show nontrivial topological properties such as community structure and long-tail degree distribution. Moreover, many network analysis applications are based on topological comparison of complex networks. Classification and clustering of networks, model selection, and anomaly detection are just some applications of network comparison. In these applications, an effective similarity metric is needed which, given two complex networks of possibly different sizes, evaluates the amount of similarity between the structural features of the two networks. Traditional graph comparison approaches, such as isomorphism-based methods, are not only too time consuming but also inappropriate to compare networks with different sizes. In this paper, we propose an intelligent method based on the genetic algorithms for integrating, selecting, and weighting the network features in order to develop an effective similarity measure for complex networks. The proposed similarity metric outperforms state of the art methods with respect to different evaluation criteria.

  4. Cluster-based single-sink wireless sensor networks and passive optical network converged network incorporating sideband modulation schemes

    Science.gov (United States)

    Kumar, Love; Sharma, Vishal; Singh, Amarpal

    2018-02-01

    Wireless sensor networks have tremendous applications, such as civil, military, and environmental monitoring. In most of the applications, sensor data are required to be propagated over the internet/core networks, which result in backhaul setback. Subsequently, there is a necessity to backhaul the sensed information of such networks together with prolonging of the transmission link. Passive optical network (PON) is next-generation access technology emerging as a potential candidate for convergence of the sensed data to the core system. Earlier, the work with single-optical line terminal-PON was demonstrated and investigated merely analytically. This work is an attempt to demonstrate a practical model of a bidirectional single-sink wireless sensor network-PON converged network in which the collected data from cluster heads are transmitted over PON networks. Further, modeled converged structure has been investigated under the influence of double, single, and tandem sideband modulation schemes incorporating a corresponding phase-delay to the sensor data entities that have been overlooked in the past. The outcome illustrates the successful fusion of the sensor data entities over PON with acceptable bit error rate and signal to noise ratio serving as a potential development in the sphere of such converged networks. It has also been revealed that the data entities treated with tandem side band modulation scheme help in improving the performance of the converged structure. Additionally, analysis for uplink transmission reported with queue theory in terms of time cycle, average time delay, data packet generation, and bandwidth utilization. An analytical analysis of proposed converged network shows that average time delay for data packet transmission is less as compared with time cycle delay.

  5. Do-it-yourself networks: a novel method of generating weighted networks.

    Science.gov (United States)

    Shanafelt, D W; Salau, K R; Baggio, J A

    2017-11-01

    Network theory is finding applications in the life and social sciences for ecology, epidemiology, finance and social-ecological systems. While there are methods to generate specific types of networks, the broad literature is focused on generating unweighted networks. In this paper, we present a framework for generating weighted networks that satisfy user-defined criteria. Each criterion hierarchically defines a feature of the network and, in doing so, complements existing algorithms in the literature. We use a general example of ecological species dispersal to illustrate the method and provide open-source code for academic purposes.

  6. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  7. Better sales networks.

    Science.gov (United States)

    Ustüner, Tuba; Godes, David

    2006-01-01

    Anyone in sales will tell you that social networks are critical. The more contacts you have, the more leads you'll generate, and, ultimately, the more sales you'll make. But that's a vast oversimplification. Different configurations of networks produce different results, and the salesperson who develops a nuanced understanding of social networks will outshine competitors. The salesperson's job changes over the course of the selling process. Different abilities are required in each stage of the sale: identifying prospects, gaining buy-in from potential customers, creating solutions, and closing the deal. Success in the first stage, for instance, depends on the salesperson acquiring precise and timely information about opportunities from contacts in the marketplace. Closing the deal requires the salesperson to mobilize contacts from prior sales to act as references. Managers often view sales networks only in terms of direct contacts. But someone who knows lots of people doesn't necessarily have an effective network because networks often pay off most handsomely through indirect contacts. Moreover, the density of the connections in a network is important. Do a salesperson's contacts know all the same people, or are their associates widely dispersed? Sparse networks are better, for example, at generating unique information. Managers can use three levers--sales force structure, compensation, and skills development--to encourage salespeople to adopt a network-based view and make the best possible use of social webs. For example, the sales force can be restructured to decouple lead generation from other tasks because some people are very good at building diverse ties but not so good at maintaining other kinds of networks. Companies that take steps of this kind to help their sales teams build better networks will reap tremendous advantages.

  8. Unraveling spurious properties of interaction networks with tailored random networks.

    Directory of Open Access Journals (Sweden)

    Stephan Bialonski

    Full Text Available We investigate interaction networks that we derive from multivariate time series with methods frequently employed in diverse scientific fields such as biology, quantitative finance, physics, earth and climate sciences, and the neurosciences. Mimicking experimental situations, we generate time series with finite length and varying frequency content but from independent stochastic processes. Using the correlation coefficient and the maximum cross-correlation, we estimate interdependencies between these time series. With clustering coefficient and average shortest path length, we observe unweighted interaction networks, derived via thresholding the values of interdependence, to possess non-trivial topologies as compared to Erdös-Rényi networks, which would indicate small-world characteristics. These topologies reflect the mostly unavoidable finiteness of the data, which limits the reliability of typically used estimators of signal interdependence. We propose random networks that are tailored to the way interaction networks are derived from empirical data. Through an exemplary investigation of multichannel electroencephalographic recordings of epileptic seizures--known for their complex spatial and temporal dynamics--we show that such random networks help to distinguish network properties of interdependence structures related to seizure dynamics from those spuriously induced by the applied methods of analysis.

  9. Bayesian Network Webserver: a comprehensive tool for biological network modeling.

    Science.gov (United States)

    Ziebarth, Jesse D; Bhattacharya, Anindya; Cui, Yan

    2013-11-01

    The Bayesian Network Webserver (BNW) is a platform for comprehensive network modeling of systems genetics and other biological datasets. It allows users to quickly and seamlessly upload a dataset, learn the structure of the network model that best explains the data and use the model to understand relationships between network variables. Many datasets, including those used to create genetic network models, contain both discrete (e.g. genotype) and continuous (e.g. gene expression traits) variables, and BNW allows for modeling hybrid datasets. Users of BNW can incorporate prior knowledge during structure learning through an easy-to-use structural constraint interface. After structure learning, users are immediately presented with an interactive network model, which can be used to make testable hypotheses about network relationships. BNW, including a downloadable structure learning package, is available at http://compbio.uthsc.edu/BNW. (The BNW interface for adding structural constraints uses HTML5 features that are not supported by current version of Internet Explorer. We suggest using other browsers (e.g. Google Chrome or Mozilla Firefox) when accessing BNW). ycui2@uthsc.edu. Supplementary data are available at Bioinformatics online.

  10. Soft options. Sanfte Alternativen

    Energy Technology Data Exchange (ETDEWEB)

    Lutz, R

    1981-01-01

    This collection of contributions made by supporters of the ''soft approach'' is intended to provide an insight into a conceivable future which is quite different from traditional ideas on social and economic developments based on the usual economic thinking and conventional energy sources. The chapter entitled ''The new world view'' shows the way from a machine-like paradigm to a living example in science. In the chapter entitled ''Women are organizing their future'' female perspectives and concepts of solutions are described. In the chapter ''Eco-tecture'' examples of living architecture and of environment formation are presented. In the chapter ''Soft technology'' approaches to an ecology-oriented technology are discussed, and in the chapter ''Network and future workshops'' novel forms of organization and communication are described.

  11. Innovations in knowledge management the impact of social media, semantic web and cloud computing

    CERN Document Server

    Phillips-Wren, Gloria; Jain, Lakhmi

    2016-01-01

    This book discusses emerging trends in the field of managing knowledge work due to technological innovations. The book is organized in 3 sections. The first section, entitled "Managing Knowledge, Projects and Networks", discusses knowledge processes and their use, reuse or generation in the context of an organization. The second section, entitled "Managing Knowledge using Social Media", focuses on factors influencing adoption and usage, the role of social media in managing knowledge, and factors that influence employees' acceptance and participation. The third section brings into discussion new approaches and technologies for acquiring knowledge. The book will be useful to both academics engaged in research in knowledge management and practitioners who are considering or implementing strategies for managing one of their most important resources.

  12. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  13. The correlation of metrics in complex networks with applications in functional brain networks

    NARCIS (Netherlands)

    Li, C.; Wang, H.; De Haan, W.; Stam, C.J.; Van Mieghem, P.F.A.

    2011-01-01

    An increasing number of network metrics have been applied in network analysis. If metric relations were known better, we could more effectively characterize networks by a small set of metrics to discover the association between network properties/metrics and network functioning. In this paper, we

  14. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  15. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  16. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    Network Service Providers (NSP) often choose to overprovision their networks instead of deploying proper Quality of Services (QoS) mechanisms that allow for traffic differentiation and predictable quality. This tendency of overprovisioning is not sustainable for the simple reason that network...... resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  17. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed...... different manufacturing plants in the network and their impact on network transformation. Findings – The paper highlights the dominant role of manufacturing plants in the continuously changing shape of a manufacturing network. The paper demonstrates that a product or process change at one manufacturing...... by identifying the gaps in the reviewed literature. The paper is based on three case studies undertaken in Danish manufacturing companies to explore in detail their manufacturing plants and networks. The cases provide a sound basis for developing the research questions and explaining the interaction between...

  18. Multifractal analysis of complex networks

    International Nuclear Information System (INIS)

    Wang Dan-Ling; Yu Zu-Guo; Anh V

    2012-01-01

    Complex networks have recently attracted much attention in diverse areas of science and technology. Many networks such as the WWW and biological networks are known to display spatial heterogeneity which can be characterized by their fractal dimensions. Multifractal analysis is a useful way to systematically describe the spatial heterogeneity of both theoretical and experimental fractal patterns. In this paper, we introduce a new box-covering algorithm for multifractal analysis of complex networks. This algorithm is used to calculate the generalized fractal dimensions D q of some theoretical networks, namely scale-free networks, small world networks, and random networks, and one kind of real network, namely protein—protein interaction networks of different species. Our numerical results indicate the existence of multifractality in scale-free networks and protein—protein interaction networks, while the multifractal behavior is not clear-cut for small world networks and random networks. The possible variation of D q due to changes in the parameters of the theoretical network models is also discussed. (general)

  19. Comparison of neural network applications for channel assignment in cellular TDMA networks and dynamically sectored PCS networks

    Science.gov (United States)

    Hortos, William S.

    1997-04-01

    The use of artificial neural networks (NNs) to address the channel assignment problem (CAP) for cellular time-division multiple access and code-division multiple access networks has previously been investigated by this author and many others. The investigations to date have been based on a hexagonal cell structure established by omnidirectional antennas at the base stations. No account was taken of the use of spatial isolation enabled by directional antennas to reduce interference between mobiles. Any reduction in interference translates into increased capacity and consequently alters the performance of the NNs. Previous studies have sought to improve the performance of Hopfield- Tank network algorithms and self-organizing feature map algorithms applied primarily to static channel assignment (SCA) for cellular networks that handle uniformly distributed, stationary traffic in each cell for a single type of service. The resulting algorithms minimize energy functions representing interference constraint and ad hoc conditions that promote convergence to optimal solutions. While the structures of the derived neural network algorithms (NNAs) offer the potential advantages of inherent parallelism and adaptability to changing system conditions, this potential has yet to be fulfilled the CAP for emerging mobile networks. The next-generation communication infrastructures must accommodate dynamic operating conditions. Macrocell topologies are being refined to microcells and picocells that can be dynamically sectored by adaptively controlled, directional antennas and programmable transceivers. These networks must support the time-varying demands for personal communication services (PCS) that simultaneously carry voice, data and video and, thus, require new dynamic channel assignment (DCA) algorithms. This paper examines the impact of dynamic cell sectoring and geometric conditioning on NNAs developed for SCA in omnicell networks with stationary traffic to improve the metrics

  20. Influence of degree correlations on network structure and stability in protein-protein interaction networks

    Directory of Open Access Journals (Sweden)

    Zimmer Ralf

    2007-08-01

    Full Text Available Abstract Background The existence of negative correlations between degrees of interacting proteins is being discussed since such negative degree correlations were found for the large-scale yeast protein-protein interaction (PPI network of Ito et al. More recent studies observed no such negative correlations for high-confidence interaction sets. In this article, we analyzed a range of experimentally derived interaction networks to understand the role and prevalence of degree correlations in PPI networks. We investigated how degree correlations influence the structure of networks and their tolerance against perturbations such as the targeted deletion of hubs. Results For each PPI network, we simulated uncorrelated, positively and negatively correlated reference networks. Here, a simple model was developed which can create different types of degree correlations in a network without changing the degree distribution. Differences in static properties associated with degree correlations were compared by analyzing the network characteristics of the original PPI and reference networks. Dynamics were compared by simulating the effect of a selective deletion of hubs in all networks. Conclusion Considerable differences between the network types were found for the number of components in the original networks. Negatively correlated networks are fragmented into significantly less components than observed for positively correlated networks. On the other hand, the selective deletion of hubs showed an increased structural tolerance to these deletions for the positively correlated networks. This results in a lower rate of interaction loss in these networks compared to the negatively correlated networks and a decreased disintegration rate. Interestingly, real PPI networks are most similar to the randomly correlated references with respect to all properties analyzed. Thus, although structural properties of networks can be modified considerably by degree

  1. An Improved Car-Following Model in Vehicle Networking Based on Network Control

    Directory of Open Access Journals (Sweden)

    D. Y. Kong

    2014-01-01

    Full Text Available Vehicle networking is a system to realize information interoperability between vehicles and people, vehicles and roads, vehicles and vehicles, and cars and transport facilities, through the network information exchange, in order to achieve the effective monitoring of the vehicle and traffic flow. Realizing information interoperability between vehicles and vehicles, which can affect the traffic flow, is an important application of network control system (NCS. In this paper, a car-following model using vehicle networking theory is established, based on network control principle. The car-following model, which is an improvement of the traditional traffic model, describes the traffic in vehicle networking condition. The impact that vehicle networking has on the traffic flow is quantitatively assessed in a particular scene of one-way, no lane changing highway. The examples show that the capacity of the road is effectively enhanced by using vehicle networking.

  2. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  3. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  4. Visionary network 2030. Technology vision for future distribution network

    International Nuclear Information System (INIS)

    Kumpulainen, L.; Laaksonen, H.; Komulainen, R.

    2006-11-01

    Objective of this research was to create the long term vision of a distribution network technology to be used for the near future rebuild and necessary R and D efforts. Present status of the grid was briefly handled and created scenarios for the operational environment changes and available technology International view was used for getting familiar with the present solutions and future expectations in other countries. Centralised power generation is supposed to form the majority, but also the distributed generation will play more and more important role, which is hard to predict due to the uncertainty of the development of the regulation. Higher reliability and safety in major faults are expected from the future network with the reasonable costs. Impact of the climate change and impregnant using restrictions cause difficulties especially for the overhead lines in the forests. In the rural network also the ageing is the problem. For the urban networks the land usage and environmental issues get more challenging and the network reinforcement is necessary due to the increased use of electricity. As a result several technical solutions are available. Additions to the technology today, several new solutions were introduced. Important solutions in the future network are supposed to be the wide range of underground cable, high degree utilisation of the communication and network automation solutions, considerable shorter protection zones and new layout solution. In a long run the islanding enabled by the distributed energy systems and totally new network structures and solutions based on power electronics are supposed to improve the power quality and profitability. Separate quality classes in network design principally are also supposed to be approved. Getting into the vision needs also the Roadmap project, which coordinates and focuses the development of the industry. So the limited national development resources can be effectively utilised. A coordinated national

  5. Spatial analysis of bus transport networks using network theory

    Science.gov (United States)

    Shanmukhappa, Tanuja; Ho, Ivan Wang-Hei; Tse, Chi Kong

    2018-07-01

    In this paper, we analyze the bus transport network (BTN) structure considering the spatial embedding of the network for three cities, namely, Hong Kong (HK), London (LD), and Bengaluru (BL). We propose a novel approach called supernode graph structuring for modeling the bus transport network. A static demand estimation procedure is proposed to assign the node weights by considering the points of interests (POIs) and the population distribution in the city over various localized zones. In addition, the end-to-end delay is proposed as a parameter to measure the topological efficiency of the bus networks instead of the shortest distance measure used in previous works. With the aid of supernode graph representation, important network parameters are analyzed for the directed, weighted and geo-referenced bus transport networks. It is observed that the supernode concept has significant advantage in analyzing the inherent topological behavior. For instance, the scale-free and small-world behavior becomes evident with supernode representation as compared to conventional or regular graph representation for the Hong Kong network. Significant improvement in clustering, reduction in path length, and increase in centrality values are observed in all the three networks with supernode representation. The correlation between topologically central nodes and the geographically central nodes reveals the interesting fact that the proposed static demand estimation method for assigning node weights aids in better identifying the geographically significant nodes in the network. The impact of these geographically significant nodes on the local traffic behavior is demonstrated by simulation using the SUMO (Simulation of Urban Mobility) tool which is also supported by real-world empirical data, and our results indicate that the traffic speed around a particular bus stop can reach a jammed state from a free flow state due to the presence of these geographically important nodes. A comparison

  6. The correlation of metrics in complex networks with applications in functional brain networks

    International Nuclear Information System (INIS)

    Li, C; Wang, H; Van Mieghem, P; De Haan, W; Stam, C J

    2011-01-01

    An increasing number of network metrics have been applied in network analysis. If metric relations were known better, we could more effectively characterize networks by a small set of metrics to discover the association between network properties/metrics and network functioning. In this paper, we investigate the linear correlation coefficients between widely studied network metrics in three network models (Bárabasi–Albert graphs, Erdös–Rényi random graphs and Watts–Strogatz small-world graphs) as well as in functional brain networks of healthy subjects. The metric correlations, which we have observed and theoretically explained, motivate us to propose a small representative set of metrics by including only one metric from each subset of mutually strongly dependent metrics. The following contributions are considered important. (a) A network with a given degree distribution can indeed be characterized by a small representative set of metrics. (b) Unweighted networks, which are obtained from weighted functional brain networks with a fixed threshold, and Erdös–Rényi random graphs follow a similar degree distribution. Moreover, their metric correlations and the resultant representative metrics are similar as well. This verifies the influence of degree distribution on metric correlations. (c) Most metric correlations can be explained analytically. (d) Interestingly, the most studied metrics so far, the average shortest path length and the clustering coefficient, are strongly correlated and, thus, redundant. Whereas spectral metrics, though only studied recently in the context of complex networks, seem to be essential in network characterizations. This representative set of metrics tends to both sufficiently and effectively characterize networks with a given degree distribution. In the study of a specific network, however, we have to at least consider the representative set so that important network properties will not be neglected

  7. Virtual Networking Performance in OpenStack Platform for Network Function Virtualization

    Directory of Open Access Journals (Sweden)

    Franco Callegati

    2016-01-01

    Full Text Available The emerging Network Function Virtualization (NFV paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.

  8. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  9. Airborne Network Optimization with Dynamic Network Update

    Science.gov (United States)

    2015-03-26

    source si and a target ti . For each commodity (si, ki) the commodity specifies a non- negative demand di [5]. The objective of the multi-commodity...queue predictions, and network con- gestion [15]. The implementation of the DRQC uses the Kalman filter to predict the state of the network and optimize

  10. Virtual network embedding in cross-domain network based on topology and resource attributes

    Science.gov (United States)

    Zhu, Lei; Zhang, Zhizhong; Feng, Linlin; Liu, Lilan

    2018-03-01

    Aiming at the network architecture ossification and the diversity of access technologies issues, this paper researches the cross-domain virtual network embedding algorithm. By analysing the topological attribute from the local and global perspective of nodes in the virtual network and the physical network, combined with the local network resource property, we rank the embedding priority of the nodes with PCA and TOPSIS methods. Besides, the link load distribution is considered. Above all, We proposed an cross-domain virtual network embedding algorithm based on topology and resource attributes. The simulation results depicts that our algorithm increases the acceptance rate of multi-domain virtual network requests, compared with the existing virtual network embedding algorithm.

  11. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  12. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  13. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  14. Redes de aprendizaje, aprendizaje en red Learning Networks, Networked Learning

    Directory of Open Access Journals (Sweden)

    Peter Sloep

    2011-10-01

    Full Text Available Las redes de aprendizaje (Learning Networks son redes sociales en línea mediante las cuales los participantes comparten información y colaboran para crear conocimiento. De esta manera, estas redes enriquecen la experiencia de aprendizaje en cualquier contexto de aprendizaje, ya sea de educación formal (en escuelas o universidades o educación no-formal (formación profesional. Aunque el concepto de aprendizaje en red suscita el interés de diferentes actores del ámbito educativo, aún existen muchos interrogantes sobre cómo debe diseñarse el aprendizaje en red para facilitar adecuadamente la educación y la formación. El artículo toma este interrogante como punto de partida, y posteriormente aborda cuestiones como la dinámica de la evolución de las redes de aprendizaje, la importancia de fomentar la confianza entre los participantes y el papel central que desempeña el perfil de usuario en la construcción de la confianza, así como el apoyo entre compañeros. Además, se elabora el proceso de diseño de una red de aprendizaje, y se describe un ejemplo en el contexto universitario. Basándonos en la investigación que actualmente se lleva a cabo en nuestro propio centro y en otros lugares, el capítulo concluye con una visión del futuro de las redes de aprendizaje.Learning Networks are on-line social networks through which users share knowledge with each other and jointly develop new knowledge. This way, Learning Networks may enrich the experience of formal, school-based learning and form a viable setting for professional development. Although networked learning enjoys an increasing interest, many questions remain on how exactly learning in such networked contexts can contribute to successful education and training. Put differently, how should networked learning be designed best to facilitate education and training? Taking this as its point of departure, the chapter addresses such issues as the dynamic evolution of Learning Networks

  15. Why do adults entitled to free or highly subsidized dental services select fully out-of-pocket-paid care?

    Science.gov (United States)

    Bayat, Fariborz; Vehkalahti, Miira M; Murtomaa, Heikki; Tala, Heikki

    2010-02-01

    To investigate patients' reasons for selecting a dental clinic given their choice of free or highly-subsidized dental services. The study was based on cross-sectional data obtained through phone interviews with adults in Tehran, Iran. The present study included those entitled to free or highly-subsidized dental services (n = 726). The data covered the patients' awareness of subsidized dental services and type of dental clinic for their most recent visit and their reasons for selecting that clinic. Awareness of subsidized dental services was dichotomized as being either aware or unaware of such subsidy. The type of clinic was dichotomized as providing either free or highly-subsidized (FHS) or fully out-of-pocket paid (FOP) services. Free format answers about the subjects' reasons for selecting a particular clinic were later sub-grouped as: convenient access, good technical aspects, good interpersonal aspects, low or reasonable fees, recommendation by a friend, and no reason. Socio-demographic status was based on background. Data analysis included the chi-square test and logistic regression model. Of the subjects (n = 726), 60% were women and 58% were under 35 years of age. The subjects' mean age was 33.5 years with no difference by gender (P = 0.24) and the majority had public insurance (91%). Of all the subjects, 60% selected FOP. Good interpersonal aspects were the strongest reason for selecting FOP (OR = 4.6), follow by good technical aspects (OR = 2.3). Those subjects who were unaware of their benefit had 4.6 times the odds of selecting FOP. Despite the opportunity to use highly-subsidized dental services, good interpersonal and good technical aspects lead patients to select private dentists and to pay fully out of pocket.

  16. Local dependency in networks

    Directory of Open Access Journals (Sweden)

    Kudĕlka Miloš

    2015-06-01

    Full Text Available Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network’s nodes from the structure in local surroundings of individual nodes. For the tasks we deal with in this article, the key technical parameter is locality. Since only the surroundings of the examined nodes are used in computations, there is no need to analyze the entire network. This allows the application of our approach in the area of large-scale networks. We present several experiments using small networks as well as large-scale artificial and real world networks. The results of the experiments show high effectiveness due to the locality of our approach and also high quality node ranking comparable to PageRank.

  17. Fragility in dynamic networks: application to neural networks in the epileptic cortex.

    Science.gov (United States)

    Sritharan, Duluxan; Sarma, Sridevi V

    2014-10-01

    Epilepsy is a network phenomenon characterized by atypical activity at the neuronal and population levels during seizures, including tonic spiking, increased heterogeneity in spiking rates, and synchronization. The etiology of epilepsy is unclear, but a common theme among proposed mechanisms is that structural connectivity between neurons is altered. It is hypothesized that epilepsy arises not from random changes in connectivity, but from specific structural changes to the most fragile nodes or neurons in the network. In this letter, the minimum energy perturbation on functional connectivity required to destabilize linear networks is derived. Perturbation results are then applied to a probabilistic nonlinear neural network model that operates at a stable fixed point. That is, if a small stimulus is applied to the network, the activation probabilities of each neuron respond transiently but eventually recover to their baseline values. When the perturbed network is destabilized, the activation probabilities shift to larger or smaller values or oscillate when a small stimulus is applied. Finally, the structural modifications to the neural network that achieve the functional perturbation are derived. Simulations of the unperturbed and perturbed networks qualitatively reflect neuronal activity observed in epilepsy patients, suggesting that the changes in network dynamics due to destabilizing perturbations, including the emergence of an unstable manifold or a stable limit cycle, may be indicative of neuronal or population dynamics during seizure. That is, the epileptic cortex is always on the brink of instability and minute changes in the synaptic weights associated with the most fragile node can suddenly destabilize the network to cause seizures. Finally, the theory developed here and its interpretation of epileptic networks enables the design of a straightforward feedback controller that first detects when the network has destabilized and then applies linear state

  18. Community-centred Networks and Networking among Companies, Educational and Cultural Institutions and Research

    DEFF Research Database (Denmark)

    Konnerup, Ulla; Dirckinck-Holmfeld, Lone

    2010-01-01

    This article presents visions for community-centred networks and networking among companies, educational and cultural institutions and research based on blended on- and off-line collaboration and communication. Our point of departure is the general vision of networking between government, industry...... and research as formulated in the Triple Helix Model (Etzkowitz 2008). The article draws on a case study of NoEL, a network on e-learning among business, educational and cultural institutions and research, all in all 21 partners from all around Denmark. Focus is how networks and networking change character......’ in Networked Learning, Wenger et al. 2009; The analysis concerns the participation structure and how the network activities connect local work practices and research, and how technology and online communication contribute to a change from participation in offline and physical network activities into online...

  19. Complex networks-based energy-efficient evolution model for wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhu Hailin [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China)], E-mail: zhuhailin19@gmail.com; Luo Hong [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China); Peng Haipeng; Li Lixiang; Luo Qun [Information Secure Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876 (China)

    2009-08-30

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  20. Complex networks-based energy-efficient evolution model for wireless sensor networks

    International Nuclear Information System (INIS)

    Zhu Hailin; Luo Hong; Peng Haipeng; Li Lixiang; Luo Qun

    2009-01-01

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.