WorldWideScience

Sample records for network clinton nj

  1. Exact computation and large angular momentum asymptotics of 3nj symbols: Semiclassical disentangling of spin networks

    International Nuclear Information System (INIS)

    Anderson, Roger W.; Aquilanti, Vincenzo; Silva Ferreira, Cristiane da

    2008-01-01

    Spin networks, namely, the 3nj symbols of quantum angular momentum theory and their generalizations to groups other than SU(2) and to quantum groups, permeate many areas of pure and applied science. The issues of their computation and characterization for large values of their entries are a challenge for diverse fields, such as spectroscopy and quantum chemistry, molecular and condensed matter physics, quantum computing, and the geometry of space time. Here we record progress both in their efficient calculation and in the study of the large j asymptotics. For the 9j symbol, a prototypical entangled network, we present and extensively check numerically formulas that illustrate the passage to the semiclassical limit, manifesting both the occurrence of disentangling and the discrete-continuum transition.

  2. Clinton, Trump In A Tie.

    Science.gov (United States)

    2016-09-01

    Forty-seven percent of the 432 respondents to our online survey said they plan to vote for Clinton, and the exact same percentage said they intend to vote for Trump. Most respondents thought Trump would do a better job making the system more efficient. A clear majority said that Clinton would do better job limiting cost shifting to consumers.

  3. Astronaut Parazynski greets First Lady Hillary Clinton and Chelsea Clinton

    Science.gov (United States)

    1999-01-01

    First Lady Hillary Rodham Clinton (right) and her daughter, Chelsea, are greeted by NASA Astronaut Scott E. Parazynski (left) upon their arrival at the Skid Strip at Cape Canaveral Air Station to view the launch of Space Shuttle mission STS-93. Liftoff is scheduled for 12:36 a.m. EDT July 20. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes.

  4. Hillary Clinton visits Pathfinder projects in Brazil.

    Science.gov (United States)

    1996-01-01

    In October 1995, US First Lady Hillary Clinton visited a maternity hospital in Salvador, Brazil, in which a family planning (FP)/reproductive health program has been administered by Pathfinder International since 1981 with funding from USAID. During her tour of the facility, Clinton learned about the high degree of unmet need for FP in the region which results from a lack of sufficient resources to meet demand. Clinton, in turn, praised the state of Bahia for its emphasis on FP in low-income areas.

  5. US-Wahl 2016: Hillary Clintons Etappensieg

    OpenAIRE

    Brühwiler, Claudia Franziska

    2016-01-01

    In Philadelphia, dem Geburtsort der amerikanischen Verfassung,wählten die Demokraten Hillary Clinton zur offiziellenPräsidentschaftskandidatin. Allen unerfreulichen Nebengeräuschenzum Trotz: ein Sieg für die Geschichtsbücher.

  6. 33 CFR 80.501 - Tom's River, NJ to Cape May, NJ.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Tom's River, NJ to Cape May, NJ. 80.501 Section 80.501 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY INTERNATIONAL NAVIGATION RULES COLREGS DEMARCATION LINES Fifth District § 80.501 Tom's River, NJ to Cape May, NJ...

  7. 33 CFR 80.170 - Sandy Hook, NJ to Tom's River, NJ.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Sandy Hook, NJ to Tom's River, NJ. 80.170 Section 80.170 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY INTERNATIONAL NAVIGATION RULES COLREGS DEMARCATION LINES Atlantic Coast § 80.170 Sandy Hook, NJ to Tom's River...

  8. OTA director to be Clinton's science advisor

    Science.gov (United States)

    Leath, Audrey

    President Clinton has nominated John H. “Jack” Gibbons to be Assistant to the President for Science and Technology, and director of the White House Office of Science and Technology Policy (OSTP). For over a decade, Gibbons has served as director of the Office of Technology Assessment (OTA), a bipartisan research arm of Congress.In nominating Gibbons, Clinton said, “I am delighted to appoint a brilliant scientist and gifted administrator… It is profoundly important that the president have a science advisor who understands science, who understands technology, who understands the practical application of these disciplines to the myriad of problems we face today. And I can tell you that from [Vice-president] Al Gore on down to every other member of Congress I have discussed John Gibbons with, I have hardly ever received more glowing and more consistent recommendations for anyone.”

  9. US energy taxation and the Clinton administration

    International Nuclear Information System (INIS)

    Verleger, P.K. Jr.; Treat, J.E.; Sieminski, A.E.; Canes, Michael

    1993-01-01

    Energy policy received little attention during the 1992 presidential campaign and was almost totally ignored during the three month interregnum referred to euphemistically as the transition'. Yet the energy sector has taken centre stage in President Clinton's effort to reduce the nation's troubling budget deficit. Half of the revenues generated by the tax programmes included in the economic reform package introduced in mid-February are to be produced by taxes on energy. Some understanding of the director of US energy policy can be derived from the tax, even though the programme has not been put forward as such a policy. Indeed, examination of the supporting administration statements offered as part of the president's programme provides initial insight into the type of energy policy that will be followed by President Clinton. Broadly speaking it appears that the new administration will support environmental programmes so long as jobs are not at stake, promote conservation wherever possible, and do everything possible to encourage greater use of natural gas. Almost by default oil has become the least favoured fuel. At the same time the president seems to prefer policies which have a minimal impact on the consumer. Ultimately, the characteristic of the Clinton energy policy that is most likely to be recalled is pragmatism. (author)

  10. Clinton, Trump, and Higher Education:Where Washington Goes

    OpenAIRE

    Pelletier, Stephen G.

    2016-01-01

    During the time in which Hillary Clinton and Donald Trump vied for the presidency, they took a look at their stances on higher education— and at how federal education policy might play out after the election. This report examines Hillary Clinton and Donald Trump's insights on higher education and the federal policy path that the public agenda could take. American Association of State Colleges and Universities

  11. Hillary Clinton impressed by the Centre's work.

    Science.gov (United States)

    1995-01-01

    In April 1994, US First Lady Hillary Rodham Clinton, her daughter Chelsea, the Bangladesh Minister for Women and Children's Affairs, and the US Ambassador to Bangladesh visited the International Centre for Diarrhoeal Disease Research, Bangladesh (ICDDR,B). The First Lady remarked that ICDDR,B's research programs on health and family planning have many important lessons for the developing and developed regions alike. She noted the development successes in Bangladesh that can be applied in the US and other countries: the Grameen Bank, oral rehydration solution (ORS), and the community outreach programs for health and family planning services. The First Lady was especially interested in ORS and its cost-effectiveness. Most of the 220,000 children hospitalized each year in the US for severe gastrointestinal illness are treated with expensive intravenous (IV) drips (average cost = $2300), while a few ORS packets would be a small fraction of the cost. The average cost of treatment per patient at ICDDR,B was only $12. Patients receive care free of charge. Less than 0.6% of the patients die. The previous year, a USAID administrator asked ICDDR,B for its expertise in fighting cholera at the Rwandan refugee camps in Goma, Zaire. ICDDR,B staff developed diagnostic antisera for the new cholera strain responsible for the epidemic in the Americas, described its pathophysiology, and established its mode of transmission in surface waters. ICDDR,B also provides technical support to the national family planning and maternal and child health programs. In the Matlab, ICDDR,B's work has contributed to a high contraceptive prevalence rate of more than 64% among poor and largely illiterate persons.

  12. Perceived personality and campaign style of Hillary Clinton and Donald Trump

    NARCIS (Netherlands)

    Nai, A.; Maier, J.

    2018-01-01

    75 national and international experts in US politics evaluated the personality reputation of Trump and Clinton. They evaluated Clinton as average on extraversion, agreeableness, openness, narcissism, psychopathy, and Machiavellianism, but high on conscientiousness and emotional stability. Trump was

  13. constNJ: an algorithm to reconstruct sets of phylogenetic trees satisfying pairwise topological constraints.

    Science.gov (United States)

    Matsen, Frederick A

    2010-06-01

    This article introduces constNJ (constrained neighbor-joining), an algorithm for phylogenetic reconstruction of sets of trees with constrained pairwise rooted subtree-prune-regraft (rSPR) distance. We are motivated by the problem of constructing sets of trees that must fit into a recombination, hybridization, or similar network. Rather than first finding a set of trees that are optimal according to a phylogenetic criterion (e.g., likelihood or parsimony) and then attempting to fit them into a network, constNJ estimates the trees while enforcing specified rSPR distance constraints. The primary input for constNJ is a collection of distance matrices derived from sequence blocks which are assumed to have evolved in a tree-like manner, such as blocks of an alignment which do not contain any recombination breakpoints. The other input is a set of rSPR constraint inequalities for any set of pairs of trees. constNJ is consistent and a strict generalization of the neighbor-joining algorithm; it uses the new notion of maximum agreement partitions (MAPs) to assure that the resulting trees satisfy the given rSPR distance constraints.

  14. A Comparative Psychobiography of Hillary Clinton and Condoleezza Rice

    Science.gov (United States)

    Fitch, Trey; Marshall, Jennifer

    2008-01-01

    The purpose of this study was to apply psychobiography to the lives of Hillary Clinton and Condoleezza Rice. Psychobiography can be applied as a method of teaching personality theory and it can also be used as a research method. Most political personas are crafted through 20 second sound bites from the radio, Internet, and television. However, a…

  15. Clinton's 'Medicare for More' Not Such an Easy Cure.

    Science.gov (United States)

    Kirkner, Richard Mark

    2016-07-01

    The politics of "Medicare for more" are daunting. Not only will Clinton have to defeat Donald Trump in November, she will need to pull enough Democrats into the House and Senate with her-and they will have to be the kind of Democrats who are willing to take on the political risks of health care reform.

  16. Clinton, Peck and Frost -- The dawn of North American boletology

    Science.gov (United States)

    Ernst E. Both; Beatriz. Ortiz-Santana

    2010-01-01

    George W. Clinton (a founder and first president of the Buffalo Society of Natural Sciences) launched the mycological career of Peck by obtaining for him the position of botanist of the New York State Cabinet of Natural History and he was responsible for the publication of Frost's "Boleti of New England." This paper discusses the interaction between Peck...

  17. Occurrences of uranium at Clinton, Hunterdon County, New Jersey

    Science.gov (United States)

    McKeown, F.A.; Klemic, H.; Choquette, P.W.

    1954-01-01

    An occurrence of uranium at Clinton, Hunterdon County, N. J. was first brought to the attention of the U.S. Geological Survey when Mr. Thomas L. Eak of Avenel, N. J. submitted to the Survey a sample containing 0.068 percent uranium. Subsequent examinations of the area around Clinton indicated that detailed mapping and study were warranted. The uranium occurrences at Clinton are in or associated with fault zones in the Kittatinny limestone of Cambro-Ordovician age. The limestone generally light gray, thick bedded, and dolomitic; chert is common but not abundant. Regionally and locally, faults are the most significant structural features. The local faults at Clinton are the loci for most of the uranium. The largest fault can be traced for about 700 feet and is radioactive everywhere it crops out. Samples from this fault contain as much as 0.038 percent uranium; the average content is about 0.010 percent uranium. Uranium also occurs disseminated in two 4-inch layers of black feldspathic dolomite and in several zones of residual soil derived from the Kittatinny limestone. The black layers contain as much as 0.046 percent uranium and can be traced only about 20 feet along strike. They are cut by a small fault that is also radioactive. The radioactive soil zones are roughly elongated parallel to bedding. Soil from them contains up to 0.008 percent uranium. The uranium occurrences are best explained by a supergene origin. The sampling, mapping, and radioactivity testing of uranium occurrences at Clinton indicate they are too low grade to be of current economic interest.

  18. Sandia and NJ TRANSIT Authority Developing Resilient Power Grid

    Energy Technology Data Exchange (ETDEWEB)

    Hanley, Charles J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-11-01

    Through the memorandum of understanding between the Depratment of Energy (DOE), the New Jersey Transit Authority (NJ Transit), and the New Jersey Board of Public Utilities, Sandia National Labs is assisting NJ Transit in developing NJ TransitGrid: an electric microgrid that will include a large-scale gas-fired generation facility and distributed energy resources (photovoltaics [PV], energy storage, electric vehicles, combined heat and power [CHP]) to supply reliable power during storms or other times of significant power failure. The NJ TransitGrid was awarded $410M from the Department of Transportation to develop a first-of-its-kind electric microgrid capable of supplying highly-reliable power.

  19. 77 FR 57022 - Drawbridge Operation Regulation; Shark River, Avon, NJ

    Science.gov (United States)

    2012-09-17

    ... Operation Regulation; Shark River, Avon, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation... across the Shark River (South Channel), at Avon Township, NJ. This deviation is necessary to facilitate stringer replacement on the Shark River railroad bridge. This temporary deviation will allow the...

  20. 78 FR 3836 - Drawbridge Operation Regulation; Shark River, Avon, NJ

    Science.gov (United States)

    2013-01-17

    ... Operation Regulation; Shark River, Avon, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of deviation from... and the railroad bridge, mile 0.9 both of which are across the Shark River (South Channel), at Avon Township, NJ. This deviation is necessary to facilitate machinery replacement on the Shark River railroad...

  1. First Lady Hillary Clinton is greeted by NASA Administrator Goldin

    Science.gov (United States)

    1999-01-01

    First Lady Hillary Rodham Clinton and her daughter, Chelsea, are greeted by NASA Administrator Daniel S. Goldin upon their arrival at the Skid Strip at Cape Canaveral Air Station. Next to Gold are (from left) Deputy Director for Business Operations Jim Jennings and Mrs. Goldin. Mrs. Clinton and Chelsea are here to view the launch of Space Shuttle mission STS-93, scheduled for 12:36 a.m. EDT July 20. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five- day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes.

  2. Monitoring radon reduction in Clinton, New Jersey houses

    International Nuclear Information System (INIS)

    Osborne, M.C.; Brennan, T.; Michaels, D.

    1987-01-01

    In 1986, a preliminary survey of houses in Clinton, New Jersey, conducted by the New Jersey Department of Environmental Protection (DEP), identified more than 50 houses with indoor radon concentrations greater than 100 pCi/l in the subdivision of Clinton Knolls. Many of these houses had radon concentrations of 600 pCi/l or higher. At the request of the New Jersey DEP, EPA's Air and Energy Engineering Research Laboratory, AEERL, initiated a project to develop and demonstrate cost-effective radon reduction techniques in 10 representative Clinton Knolls houses. Radon reduction was to be completed before the beginning of the 1986-1987 heating season to keep the exposure of residents to a minimum. Additional data were collected to add to the general body of information on radon transport and its control in houses; however, the data collected in this study were secondary to the pressing need of demonstrating effective radon reduction techniques. The authors describe these techniques and discuss the data on radon transport and control in this project

  3. A Framework for Multifunctional Green Infrastructure Investment in Camden, NJ

    Directory of Open Access Journals (Sweden)

    Kate Zidar

    2017-09-01

    Full Text Available This study demonstrates a decision-support framework for planning Green Infrastructure (GI systems that maximize urban ecosystem services in Camden, NJ. Seven key ecosystem services are evaluated (urban agriculture expansion, combined sewer overflow reduction, heat island reduction, flooding reduction, capacity building/green jobs expansion, fitness expansion, and stress reduction, to produce a normalized value for each service for each drainage sub-basin within the city. Gaps in ecosystem services are then mapped and utilized to geographically prioritize different kinds of multifunctional GI. Conceptual designs are developed for four site typologies: parks, schools, vacant lots, and brownfield sites. For one demonstration site, additional analysis is presented on urban engagement, life cycle cost reduction, and new sources of funding. What results is an integrated, long-term vision where multifunctional GI systems can be readily customized to meet multiple needs within urban communities. This study provides a portable and replicable framework for leveraging the regulatory requirement to manage stormwater to meet broader urban revitalization goals, all through a decentralized network of green infrastructure assets.

  4. Judy Collins shares a laugh with First Lady Hillary Clinton

    Science.gov (United States)

    1999-01-01

    Singer Judy Collins (left) shares a laugh with First Lady Hillary Rodham Clinton in the Apollo/Saturn V Facility. Both women are at KSC to view the launch of Space Shuttle mission STS-93 scheduled for 12:36 a.m. EDT July 20. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. Judy Collins has honored the commander with a song, 'Beyond the Sky,' which was commissioned by NASA through the NASA Art Program.

  5. Clinton administration budget includes mixed bag for science

    Science.gov (United States)

    Showstack, Randy

    The $1,766 trillion federal budget proposal that the Clinton Administration rolled out on February 1—which promises to protect Social Security and Medicare and work within mandated budget caps—generally provides favorable news for federally funded science research and development.Within the 17% ($592 billion) of the federal budget earmarked for discretionary spending, the Administration's budget proposal increases funding for nondefense research and development for the seventh year in a row. This includes increased funding for a number of science accounts and money for a series of new science initiatives.

  6. Gender Differences in the Media Interviews of Bill and Hillary Clinton

    Science.gov (United States)

    Suleiman, Camelia; O'Connell, Daniel

    2008-01-01

    Does gender make a difference in the way politicians speak and are spoken to in public? This paper examines perspective in three television interviews and two radio interviews with Bill Clinton in June 2004 and in three television interviews and two radio interviews with Hillary Clinton in June 2003 with the same interviewers. Our perspectival…

  7. 76 FR 27253 - Safety Zone; Catawba Island Club Fireworks, Catawba Island Club, Port Clinton, OH

    Science.gov (United States)

    2011-05-11

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal...-AA00 Safety Zone; Catawba Island Club Fireworks, Catawba Island Club, Port Clinton, OH AGENCY: Coast... zone in the Captain of the Port Detroit Zone on Lake Erie, Port Clinton, Ohio. This zone is intended to...

  8. These 6 charts show how much sexism Hillary Clinton faces on Twitter

    DEFF Research Database (Denmark)

    Tromble, Rebekah; Hovy, Dirk

    2017-01-01

    As the Democratic presidential primary contest between Hillary Clinton and Bernie Sanders has grown much closer, some commentators suggest that Clinton's campaign is being bombarded with sexist invective - especially from Sanders supporters. But based on systematic analysis of recent Twitter data...

  9. US energy policy under president Clinton. An outlook

    International Nuclear Information System (INIS)

    McCracken, J.E.

    1993-01-01

    During the election, Bill Clinton did speak of four guiding principles that would be behind his energy policy. And they are: increased energy efficiency and conservation, the expanded use of renewable energy sources, the greater use of natural gas, and the establishment of a safe, environmentally-sound energy framework. It is important to remember that President Clinton holds views on nuclear power that are firmly in the mainstream of current American public opinion. The President does not see the need to close down existing plants. There is no talk of a nuclear phase-out in the United States. On the other hand, contrary to past administrations, there will not be a promotion of nuclear power, primarily for two reasons: 1. There is the belief that they are not economically competitive at this time, 2. There is the vaguer notion that people do not want them right now. So, in the short term, nuclear power increasingly will be left to the market place. So ultimately, the fate of nuclear power in the United States will not be determined by the political ideology of the White House's inhabitant, but by the economic competitiveness of the industry. (orig./HSCH)

  10. Dan Goldin chats with First Lady Hillary Clinton

    Science.gov (United States)

    1999-01-01

    At the Apollo/Saturn V Center, NASA Administrator Daniel Goldin (right) chats with First Lady Hillary Rodham Clinton and others while waiting for the launch of STS-93. Much attention has been generated over STS-93 due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. Liftoff of Space Shuttle Columbia is scheduled for 12:36 a.m. EDT July 20.

  11. Clinton pingutab juutide häälte eest / Heiki Suurkask

    Index Scriptorium Estoniae

    Suurkask, Heiki, 1972-

    2008-01-01

    Hillary Clinton teatas, et oleks valmis totaalselt hävitama Iraani, kui see ründaks Iisraeli tuumarelvaga. Juutide lobigrupid pole rahul Barack Obamaga. USA juutidest toetab H. Clintonit 48%, B. Obamat 43%

  12. How Was President Clinton Able to Build a Winning Political Coalition on NAFTA?

    National Research Council Canada - National Science Library

    Llorens, Hugo

    1997-01-01

    .... Congress' decision was an extraordinary triumph for President Clinton who in his first year in office put his political prestige on the line lobbying Congress for an unprecedented trade agreement...

  13. 76 FR 60732 - Drawbridge Operation Regulations; Navesink (Swimming) River, NJ

    Science.gov (United States)

    2011-09-30

    ... Operation Regulations; Navesink (Swimming) River, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of temporary... (Swimming) River between Oceanic and Locust Point, New Jersey. The deviation is necessary to facilitate...: The Oceanic Bridge, across the Navesink (Swimming) River, mile 4.5, between Oceanic and Locust Point...

  14. 78 FR 77591 - Drawbridge Operation Regulation; Shark River, NJ

    Science.gov (United States)

    2013-12-24

    ... Operation Regulation; Shark River, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of deviation from drawbridge... governs the bascule span of the Route 71 Bridge across Shark River (South Channel), mile 0.8, at Belmar... motor seals and instrumentation on the bridge. The Route 71 Bridge across Shark River (South Channel...

  15. 75 FR 13681 - Television Broadcasting Services; Atlantic City, NJ

    Science.gov (United States)

    2010-03-23

    ...] Television Broadcasting Services; Atlantic City, NJ AGENCY: Federal Communications Commission. ACTION: Final... not less than one very high frequency commercial television channel to each State, if technically... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  16. Hillary Clinton Framed - Gender Stereotypes in the Media Coverage of the 2016 United States Presidential Election

    OpenAIRE

    Mjønerud, Ingunn

    2017-01-01

    This thesis empirically examines the manner in which gender shaped the media coverage of the 2016 United States Presidential Election through the news frames that were employed to discuss Hillary Rodham Clinton and her historical candidacy. This is examined by exploring gender stereotypes and how these stereotypes can influence the success of women seeking positions of high power, before analyzing the major news stories surrounding Clinton and her campaign according to this theory. The result...

  17. Autoriaus pozicija JAV prezidento rinkimuose 2016: Donald J. Trump ir Hillary Clinton

    OpenAIRE

    Kivilienė, Kotryna

    2017-01-01

    Stance Taking in US Presidential Election 2016: Donald J. Trump vs Hillary Clinton The key issue of this paper is the way of convincing and/or manipulating through language. As the purpose of political speeches is to convince potential voters, they make the scope of this paper. The aim is to compare the stance expressions such as stance adverbials, stance complement clauses and modal verbs in the speeches of Donald J. Trump and Hillary Clinton, the main candidates of the previous presidential...

  18. How JCAHO, WEDI, ANSI, HCFA, and Hillary Clinton will turn your systems upside down.

    Science.gov (United States)

    Howe, R C

    1994-01-01

    JCAHO, WEDI, ANSI, HCFA, the Clinton Administration health care reform task force, and other local, state, and national organizations are having a major impact on the health care system. Health care providers will become part of larger health care organizations, such as accountable health plans (AHPs), to provide health care services under a managed care or contracted fee-for-service basis. Information systems that were designed under the old health care model will no longer be applicable to the new health care reform system. The new information systems will have to be patient-centered, operate under a managed care environment, and function to handle patients throughout the continuum of care across a multiple-provider organization. The new information system will require extensive network infrastructures operating at high speeds, integration of LANs and WANs across large geographic areas, sophisticated interfacing tools, consolidation of core patient data bases, and consolidation of the supporting IS infrastructure (applications, data centers, staff, etc.). The changes associated with the health care reform initiatives may, indeed, turn current information systems upside down.

  19. 76 FR 53045 - Prevailing Rate Systems; Abolishment of Monmouth, NJ, as a Nonappropriated Fund Federal Wage...

    Science.gov (United States)

    2011-08-25

    ... Monmouth, NJ, as a Nonappropriated Fund Federal Wage System Wage Area AGENCY: U.S. Office of Personnel... Wage System (FWS) wage area and redefine Monmouth County, NJ, to the Burlington, NJ, NAF wage area. These changes are necessary because the closure of Fort Monmouth will leave the Monmouth wage area...

  20. 77 FR 11383 - Prevailing Rate Systems; Abolishment of Monmouth, NJ, as a Nonappropriated Fund Federal Wage...

    Science.gov (United States)

    2012-02-27

    ... Monmouth, NJ, as a Nonappropriated Fund Federal Wage System Wage Area AGENCY: U.S. Office of Personnel... abolish the Monmouth, New Jersey, nonappropriated fund (NAF) Federal Wage System (FWS) wage area and redefine Monmouth County, NJ, to the Burlington, NJ, NAF wage area. These changes are necessary because the...

  1. 78 FR 28139 - Drawbridge Operation Regulation; Tuckahoe River, Between Corbin City and Upper Township, NJ

    Science.gov (United States)

    2013-05-14

    ... Operation Regulation; Tuckahoe River, Between Corbin City and Upper Township, NJ AGENCY: Coast Guard, DHS... River, mile 8.0, between Corbin City and Upper Township, NJ. The deviation is necessary to facilitate... operating schedule, the State Highway Bridge, mile 8.0, between Corbin City and Upper Township, NJ shall...

  2. Policies toward advanced display in the Clinton administration

    Science.gov (United States)

    Hart, Jeffrey A.

    1994-04-01

    The Clinton administration is using its policy toward advanced displays as a test case for making industry-specific policies. They have established a number of criteria for advanced displays that they hope to apply to other industries in the future. For example, they want to support the development of generic technologies through ARPA and NIST, while minimizing the government's role in key business decisions. They want the industry (by which they mean the tool makers, the component assemblers, and the systems firms) to agree internally before they go ahead with their promotional policies. Given the past history of the advanced display industry, especially its disunity in regard to the enforcement of the successful antidumping petition of the Advanced Display Manufacturers Association and to efforts to create the U.S. Display Consortium, these criteria will be hard to meet. Nevertheless, there now appears to be much greater consensus among the three groups than in the past on the need to build indigenous technological capabilities in advanced displays.

  3. Rescuing the nonjet (NJ azimuth quadrupole from the flow narrative

    Directory of Open Access Journals (Sweden)

    Trainor Thomas A.

    2017-01-01

    Full Text Available According to the flow narrative commonly applied to high-energy nuclear collisions a cylindrical-quadrupole component of 1D azimuth angular correlations is conventionally denoted by quantity υ2 and interpreted to represent elliptic flow. Jet angular correlations may also contribute to υ2 data “nonflow” depending on the method used to calculate υ2, but 2D graphical methods are available to insure accurate separation. The nonjet (NJ quadrupole has various properties inconsistent with a flow interpretation, including the observation that NJ quadrupole centrality variation in A-A collisions has no relation to strongly-varying jet modication (“jet quenching” in those collisions commonly attributed to jet interaction with a flowing dense medium. In this presentation I describe isolation of quadrupole spectra from pt-differential υ2(pt data from the RHIC and LHC. I demonstrate that quadrupole spectra have characteristics very different from the single-particle spectra for most hadrons, that quadrupole spectra indicate a common boosted hadron source for a small minority of hadrons that “carry” the NJ quadrupole structure, that the narrow source-boost distribution is characteristic of an expanding thin cylindrical shell (strongly contradicting hydro descriptions, and that in the boost frame a single universal quadrupole spectrum (Lévy distribution on transverse mass mt accurately describes data for several hadron species scaled according to their statistical-model abundances. The quadrupole spectrum shape changes very little from RHIC to LHC energies. Taken in combination those characteristics strongly suggest a unique nonflow (and nonjet QCD mechanism for the NJ quadrupole conventionally represented by υ2.

  4. Rescuing the nonjet (NJ) azimuth quadrupole from the flow narrative

    Science.gov (United States)

    Trainor, Thomas A.

    2017-04-01

    According to the flow narrative commonly applied to high-energy nuclear collisions a cylindrical-quadrupole component of 1D azimuth angular correlations is conventionally denoted by quantity υ2 and interpreted to represent elliptic flow. Jet angular correlations may also contribute to υ2 data "nonflow" depending on the method used to calculate υ2, but 2D graphical methods are available to insure accurate separation. The nonjet (NJ) quadrupole has various properties inconsistent with a flow interpretation, including the observation that NJ quadrupole centrality variation in A-A collisions has no relation to strongly-varying jet modication ("jet quenching") in those collisions commonly attributed to jet interaction with a flowing dense medium. In this presentation I describe isolation of quadrupole spectra from pt-differential υ2(pt) data from the RHIC and LHC. I demonstrate that quadrupole spectra have characteristics very different from the single-particle spectra for most hadrons, that quadrupole spectra indicate a common boosted hadron source for a small minority of hadrons that "carry" the NJ quadrupole structure, that the narrow source-boost distribution is characteristic of an expanding thin cylindrical shell (strongly contradicting hydro descriptions), and that in the boost frame a single universal quadrupole spectrum (Lévy distribution) on transverse mass mt accurately describes data for several hadron species scaled according to their statistical-model abundances. The quadrupole spectrum shape changes very little from RHIC to LHC energies. Taken in combination those characteristics strongly suggest a unique nonflow (and nonjet) QCD mechanism for the NJ quadrupole conventionally represented by υ2.

  5. A Framework for Multifunctional Green Infrastructure Investment in Camden, NJ

    OpenAIRE

    Kate Zidar; Maryse Belliveau-Nance; Anthony Cucchi; Danielle Denk; Andrew Kricun; Shaun O’Rourke; Shudipto Rahman; Sri Rangarajan; Eric Rothstein; Justin Shih; Franco Montalto

    2017-01-01

    This study demonstrates a decision-support framework for planning Green Infrastructure (GI) systems that maximize urban ecosystem services in Camden, NJ. Seven key ecosystem services are evaluated (urban agriculture expansion, combined sewer overflow reduction, heat island reduction, flooding reduction, capacity building/green jobs expansion, fitness expansion, and stress reduction), to produce a normalized value for each service for each drainage sub-basin within the city. Gaps in ecosystem ...

  6. 75 FR 67364 - Decision To Evaluate a Petition To Designate a Class of Employees From Clinton Engineering Works...

    Science.gov (United States)

    2010-11-02

    ... Employees From Clinton Engineering Works in Oak Ridge, TN, To Be Included in the Special Exposure Cohort... evaluate a petition to designate a class of employees from Clinton Engineering Works in Oak Ridge... Compensation Program Act of 2000. The initial proposed definition for the class being evaluated, subject to...

  7. Mashing up, remixing, and contesting the popular memory of Hillary Clinton

    Directory of Open Access Journals (Sweden)

    Amber Davisson

    2016-09-01

    Full Text Available This essay looks at the viral video "Rebel Girl," released in 2015, which was produced by fans of Hillary Clinton. Following the trajectory of the video, one can see the potential for fan mashups to make arguments that subvert dominant narratives of public memory and, conversely, the way the way mainstream media moves to subsume outsider voices.

  8. Student Engagement and Teacher Practices: Using Hillary Clinton's Presidential Campaign for Learning Purposes

    Science.gov (United States)

    Gruber, Sibylle

    2011-01-01

    In this article, I reflect on the pedagogical decisions I made when I taught a course on gendered literacies during the 2008/2009 presidential campaign. I specifically focus on what I term the "Hillary" phenomenon, the media's often negative and unflattering portrayal of presidential candidate Hillary Clinton. I start with a brief…

  9. Mediating Hillary Rodham Clinton: Television News Practices and Image-Making in the Postmodern Age.

    Science.gov (United States)

    Parry-Giles, Shawn J.

    2000-01-01

    Reviews stereotypes of Hillary Rodham Clinton (HRC) in television news. Investigates the significance to image-making of stereotypes, visual deconstruction and reconstruction, close-up shots and spectator positioning, as well as news recycling and repetition. Argues that such strategies reify a mediated collective memory of HRC which is…

  10. The Modern First Lady and Public Policy: From Edith Wilson through Hillary Rodham Clinton.

    Science.gov (United States)

    Black, Allida M.

    2001-01-01

    Discusses the role in and influence on public policy of twentieth century First Ladies including Edith Roosevelt, Helen Taft, Ellen Wilson, Edith Wilson, Florence Harding, Lou Henry Hoover, Eleanor Roosevelt, Jacqueline Kennedy, Lady Bird Johnson, Rosalynn Carter, Nancy Reagan, Barbara Bush, and Hillary Rodham Clinton. (CMK)

  11. 77 FR 69761 - Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA

    Science.gov (United States)

    2012-11-21

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2012-0995] Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Coast Guard has issued a temporary deviation from the...

  12. 76 FR 79066 - Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA

    Science.gov (United States)

    2011-12-21

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2011-1018] Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, Eighth Coast Guard District, has issued a...

  13. 78 FR 76750 - Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA

    Science.gov (United States)

    2013-12-19

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2013-1008] Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA AGENCY: Coast Guard, DHS. ACTION: Notice of deviation from drawbridge regulations. SUMMARY: The Coast Guard has issued a temporary deviation from the...

  14. 75 FR 78162 - Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA

    Science.gov (United States)

    2010-12-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 117 [Docket No. USCG-2010-1084] Drawbridge Operation Regulation; Upper Mississippi River, Clinton, IA AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation from regulations. SUMMARY: The Commander, Eighth Coast Guard District, has issued a...

  15. Clinton lubas isiklikult aidata Eesti üle Euroliidu läve / Priit Pullerits

    Index Scriptorium Estoniae

    Pullerits, Priit, 1965-

    2002-01-01

    USA ekspresident Bill Clinton lubas isiklikult kaasa aidata, et iirlased ütleksid rahvahääletusel Nizza lepingule jah-sõna. Vt. samas küsimusele, kuidas peaks Eesti reageerima Clintoni ettepanekule vastavad Lennart Meri, Siim Kallas, Mart Laar, Gunnar Hololei. Parlamendisaadik

  16. Hillary Clinton takes up defense of U.S. aid for family planning overseas.

    Science.gov (United States)

    Cohen, S A

    1996-12-20

    In November 1996 during her address to the Sixth Conference of Wives of Heads of State and Government of the Americas in La Paz, Colombia, and in her weekly newspaper column, US first lady Hillary Rodham Clinton pledged her own and the Clinton administration's complete support for reversing the severe reduction in funds for the international family planning program imposed by the 104th Congress. This revelation reflected the administration's preparation for a strong and vocal defense of the international family planning program, which will be facing its greatest political test in February 1997. Bolivia has the highest maternal mortality rate in South America, and half the deaths are due to illegal, unsafe abortions. Mrs. Clinton presented a $2.25 million USAID award to a $5 million Pan American Health Organization program that aims to reduce maternal mortality. In her December 3, 1996, column, she used family planning campaigns in Bolivia as an illustration of sensible, cost-effective, and long-term strategies for improving women's health, strengthening families, and reducing the abortion rate. Such programs educate people about the benefits of birth spacing, breast feeding, good nutrition, prenatal and postpartum visits, and safe deliveries. Mrs. Clinton has also visited other poor countries to learn about the special needs and conditions of women's lives. UN Ambassador Madeleine Albright has recently been nominated to be the first female Secretary of State. Many people see her commitment to improving the status of women through development efforts and her recognition of the close relationship between development and diplomacy as encouraging. The concern and commitment of these two powerful women could prove valuable in the upcoming test for international family planning aid. Congress must vote on a resolution to approve Clinton's report that the reduced funding is having a negative impact no later than February 28. If both the House and the Senate pass the

  17. 76 FR 11679 - Drawbridge Operation Regulation; Shark River (South Channel), Belmar, NJ

    Science.gov (United States)

    2011-03-03

    ... Operation Regulation; Shark River (South Channel), Belmar, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of... temporary deviation from the regulations governing the operation of the S71 Bridge across Shark River (South... Bridge, a bascule lift drawbridge, across Shark River (South Channel), at mile 0.8, in Belmar, NJ, has a...

  18. 77 FR 55455 - Foreign-Trade Zone 235-Lakewood, NJ, Authorization of Production Activity, Cosmetic Essence...

    Science.gov (United States)

    2012-09-10

    ... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-31-2012] Foreign-Trade Zone 235--Lakewood, NJ, Authorization of Production Activity, Cosmetic Essence Innovations, LLC, (Fragrance Bottling), Holmdel, NJ Cosmetic Essence Innovations, LLC (CEI) submitted a notification of proposed production activity to the...

  19. 77 FR 26737 - Foreign-Trade Zone 235-Lakewood, NJ: Notification of Proposed Production Activity; Cosmetic...

    Science.gov (United States)

    2012-05-07

    ... DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B-31-2012] Foreign-Trade Zone 235--Lakewood, NJ: Notification of Proposed Production Activity; Cosmetic Essence Innovations, LLC (Fragrance Bottling); Holmdel, NJ Cosmetic Essence Innovations, LLC (CEI) has submitted a notification of proposed production...

  20. Technical Specifications, Clinton Power Station, Unit No. 1 (Docket No. 50-461). Appendix ''A'' to License No. NPF-55

    International Nuclear Information System (INIS)

    1986-09-01

    This report presents information on the technical specifications of the Clinton Unit No. 1 Reactor in the areas of: safety limits and limiting safety system settings; limiting conditions for operation and surveillance requirements; design features; and administrative controls

  1. Astronauts Stefanyshyn-Piper, Lindsey and Currie greet First Lady Hillary Clinton at the Skid Strip

    Science.gov (United States)

    1999-01-01

    First Lady Hillary Rodham Clinton is greeted by Astronauts (from left) Heidemarie M. Stefanyshyn-Piper, Steven W. Lindsey, and Nancy Jane Currie upon Mrs. Clinton's arrival at the Skid Strip at Cape Canaveral Air Station. She and her daughter, Chelsea (far right) are here to view the launch of Space Shuttle mission STS- 93, scheduled for 12:36 a.m. EDT July 20. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes.

  2. First Lady Hillary Clinton returns to KSC for second launch attempt

    Science.gov (United States)

    1999-01-01

    Seated in the Banana Creek viewing site, First Lady Hillary Rodham Clinton appears attentive to the conversation of a fellow spectator. Mrs. Clinton and others are gathered to watch the second launch attempt of STS-93. Moments before the first scheduled launch, July 20, STS-93 was scrubbed at the T-7 second mark in the countdown due to an indication of a high concentration of hydrogen in an aft engine compartment. The reading proved to be a false alarm. The launch was rescheduled for July 22 at 12:28 a.m. Much attention has been generated over STS-93 due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe.

  3. First Lady Hillary Clinton waits for launch at VIP viewing site

    Science.gov (United States)

    1999-01-01

    Among those gathered at the VIP viewing site for the launch of STS-93 are First Lady Hillary Rodham Clinton (center) and Donna Shalala, secretary , Department of Health and Human Services (far right). Also present is Chelsea Clinton. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X-ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes. Liftoff of Space Shuttle Columbia is scheduled for 12:36 a.m. EDT July 20.

  4. Clinton, Diana, ¿dónde se metieron los periódicos serios?

    Directory of Open Access Journals (Sweden)

    Lic. Francisco Javier Acuña Arias

    1999-01-01

    Full Text Available Uno dividió toda la vida los periódicos en dos clases: los amarillistas y los demás. Los demás eran los "serios", es decir, los que uno leía. Pero a raíz del reciente escándalo de Bill Clinton y la cobertura de la muerte aparatosa de Diana de Gales, cabe preguntarse dónde se metieron los periódicos serios. Revistas tan circunspectas como Time y diarios tan reposados como The New York Times se lanzaron a ver quién era más estrepitoso. Total, lo de Clinton no pasó de ser un chisme de pasillo agrandado a crisis de estado por circunstancias picantes.

  5. Issue-handling beats leadership: Issues and Leaders model predicts Clinton will defeat Trump

    Directory of Open Access Journals (Sweden)

    Andreas Graefe

    2016-11-01

    Full Text Available The Issues and Leaders model predicts the national popular two-party vote in US presidential elections from people’s perceptions of the candidates’ issue-handling competence and leadership qualities. In previous elections from 1972 to 2012, the model’s Election Eve forecasts missed the actual vote shares by, on average, little more than one percentage point and thus reduced the error of the Gallup pre-election poll by 30%. This research note presents the model’s forecast prior to the 2016 election, when most polls show that voters view Republican candidate Donald Trump as the stronger leader but prefer the Democrat’s nominee Hillary Clinton when it comes to dealing with the issues. A month prior to Election Day, the model predicts that Clinton will win by four points, gaining 52.0% of the two-party vote.

  6. An Appreciation of Clinton B. Ford and the AAVSO of Fifty Years Ago

    Science.gov (United States)

    Hull, T.

    2012-06-01

    This is a rather personal story about Clinton B. Ford, my boyhood mentor in astronomy, and about the influence of the AAVSO and Clint on my life and career. While much has been written on Clint, this addresses the man, and his kindness. Naturally I joined the AAVSO (a little early, I was fifteen) and attended the AAVSO 50th Annual Meeting at Harvard College Observatory. Remembrance of Clint and the 50th Annual Meeting is given.

  7. Reservoir fracture mapping using microearthquakes: Austin chalk, Giddings field, TX and 76 field, Clinton Co., KY

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, W.S.; Rutledge, J.T.; Gardner, T.L. [SPE, Richardson, TX (United States); Fairbanks, T.D.; Miller, M.E.; Schuessler, B.K. [Los Alamos National Lab., NM (United States)

    1996-11-01

    Patterns of microearthquakes detected downhole defined fracture orientation and extent in the Austin chalk, Giddings field, TX and the 76 field, Clinton Co., KY. We collected over 480 and 770 microearthquakes during hydraulic stimulation at two sites in the Austin chalk, and over 3200 during primary production in Clinton Co. Data were of high enough quality that 20%, 31% and 53% of the events could be located, respectively. Reflected waves constrained microearthquakes to the stimulated depths at the base of the Austin chalk. In plan view, microearthquakes defined elongate fracture zones extending from the stimulation wells parallel to the regional fracture trend. However, widths of the stimulated zones differed by a factor of five between the two Austin chalk sites, indicating a large difference in the population of ancillary fractures. Post-stimulation production was much higher from the wider zone. At Clinton Co., microearthquakes defined low-angle, reverse-fault fracture zones above and below a producing zone. Associations with depleted production intervals indicated the mapped fractures had been previously drained. Drilling showed that the fractures currently contain brine. The seismic behavior was consistent with poroelastic models that predicted slight increases in compressive stress above and below the drained volume.

  8. Application of hydrogeology and groundwater-age estimates to assess the travel time of groundwater at the site of a landfill to the Mahomet Aquifer, near Clinton, Illinois

    Science.gov (United States)

    Kay, Robert T.; Buszka, Paul M.

    2016-03-02

    than or longer than those calculated using site data and ranged from 230 to 580 years.Tritium data from 1996 to 2011 USGS regional sampling of groundwater from domestic wells in the confined part of the Mahomet aquifer—which are 2.5 to about 40 miles from the Clinton site—were compared with site-specific data from a production well at the Clinton site. Tritium-based groundwater-age estimates indicated predominantly pre- 1953 recharge dates for USGS and other prior regional samples of groundwater from domestic wells in the Mahomet aquifer. These results agreed with the tritium-based, pre-1953 recharge age estimated for a groundwater sample and a sequential replicate sample from a production well in the confined part of the Mahomet aquifer beneath the Clinton site.The regional tritium-based groundwater age estimates also were compared with pesticide detections in samples from distal domestic wells in the USGS regional network that are about 2.5 to 40 miles from the Clinton site to identify whether very small amounts of post-1952 recharge have in places reached confined parts of the Mahomet aquifer at locations other than the Clinton site in an approximately 2,000 square mile area of the Mahomet aquifer. Very small amounts of post-1952 recharge were defined in this analysis as less than about 2.5 percent of the total recharge contributing to a groundwater sample, based on results from the two-part mixing analysis of tritium data from the Clinton site. Pesticide-based groundwater-age estimates based on 22 detections of pesticides (13 of these detections were estimated concentrations), including atrazine, deethylatrazine (2-Chloro-4-isopropylamino-6-amino- s-triazine), cyanazine, diazinon, metolachlor, molinate, prometon, and trifluralin in groundwater samples from 10 domestic wells 2.5 to about 40 miles distant from the Clinton site indicate that very small amounts of post-1956 to post-1992 recharge can in places reach the confined part of the Mahomet aquifer in other

  9. Hillary Clinton's visit to Ottawa hospital an exercise in military precision

    Science.gov (United States)

    Gray, Charlotte

    1995-01-01

    The Children's Hospital of Eastern Ontario learned that hosting the wife of the US president is more like a military manoeuvre than a typical VIP visit, but Hillary Rodham Clinton brought a unique perspective on universal health care to the Ottawa hospital. CMAJ Contributing Editor Charlotte Gray, who is also vice-chair of the hospital's board of trustees, recounts the experience of listening to “the sharpest, most intense professor of health care management you've ever met.” Imagesp1299-a

  10. Judy Collins and First Lady Hillary Clinton await the launch of STS-93

    Science.gov (United States)

    1999-01-01

    Singer Judy Collins (left) and First Lady Hillary Rodham Clinton await the launch of Space Shuttle mission STS-93 in the Apollo/Saturn V Facility. Liftoff is scheduled for 12:36 a.m. EDT July 20. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. Judy Collins has honored the commander with a song, 'Beyond the Sky,' which was commissioned by NASA through the NASA Art Program.

  11. Clinton P. Anderson Meson Physics Facility and its operational safety program

    International Nuclear Information System (INIS)

    Putnam, T.M.

    1975-01-01

    The Clinton P. Anderson Meson Physics Facility (LAMPF) at the Los Alamos Scientific Laboratory consists of/ (1) a medium-energy, high-intensity linear proton accelerator; (2) experimental areas designed to support a multidisciplined program of research and practical applications; and (3) support facilities for accelerator operations and the experimental program. The high-intensity primary and secondary beams at LAMPF and the varied research program create many interesting and challenging problems for the Health Physics staff. A brief overview of LAMPF is presented, and the Operational Safety Program is discussed, with emphasis on the radiological safety and health physics aspects

  12. Responsive partisanship: public support for the clinton and obama health care plans.

    Science.gov (United States)

    Kriner, Douglas L; Reeves, Andrew

    2014-08-01

    We examine the contours of support for the Clinton and Obama health care plans during the 1990s and 2000s based on our own compilation of 120,000 individual-level survey responses from throughout the debates. Despite the rise of the Tea Party, and the racialization of health care politics, opinion dynamics are remarkably similar in both periods. Party ID is the single most powerful predictor of support for reform and the president's handling of it. Contrary to prominent claims, after controlling for partisanship, demographic characteristics are at best weak predictors of support for reform. We also show that Clinton and Obama did not "lose" blacks, seniors, or wealthy voters over the course of the debate. The small and often nonexistent relationship between these characteristics and support for the plan are constant over time. Instead, the modest fluctuations in support for reform appear to follow the ebb and flow of elite rhetoric. Both mean levels of support and its volatility over time covary with elite partisan discourse. These findings suggest that presidents courting public opinion should seek consensus among their own party's elites before appealing to other narrower interests. Copyright © 2014 by Duke University Press.

  13. First Lady Hillary Clinton returns to KSC for second launch attempt

    Science.gov (United States)

    1999-01-01

    Entering the Banana Creek viewing site, First Lady Hillary Rodham Clinton is joined by NASA Administrator Daniel Goldin (right), and in the background, Deputy Director of Business Operations Jim Jennings (far left) and Director of Installation Operations Marv Jones (right, behind Goldin). Mrs. Clinton and others are at the site to watch the second launch attempt of STS-93. Moments before the first scheduled launch, July 20, STS-93 was scrubbed at the T-7 second mark in the countdown due to an indication of a high concentration of hydrogen in an aft engine compartment. The reading proved to be a false alarm. The launch was rescheduled for July 22 at 12:28 a.m. Much attention has been generated over STS-93 due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe.

  14. Technical Specifications: Clinton Power Station, Unit No. 1 (Docket No. 50-461): Appendix ''A'' to License No. NPF-62

    International Nuclear Information System (INIS)

    1987-04-01

    The Clinton Power Station, Unit No. 1 Technical Specifications were prepared by the US Nuclear Regulatory Commission to set forth limits, operating conditions, and other requirements applicable to a nuclear reactor facility as set forth in Section 50.36 of 10 CFR 50 for the protection of the health and safety of the public

  15. In the Image of the Great Society: Reinventing K-12 Education in the Clinton Administration. Hudson Briefing Paper, No. 174.

    Science.gov (United States)

    Manno, Bruno V.

    This policy paper, by a former U.S. Assistant Secretary of Education for Policy and Planning, argues that President Clinton and the previous "education Congress" designed a top-down strategy reminiscent of the Great Society programs in the 1960s to reform America's school systems. The resultant educational legislation has occurred at a…

  16. First Lady Hillary Clinton gets ready to speak to group at VIP viewing site

    Science.gov (United States)

    1999-01-01

    In the VIP Lounge, Apollo/Saturn V Center, First Lady Hillary Rodham Clinton gets ready to speak to the group gathered there before the launch of STS-93. At right is NASA Administrator Daniel Goldin. Liftoff of Space Shuttle Columbia is scheduled for 12:36 a.m. EDT July 20. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. The primary payload of the five-day mission is the Chandra X-ray Observatory, which will allow scientists from around the world to study some of the most distant, powerful and dynamic objects in the universe. The new telescope is 20 to 50 times more sensitive than any previous X- ray telescope and is expected to unlock the secrets of supernovae, quasars and black holes.

  17. High-energy neutron dosimetry at the Clinton P. Anderson Meson Physics Facility

    International Nuclear Information System (INIS)

    Mallett, M.W.; Vasilik, D.G.; Littlejohn, G.J.; Cortez, J.R.

    1990-01-01

    Neutron energy spectrum measurements performed at the Clinton P. Anderson Meson Physics Facility indicated potential areas for high energy neutron exposure to personnel. The low sensitivity of the Los Alamos thermoluminescent dosimeter (TLD) to high energy neutrons warranted issuing a NTA dosimeter in addition to the TLD badge to employees entering these areas. The dosimeter consists of a plastic holder surrounding NTA film that has been desiccated and sealed in a dry nitrogen environment. A study of the fading of latent images in NTA film demonstrated the success of this packaging method to control the phenomenon. The Los Alamos NTA dosimeter is characterized and the fading study discussed. 10 refs., 4 figs., 2 tabs

  18. A Psychobiographical and Psycho-Political Comparison of Clinton and Trump.

    Science.gov (United States)

    Elovitz, Paul H

    2016-01-01

    A comparison of the family backgrounds, childhoods, personal lives, personalities, and political views of the Republican and Democratic nominees in the 2016 presidential election. The author is a presidential psychobiographer who has been presenting and publishing on candidates and presidents since 1976. He uses his training in child development and psychoanalysis to demonstrate some of the influences of early development on the candidates’ subsequent lives and careers. The strengths and weaknesses of Hillary Clinton and Donald Trump are discussed. Included in the analysis are family background, childhood, character, coping mechanisms, temperament, role models, foreign policy, health, interpersonal relations, marriage, parenting, and religious views, as well as the appeal and obstacles to election faced by each candidate.

  19. From Mesopotamia through Carroll Quigley to Bill Clinton: World Historical Systems, the Civilizationist, and the President

    Directory of Open Access Journals (Sweden)

    David Wilkinson

    1995-08-01

    Full Text Available The noted comparative civilizationist and world-historical systems analyst Carroll Quigley, whose theorizing rested on the whole historical span from Mesopotamia to the 1960's, was a teacher well-remembered by his student Bill Clinton.  Quigley, by an intensive process of reduction, or rather idealization, of masses of historical data, derived a procedure for the diagnosis and therapy of ailing civilizations/world-systems, especially the one which he inhabited.  The coherent, persistent and personal motifs of the policy discourse and variant initiatives of his student, the President, bear more than a passing resemblance to the hopeful, idealistic, voluntaristic, intellectual, scientific, economistic, demi-materialistic propensities of the civilizationist and teacher.

  20. Local television news coverage of President Clinton's introduction of the Health Security Act.

    Science.gov (United States)

    Dorfman, L; Schauffler, H H; Wilkerson, J; Feinson, J

    1996-04-17

    To investigate how local television news reported on health system reform during the week President Clinton presented his health system reform bill. Retrospective content analysis of the 1342-page Health Security Act of 1993, the printed text of President Clinton's speech before Congress on September 22, 1993, and a sample of local television news stories on health system reform broadcast during the week of September 19 through 25, 1993. The state of California. During the week, 316 television news stories on health system reform were aired during the 166 local news broadcasts sampled. Health system reform was the second most frequently reported topic, second to stories on violent crime. News stories on health system reform averaged 1 minute 38 seconds in length, compared with 57 seconds for violent crime. Fifty-seven percent of the local news stories focused on interest group politics. Compared with the content of the Health Security Act, local news broadcasts devoted a significantly greater portion of their stories to financing, eligibility, and preventive services. Local news stories gave significantly less attention to cost-saving mechanisms, long-term care benefits, and changes in Medicare and Medicaid, and less than 2% of stories mentioned quality assurance mechanisms, malpractice reform, or new public health initiatives. Of the 316 televised news stories, 53 reported on the president's speech, covering many of the same topics emphasized in the speech (financing, organization and administration, and eligibility) and de-emphasizing many of the same topics (Medicare and Medicaid, quality assurance, and malpractice reform). Two percent of the president's speech covered partisan politics; 45% of the local news stories on the speech featured challenges from partisan politicians. Although health system reform was the focus of a large number of local television news stories during the week, in-depth explanation was scarce. In general, the news stories provided

  1. Hazardous Waste Cleanup: Chemical Waste Management of NJ in Newark, New Jersey

    Science.gov (United States)

    Chemical Waste Management of NJ is located at 100 Lister Avenue in Newark, New Jersey. This section of Newark has been industrial since the late 1800s when the marshlands of the Passaic River were filled in with a mixture of coal ash, construction debris

  2. 76 FR 9224 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Science.gov (United States)

    2011-02-17

    ... Operation Regulations; Hackensack River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of... Hackensack River, mile 3.4, at Jersey City, New Jersey. The deviation is necessary to repair structural steel... Bridge, across the Hackensack River at mile 3.4, has a vertical clearance in the closed position of 40...

  3. 76 FR 27250 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Science.gov (United States)

    2011-05-11

    ... Operation Regulations; Hackensack River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of... Hackensack River, mile 3.4, at Jersey City, New Jersey. The deviation is necessary to repair structural steel... Bridge, across the Hackensack River at mile 3.4, has a vertical clearance in the closed position of 40...

  4. 76 FR 47440 - Drawbridge Operation Regulations; Passaic River, Jersey City, NJ

    Science.gov (United States)

    2011-08-05

    ... Operation Regulations; Passaic River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of temporary... deviation from the regulation governing the operation of the Route 1 & 9 Bridge across the Passaic River, mile 1.8, at Jersey City, New Jersey. The deviation is necessary to facilitate bridge painting...

  5. 75 FR 78601 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ, Maintenance

    Science.gov (United States)

    2010-12-16

    ... Operation Regulations; Hackensack River, Jersey City, NJ, Maintenance AGENCY: Coast Guard, DHS. ACTION... 3.1, across the Hackensack River, at Jersey City, New Jersey. Under this temporary deviation a two.... SUPPLEMENTARY INFORMATION: The Witt Penn Bridge, across the Hackensack River at mile 3.1 has a vertical...

  6. 75 FR 16009 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ, Maintenance

    Science.gov (United States)

    2010-03-31

    ... Regulations; Hackensack River, Jersey City, NJ, Maintenance AGENCY: Coast Guard, DHS. ACTION: Notice of..., mile 1.8, across the Hackensack River at Jersey City, New Jersey. This deviation allows the bridge... across the Hackensack River at mile 1.8, at Jersey City, New Jersey, has a vertical clearance in the...

  7. 75 FR 63398 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Science.gov (United States)

    2010-10-15

    ... Operation Regulations; Hackensack River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of... across the Hackensack River, mile 1.8, at Jersey City, New Jersey. The deviation allows the bridge owner... INFORMATION: The Route 1 & 9 Lincoln Highway Bridge, across the Hackensack River, mile 1.8, at Jersey City...

  8. 76 FR 4818 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Science.gov (United States)

    2011-01-27

    ... Operation Regulations; Hackensack River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of... Hackensack River, mile 6.9, at Secaucus, New Jersey. The deviation is necessary for electrical rehabilitation...-9826. SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a...

  9. 75 FR 68704 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Science.gov (United States)

    2010-11-09

    ... Operation Regulations; Hackensack River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of... the Hackensack River, at Secaucus, New Jersey. Under this temporary deviation the bridge may remain in.... SUPPLEMENTARY INFORMATION: The Upper Hack Bridge, across the Hackensack River at mile 6.9 has a vertical...

  10. 76 FR 4819 - Drawbridge Operation Regulations; Passaic River, Jersey City, NJ

    Science.gov (United States)

    2011-01-27

    ... Operation Regulations; Passaic River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of temporary... deviation from the regulation governing the operation of the Route 1 & 9 Bridge across the Passaic River, mile 1.8, at Jersey City, New Jersey. The deviation is necessary for bridge painting. This deviation...

  11. 76 FR 11959 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ, Maintenance

    Science.gov (United States)

    2011-03-04

    ... Operation Regulations; Hackensack River, Jersey City, NJ, Maintenance AGENCY: Coast Guard, DHS. ACTION... 3.1, across the Hackensack River, at Jersey City, New Jersey. The deviation is necessary to perform... River at mile 3.1 has a vertical clearance in the closed position of 35 feet at mean high water and 40...

  12. 78 FR 66266 - Drawbridge Operation Regulations; Hackensack River, Jersey City, NJ

    Science.gov (United States)

    2013-11-05

    ... Regulations; Hackensack River, Jersey City, NJ AGENCY: Coast Guard, DHS. ACTION: Notice of temporary deviation... from the regulations governing the operation of the Path (Railroad) Bridge across the Hackensack River, mile 3.0, at Jersey City, New Jersey. Under this temporary deviation, the bridge may remain in the...

  13. 78 FR 36658 - Safety Zone; Delaware River Waterfront Corp. Fireworks Display, Delaware River; Camden, NJ

    Science.gov (United States)

    2013-06-19

    ... portion of the Delaware River from operating while a fireworks event is taking place. This temporary...-AA00 Safety Zone; Delaware River Waterfront Corp. Fireworks Display, Delaware River; Camden, NJ AGENCY: Coast Guard, DHS. ACTION: Temporary final rule. SUMMARY: The Coast Guard is establishing a temporary...

  14. 75 FR 66795 - Enesco, LLC, Gund Division, Distribution Center, Edison, NJ; Notice of Affirmative Determination...

    Science.gov (United States)

    2010-10-29

    ... Division, Distribution Center, Edison, NJ; Notice of Affirmative Determination Regarding Application for..., Distribution Center, Edison, New Jersey (subject firm). The determination was issued on August 27, 2010. The...). The workers are engaged in activities related to the supply of packaging and distribution services...

  15. 76 FR 11399 - Proposed Amendment to and Establishment of Restricted Areas, Warren Grove; NJ

    Science.gov (United States)

    2011-03-02

    ... that the FAA take this action due to the increased need for aircrew training in high-altitude weapons... increased aircrew training in high altitude weapons delivery tactics. This training requires higher... Grove Range, NJ, in order to raise the maximum altitude of the range from the current 14,000 feet mean...

  16. Scenedesmus sp. NJ-1 isolated from Antarctica: a suitable renewable lipid source for biodiesel production.

    Science.gov (United States)

    Chen, Zhuo; Gong, Yangmin; Fang, Xiantao; Hu, Hanhua

    2012-11-01

    Microalgal lipids are promising alternative feedstocks for biodiesel production. Scenedesmus sp. NJ-1, an oil-rich freshwater microalga isolated from Antarctica, was identified to be a suitable candidate to produce biodiesel in this study. This strain could grow at temperatures ranging from 4 to 35 °C. With regular decrease in nitrate concentration in the medium, large quantities of triacylglycerols accumulated under batch culture conditions detected by thin layer chromatography and BODIPY 505/515 fluorescent staining. Scenedesmus sp. NJ-1 achieved the average biomass productivity of 0.105 g l⁻¹ d⁻¹ (dry weight) and nearly the highest lipid content (35 % of dry cell weight) was reached at day 28 in the batch culture. Neutral lipids accounted for 78 % of total lipids, and C18:1 (n-9), C16:0 were the major fatty acids in total lipids, composing 37 and 20 % of total fatty acids of Scenedesmus sp. NJ-1 grown for 36 days, respectively. These results suggested that Scenedesmus sp. NJ-1 was a good source of microalgal oils for biodiesel production.

  17. The Oil Game: Generating Enthusiasm for Geosciences in Urban Youth in Newark, NJ

    Science.gov (United States)

    Gates, Alexander E.; Kalczynski, Michael J.

    2016-01-01

    A hands-on game based upon principles of oil accumulation and drilling was highly effective at generating enthusiasm toward the geosciences in urban youth from underrepresented minority groups in Newark, NJ. Participating 9th-grade high school students showed little interest in the geosciences prior to participating in the oil game, even if they…

  18. 78 FR 21849 - Television Broadcasting Services; Ely, NV to Middletown Township, NJ

    Science.gov (United States)

    2013-04-12

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-72; RM-11694, DA 13-448] Television Broadcasting Services; Ely, NV to Middletown Township, NJ AGENCY: Federal Communications... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  19. Flood-inundation maps for Lake Champlain in Vermont and in northern Clinton County, New York

    Science.gov (United States)

    Flynn, Robert H.; Hayes, Laura

    2016-06-30

    Digital flood-inundation maps for an approximately100-mile length of Lake Champlain in Addison, Chittenden, Franklin, and Grand Isle Counties in Vermont and northern Clinton County in New York were created by the U.S. Geological Survey (USGS) in cooperation with the International Joint Commission (IJC). The flood-inundationmaps, which can be accessed through the International Joint Commission (IJC) Web site at http://www.ijc.org/en_/, depict estimates of the areal extent flooding correspondingto selected water levels (stages) at the USGS lake gage on the Richelieu River (Lake Champlain) at Rouses Point, N.Y. (station number 04295000). In this study, wind and seiche effects (standing oscillating wave with a long wavelength) were not taken into account and the flood-inundation mapsreflect 11 stages (elevations) for Lake Champlain that are static for the study length of the lake. Near-real-time stages at this lake gage, and others on Lake Champlain, may be obtained on the Internet from the USGS National Water Information System at http://waterdata.usgs.gov/ or the National Weather Service Advanced Hydrologic Prediction Service at http:/water.weather.gov/ahps/, which also forecasts flood hydrographs at the Richelieu River (Lake Champlain) at Rouses Point.Static flood boundary extents were determined for LakeChamplain in Addison, Chittenden, Franklin, and Grand Isle Counties in Vermont and northern Clinton County in New York using recently acquired (2013–2014) lidar (light detection and ranging) and may be referenced to any of the five USGS lake gages on Lake Champlain. Of these five lakgages, USGS lake gage 04295000, Richelieu River (Lake Champlain) at Rouses Point, N.Y., is the only USGS lake gage that is also a National Weather Service prediction location. Flood boundary extents for the Lake Champlain static flood-inundation map corresponding to the May 201 flood(103.2 feet [ft], National Geodetic Vertical Datum [NGVD] 29) were evaluated by comparing these boundary

  20. 77 FR 32394 - Safety Zones: Catawba Island Club Fire Works, Catawba Island Club, Port Clinton, OH; Racing for...

    Science.gov (United States)

    2012-06-01

    ...[deg]51'18.70'' W (NAD 83). This safety zone will be enforced from 9:15 p.m. until 9:45 p.m. on May 27...[deg]51[min]18.70[sec] W (NAD 83). (2) Enforcement period. This safety zone will be enforced between 9...-AA00 Safety Zones: Catawba Island Club Fire Works, Catawba Island Club, Port Clinton, OH; Racing for...

  1. Impact of tobacco industry and other corporations in the defeat of the 1994 Clinton health care plan.

    Science.gov (United States)

    Givel, Michael

    2017-06-21

    The primary reason cited by many scholars for the defeat of the Clinton Administration's 1994 health care reform bill has long been identified as Health Insurance Association of America and National Federation of Independent Businesses opposition to the bill. Given this predominant consensus combined with sizeable proposed funding for the bill by a large tobacco product tax, this manuscript examined what the tobacco industry's role was in whole or part in defeating the Clinton health care bill. This research occurred through crosschecking internal tobacco industry documents and Clinton White House documents. Prior to the passage of the bill, the tobacco industry accepted a compromise of 45 cents per pack increase phased in over five years. Due to this compromise, the industry or third party allies had no role in the ultimate defeat in the bill. The primary reason for the bill's ultimate defeat was general business (but not tobacco industry and third party ally) opposition, the bill running out of time, and conflicting bills. Secondary reasons for the bill's defeat included issues with: employer mandates, high taxes on insurance plans, impacts on medical research and education, Congressional attention to other issues, election year politics, and possible future excise tax possibilities.

  2. Asymptotics of Wigner 3nj-symbols with small and large angular momenta: an elementary method

    International Nuclear Information System (INIS)

    Bonzom, Valentin; Fleury, Pierre

    2012-01-01

    Yu and Littlejohn recently studied in (2011 Phys. Rev. A 83 052114 (arXiv:1104.1499)) some asymptotics of Wigner symbols with some small and large angular momenta. They found that in this regime the essential information is captured by the geometry of a tetrahedron, and gave new formulae for 9j-, 12j- and 15j-symbols. We present here an alternative derivation which leads to a simpler formula, based on the use of the Ponzano–Regge formula for the relevant tetrahedron. The approach is generalized to Wigner 3nj-symbols with some large and small angular momenta, where more than one tetrahedron are needed, leading to new asymptotics for Wigner 3nj-symbols. As an illustration, we present 15j-symbols with one, two and four small angular momenta, and give an alternative formula to Yu’s recent 15j-symbol with three small spins. (paper)

  3. The Types of Argument Structure Used by Hillary Clinton in the CNN Democratic Presidential Debate

    Directory of Open Access Journals (Sweden)

    Anggie Angeline

    2009-01-01

    Full Text Available This qualitative research was conducted to examine the types of argument structure by Hillary Clinton in part one of the CNN Democratic Presidential Debate since Hillary, who had a great deal of experiences in political parties, was supposed to be able to construct convincing arguments that had good argument structures. The theories used to analyze were Bierman and Assali’s (1996, King’s (n.d. and Stanlick’s (2003. The findings showed that there were five types of argument structure used: serial, linked, convergent, divergent, and hybrid argument structures. The linked argument structure was the argument structure used the most frequently in Hillary’s utterances in the debate, while the divergent was the least one. Thus, it could be concluded that Hillary’s speech in the Presidential Debate was quite interesting since she could combine all the five types of argument structure, though the frequency of using them was not the same and it seems that linked argument structure was the most effective strategy for her in arguing about the politic, economy, and social issues.

  4. 18 Million Cracks, but No Cigar: News Media and the Campaigns of Clinton, Palin, and Bachmann

    Directory of Open Access Journals (Sweden)

    Nicole R. Foster Shoaf

    2016-09-01

    Full Text Available Decades of research within political science, political communication, and mass media found pervasive gender biased media coverage of female political candidates. However, recent research suggests that gender stereotypes do not have a consistent effect in all campaign environments and when gender stereotypes are not activated, female candidates are not disadvantaged. As a result, if we see a reduction in reliance on gender stereotypes in the media, female candidates should enjoy a more level playing field. In this analysis, we focus on mass media’s coverage of female candidates in elite executive political races. This study conducts a content analysis of media coverage of three recent women candidates for the United States’ highest executive offices: Senator Hillary Clinton, Congresswoman Michelle Bachmann, and Governor Sarah Palin. Our analysis of newspapers and television news coverage confirms the media do not discuss female and male candidates in neutral terms, but instead fall back onto traditional gender stereotypes and emphasize female candidates’ physical appearances and family roles far more frequently than they do for male candidates. This may, in turn, prime gender stereotypes in voters, impair candidates’ fundraising ability, and limit the electoral ambition of future generations of female candidates.

  5. The ''Clinton-Cataract'' potential of Norfolk County--how significant is it

    Energy Technology Data Exchange (ETDEWEB)

    MacDougal, T A

    1973-01-01

    The greatest impact upon the natural gas industry in Norfolk County by future urbanization, is the increase of potentially new markets for distributing utility. In 1958 Norfolk County was a net exporter of natural gas as it produced 1.479 billion cu ft and only consumed .316 billion for a net export of 1.163 billion cu ft. Thirteen years later in 1971, Norfolk produced 1.797 billion cu ft, 43% of which was supplied from Lake Erie, and consumed 2,900 billion cu ft for a net import of 1.103 billion cu ft. With the increased stress on clean air within the heavy industrial sector, the demand for natural gas as a non-pollutant fuel should increase substantially in the Nanticoke industrial region. Some of the increased demand for natural gas in the 3 market sectors could be met through the development of the 766,712 acres which have not been tested. As an economic spin-off, the improved storage potential of the ''Clinton-Cataract'' reservoirs through high energy fracturing could be utilized as local gas storage reservoirs to meet peak load market demands.

  6. Watershed restoration through remining in the Tangascootack Creek Watershed, Clinton County, Pennsylvania

    International Nuclear Information System (INIS)

    Skema, V.W.; Smith, M.W.; Bisko, D.C.; Dimatteo, M.

    1998-01-01

    The Pennsylvania Department of Environmental Protection and the Pennsylvania Geologic Survey are working together to remediate the effects of acid mine drainage. Remining of previously mined areas is a key component of a comprehensive strategy of improving water quality in polluted watersheds. In this new approach sites will be carefully selected on the basis of remaining coal reserves and overburden characteristics. One of the first watersheds targeted was the Tangascootack Creek watershed located in Clinton County near Lock Haven. The Geologic Survey agreed to provide geologic and coal resource maps for this previously unmapped area. This involved conducting field work examining rock exposures. Five cored holes were drilled, and core was examined to develop a geologic framework. Coals from these holes and from highwalls were chemically tested. Strata overlying the coal seams were analyzed using acid base accounting to determine their potential for generating acidity as well as alkalinity. Additional drill hole data and chemical analyses were collected from cooperating mining companies. This information was used to produce a geologic map showing coal crop lines and structure, coal thickness maps, mined-out area maps, overburden thickness maps, overburden geochemistry maps, strip ratio maps, and to estimate the extent of remaining coal reserves. Several significant geologic features were found in the course of mapping the watershed. One is the extreme variability in coal thickness and character of overburden rock. Another is the degree of relief found to be present on the Mississippian-Pennsylvanian unconformity. It is believed that this feature plays an important role in coal and high aluminum flint clay distribution regionally. And finally is the thick occurrence of Loyalhanna Formation calcareous sandstone which is providing a natural source of carbonate for the neutralization of acid mine drainage

  7. Final environmental statement related to the operation of Clinton Power Station, Unit No. 1. Docket No. 50-461

    International Nuclear Information System (INIS)

    1982-05-01

    This final environmental statement contains the second assessment of the environmental impact associated with operation of Clinton Power Station Unit 1 pursuant to the National Environmental Policy Act of 1969 (NEPA) and 10 CFR Part 51, as amended, of the NRC's regulations. This statement examines: the affected environment, environmental consequences and mitigating actions, and environmental and economic benefits and costs. Land-use and terrestrial- and aquatic-ecological impacts will be small. Air-quality impacts will also be small. However, steam fog from the station's cooling lake has the potential for reducing visibility over nearby roads and bridges. A fog-monitoring program for roads and ridges near the lake has been recommended. Impacts to historic and prehistoric sites will be negligible. Chemical discharges to Lake Clinton and Salt Creek are expected to have no appreciable impacts on water quality under normal conditions and will be required to meet conditions of the station's NPDES permit. The hydrothermal analyses indicate that under certain meteorological conditions (1-in-50-year drought), the plant would have to be operated at reduced power levels in order to meet the thermal standards established by the Illinois Pollution Control Board Order PCB 81-82. The effects of routine operations, energy transmission, and periodic maintenance of rights-of-way and transmission line facilties should not jeopardize any populations of endangered or threatened species. No significant impacts are anticipated from normal operational releases of radioactivity. Contentions associated with environmental issues accepted during the operating-license hearing are related to assessment of effects of low-level radiation. The net socioeconomic effects of the project will be beneficial. The action called for is the issuance of an operating license for Unit 1 of Clinton

  8. Safety Evaluation Report related to the operation of Clinton Power Station, Unit No. 1, Docket No. 50-461

    International Nuclear Information System (INIS)

    1983-05-01

    Supplement No. 2 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc., as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of certain items that had not been resolved at the time of publication of the Safety Evaluation Report and Supplement No. 1

  9. Safety evaluation report related to the operation of Clinton Power Station, Unit No. 1 (Docket No. 50-461)

    International Nuclear Information System (INIS)

    1987-03-01

    Supplement No. 8 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc., as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of items that have been resolved by the staff since Supplement No. 7 was issued

  10. [Effects of different neutralizing agents on succinate production by Actinobacillus succinogenes NJ113].

    Science.gov (United States)

    Yang, Zhuona; Jiang, Min; Li, Jian; Fang, Xiaojiang; Ye, Guizi; Bai, Xuefei; Zheng, Xiaoyu; Wei, Ping

    2010-11-01

    Different neutralizing agents were used as pH controller to investigate their effects on the growth and succinic acid production of Actinobacillus succinogenes NJ113. The fermentation results showed that Ca(OH)2, CaCO3 and NH4OH were not suitable for succinic acid production by A. succinogenes NJ113 because of their negative effects on cell growth. When Na-base was used, cells would flocculate and lump, and due to the sodium ion concentration reaching to a high level, OD660 dropped sharply after 12 h of fermentation. Mg-base was better because there was no significant inhibition by magnesium ion. Two combined neutralizing agents were used to maintain pH level, one with NaOH and Mg(OH)2 while the other with Na2CO3 and Mg(OH)2. The optimum ratios of the combined neutralizing agents were both 1:1 (g:g) when using 100 g/L glucose. When NaOH and Mg(OH)2 were chosen with the ratio of 1:1(g:g), 69.8 g/L of the succinic acid and 74.5% of the yield was obtained.

  11. A Network-Oriented Modeling Approach to Voting Behavior During the 2016 US Presidential Election

    NARCIS (Netherlands)

    Goedschalk, Linford; Treur, J.; Verwolf, Roos; De la Prieta, F

    2017-01-01

    In this paper a network-oriented computational model is presented for voting intentions over time specifically for the race between Donald Trump and Hillary Clinton in the 2016 US presidential election. The focus was on the role of social and mass communication media and the statements made by

  12. Attitudes and practices regarding disposal of liquid nuclear waste at Clinton Laboratories in the very early years: A historical analysis

    International Nuclear Information System (INIS)

    Stow, S.H.

    1996-02-01

    Many previously unreferenced documents show that the management and disposal of the liquid nuclear waste generated at Clinton Labs (which became ORNL after 1948) during the 1940s was performed with the highest degree of integrity and professionalism, contradicting today's perceptions. Even before construction of the laboratories in early 1943, professionals were making plans for the ''safe'' disposal of waste through treatment and dilution at medically prescribed levels into White Oak Creek and the Clinch River; concern for human health permeated all the disposal decisions. Chemical and physical treatment processes were used to remove as much of the activity as possible before release. Environmental and biological monitoring of the surface waters was instituted very early in the disposal history. Information learned at Clinton Labs with regard to waste disposal was transferred to Hanford. By the latter part of the 1940s, the scientists were formulating fairly sophisticated research programs for managing liquid waste and began research on the disposal of low-level solid waste. This historical analysis attempts to place the actions of the 1940s in proper perspective, drawing on the attentiveness and integrity of those who participated 50 years ago. Applying standards of the 1990s to actions in the 1940s must be done skilfully, carefully, and with the realization that those individuals were operating under extremely trying conditions, with minimal knowledge of radionuclide behavior

  13. El discurso geopolítico práctico del gobierno Clinton: de la narcodemocracia al Plan Colombia

    Directory of Open Access Journals (Sweden)

    Mario Iván Urueña Sánchez

    2015-01-01

    Full Text Available Este artículo se pregunta por los factores que llevaron a la reformulación del discurso geopolítico práctico del gobierno de Bill Clinton hacia Colombia durante la transición política de los gobiernos de Ernesto Samper y Andrés Pastrana. Se plantea como hipótesis que dichos factores fueron el cambio de modelo decisional de la Casa Blanca, la victoria republicana en las elecciones legislativas de 1994 y la voluntad política del presidente Pastrana. La innovación del enfoque propuesto radica en el uso de la teoría de la geopolítica crítica para evaluar los aspectos ideales, institucionales y materiales de la política exterior de Clinton, llegando a la conclusión que dicha reformulación fue más significativa en los dos primeros, mientras que en el último se dio más bien una continuidad operativa.

  14. El discurso geopolítico práctico del gobierno Clinton: de la narcodemocracia al Plan Colombia

    Directory of Open Access Journals (Sweden)

    Mario Iván Urueña Sánchez

    2015-12-01

    Full Text Available Este artículo se pregunta por los factores que llevaron a la reformulación del discurso geopolítico práctico del gobierno de Bill Clinton hacia Colombia durante la transición política de los gobiernos de Ernesto Samper y Andrés Pastrana. Se plantea como hipótesis que dichos factores fueron el cambio de modelo decisional de la Casa Blanca, la victoria republicana en las elecciones legislativas de 1994 y la voluntad política del presidente Pastrana. La innovación del enfoque propuesto radica en el uso de la teoría de la geopolítica crítica para evaluar los aspectos ideales, institucionales y materiales de la política exterior de Clinton, llegando a la conclusión que dicha reformulación fue más significativa en los dos primeros, mientras que en el último se dio más bien una continuidad operativa.

  15. An annotated index to species and intraspecific taxa of boletes (Mycota: Boletales: Boletaceae) in the Clinton herbarium of the Buffalo Society of Natural Sciences

    Science.gov (United States)

    Ernst E. Both; Beatriz. Ortiz-Santana

    2012-01-01

    The Bolete Collection of the Clinton Herbarium (BUF) was started in 1968 by the senior author at the suggestion of then museum director Fred T. Hall. Collecting continued for the next forty years, resulting in some 3,500 collections representing 210 species of boletes. While the bulk of the collections are from the northeastern states, collections from adjacent states...

  16. Optical fiber link for transmission of 1-nJ femtosecond laser pulses at 1550 nm

    DEFF Research Database (Denmark)

    Eichhorn, Finn; Olsson, Rasmus Kjelsmark; Buron, Jonas Christian Due

    2010-01-01

    We report on numerical and experimental characterization of the performance of a fiber link optimized for the delivery of sub-100-fs laser pulses at 1550 nm over several meters of fiber. We investigate the power handling capacity of the link, and demonstrate all-fiber delivery of 1-nJ pulses over...... a distance of 5.3 m. The fiber link consists of dispersion-compensating fiber (DCF) and standard single-mode fiber. The optical pulses at different positions in the fiber link are measured using frequency-resolved optical gating (FROG). The results are compared with numerical simulations of the pulse...... propagation based on the generalized nonlinear Schrödinger equation. The high input power capacity of the fiber link allows the splitting and distribution of femtosecond pulses to an array of fibers with applications in multi-channel fiber-coupled terahertz time-domain spectroscopy and imaging systems. We...

  17. Do Affordable Housing Projects Harm Suburban Communities? Crime, Property Values, and Taxes in Mount Laurel, NJ.

    Science.gov (United States)

    Albright, Len; Derickson, Elizabeth S; Massey, Douglas S

    2013-06-01

    This paper offers a mixed-method analysis of the municipal-level consequences of an affordable housing development built in suburban New Jersey. Opponents of affordable housing development often suggest that creating affordable housing will harm surrounding communities. Feared consequences include increases in crime, declining property values, and rising taxes. To evaluate these claims, the paper uses the case of Mt. Laurel, NJ - the site of a landmark affordable housing legal case and subsequent affordable housing development. Employing a multiple time series group control design, we compare crime rates, property values, and property taxes in Mt. Laurel to outcomes in similar nearby municipalities that do not contain comparable affordable housing developments. We find that the opening of the affordable housing development was not associated with trends in crime, property values, or taxes, and discuss management practices and design features that may have mitigated potential negative externalities.

  18. Workplace Violence and Training Required by New Legislation Among NJ Nurses.

    Science.gov (United States)

    Ridenour, Marilyn Lou; Hendricks, Scott; Hartley, Daniel; Blando, James D

    2017-04-01

    The aim of this study was to examine nurses' knowledge of the state of New Jersey (NJ) Violence Prevention in Health Care Facilities Act, workplace violence training, and experience with workplace violence. In 2013, 309 (22.5% response rate) nurses returned a mailed survey. Univariate and multivariate analyses were conducted. Ninety percent of respondents were female. When the perpetrator was a patient or a family member, the respondents experienced verbal abuse the most (57.8%), followed by threats (52.3%), and physical assault (38.3%). Respondents who had heard of the regulation (89.6%) received a higher proportion of training than those who had not heard of the regulation (57.9%) (P workplace violence.

  19. Sedimentation and occurrence and trends of selected nutrients, other chemical constituents, and cyanobacteria in bottom sediment, Clinton Lake, northeast Kansas, 1977-2009

    Science.gov (United States)

    Juracek, Kyle E.

    2011-01-01

    A combination of available bathymetric-survey information and bottom-sediment coring was used to investigate sedimentation and the occurrence of selected nutrients (total nitrogen and total phosphorus), organic and total carbon, 25 trace elements, cyanobacterial akinetes, and the radionuclide cesium-137 in the bottom sediment of Clinton Lake, northeast Kansas. The total estimated volume and mass of bottom sediment deposited from 1977 through 2009 in the conservation (multi-purpose) pool of the reservoir was 438 million cubic feet and 18 billion pounds, respectively. The estimated sediment volume occupied about 8 percent of the conservation-pool, water-storage capacity of the reservoir. Sedimentation in the conservation pool has occurred about 70 percent faster than originally projected at the time the reservoir was completed. Water-storage capacity in the conservation pool has been lost to sedimentation at a rate of about 0.25 percent annually. Mean annual net sediment deposition since 1977 in the conservation pool of the reservoir was estimated to be 563 million pounds per year. Mean annual net sediment yield from the Clinton Lake Basin was estimated to be 1.5 million pounds per square mile per year. Typically, the bottom sediment sampled in Clinton Lake was at least 99 percent silt and clay. The mean annual net loads of total nitrogen and total phosphorus deposited in the bottom sediment of Clinton Lake were estimated to be 1.29 million pounds per year and 556,000 pounds per year, respectively. The estimated mean annual net yields of total nitrogen and total phosphorus from the Clinton Lake Basin were 3,510 pounds per square mile per year and 1,510 pounds per square mile per year, respectively. Throughout the history of Clinton Lake, total nitrogen concentrations in the deposited sediment generally were uniform and indicated consistent inputs to the reservoir over time. Likewise, total phosphorus concentrations in the deposited sediment generally were uniform

  20. Model Refinement and Simulation of Groundwater Flow in Clinton, Eaton, and Ingham Counties, Michigan

    Science.gov (United States)

    Luukkonen, Carol L.

    2010-01-01

    A groundwater-flow model that was constructed in 1996 of the Saginaw aquifer was refined to better represent the regional hydrologic system in the Tri-County region, which consists of Clinton, Eaton, and Ingham Counties, Michigan. With increasing demand for groundwater, the need to manage withdrawals from the Saginaw aquifer has become more important, and the 1996 model could not adequately address issues of water quality and quantity. An updated model was needed to better address potential effects of drought, locally high water demands, reduction of recharge by impervious surfaces, and issues affecting water quality, such as contaminant sources, on water resources and the selection of pumping rates and locations. The refinement of the groundwater-flow model allows simulations to address these issues of water quantity and quality and provides communities with a tool that will enable them to better plan for expansion and protection of their groundwater-supply systems. Model refinement included representation of the system under steady-state and transient conditions, adjustments to the estimated regional groundwater-recharge rates to account for both temporal and spatial differences, adjustments to the representation and hydraulic characteristics of the glacial deposits and Saginaw Formation, and updates to groundwater-withdrawal rates to reflect changes from the early 1900s to 2005. Simulations included steady-state conditions (in which stresses remained constant and changes in storage were not included) and transient conditions (in which stresses changed in annual and monthly time scales and changes in storage within the system were included). These simulations included investigation of the potential effects of reduced recharge due to impervious areas or to low-rainfall/drought conditions, delineation of contributing areas with recent pumping rates, and optimization of pumping subject to various quantity and quality constraints. Simulation results indicate

  1. 78 FR 11099 - Safety Zone Within the Lower Portion of Anchorage #9, Mantua Creek Anchorage; Paulsboro, NJ

    Science.gov (United States)

    2013-02-15

    ... 1625-AA00 Safety Zone Within the Lower Portion of Anchorage 9, Mantua Creek Anchorage; Paulsboro, NJ... temporary safety zone around the southern one-third of Anchorage 9 (Mantua Creek Anchorage), below position 39[deg] 51.573 N-075[deg] 13.557 W due to dredging operations. The Dredge Florida will be working...

  2. Calculation of displacement and helium production at the Clinton P. Anderson Los Alamos Meson Physics Facility (LAMPF) irradiation facility

    International Nuclear Information System (INIS)

    Wechsler, M.S.; Davidson, D.R.; Greenwood, L.R.; Sommer, W.F.

    1984-01-01

    CT: Differential and total displacement and helium production rates are calculated for copper irradiated by spallation neutrons and 760 MeV protons at the Clinton P. Anderson Los Alamos Meson Physics Facility (LAMPF). The calculations are performed using the SPECTER and VNMTC computer codes, the latter being specially designed for spallation radiation damage calculations. For comparison, similar SPECTER calculations are also described for irradiation of copper in EBR-II and RTNS-II. The results indicate substantial contributions to the displacement and helium production rates due to neutrons in the high-energy tail (above 20 MeV) of the LAMPF spallation neutron spectrum. Still higher production rates are calculated for irradiations in the direct proton beam. These results will provide useful background information for research to be conducted at a new irradiation facility at LAMPF

  3. U.S. Foreign Policy in Clinton and Trump’s presidential campaign. Discourses on ISIS in the media

    Directory of Open Access Journals (Sweden)

    Isabel Rodríguez Toribio

    2017-11-01

    Full Text Available During the last Race for the White House in the United States of America, ISIS terrorism has become the main concern among public opinion (Gallup, 2015. This issue has also been the most significant topic addressed in the campaign speeches on foreign policy. This article analyses Trump and Clinton’s discourses on ISIS within the media framework, as well as how this terrorist group and its acts are social constructed in the speeches. A qualitative methodology has been used. News published in the U.S. digital media, between November 2015 and February 2016, have been analysed through the critical discourse analysis theory. The main results of this research show how Trump has practiced a strategy based on provocation, discrimination and populism while Clinton has followed a much more argumentative and emotional path.

  4. The Social Life of Social Networks

    DEFF Research Database (Denmark)

    Robertson, Scott P.; Vatrapu, Ravi; Medina, Richard

    2009-01-01

    dialogues wished to send other participants. We show a strong integration of the Web 2.0 and new media technologies of social networking, online video, and blogs. Outside of video content, users tended to direct others to groups and applications within the Facebook community, but this homophilous behavior......This paper examines the linkage patterns of people who posted links on the Facebook “walls” of Barack Obama, Hillary Clinton, and John McCain over two years prior to the 2008 U.S. Presidential election. Linkage patterns indicate the destinations to which participants in these social networking...

  5. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  6. 256 fs, 2 nJ soliton pulse generation from MoS2 mode-locked fiber laser

    Science.gov (United States)

    Jiang, Zike; Chen, Hao; Li, Jiarong; Yin, Jinde; Wang, Jinzhang; Yan, Peiguang

    2017-12-01

    We demonstrate an Er-doped fiber laser (EDFL) mode-locked by a MoS2 saturable absorber (SA), delivering a 256 fs, 2 nJ soliton pulse at 1563.4 nm. The nonlinear property of the SA prepared by magnetron sputtering deposition (MSD) is measured with a modulation depth (MD) of ∼19.48% and a saturable intensity of 4.14 MW/cm2. To the best of our knowledge, the generated soliton pulse has the highest pulse energy of 2 nJ among the reported mode-locked EDFLs based on transition metal dichalcogenides (TMDs). Our results indicate that MSD-grown SAs could offer an exciting platform for high pulse energy and ultrashort pulse generation.

  7. Self-presentation and Discreditation – the Key Strategies of the Preelection Political Discourse (as Exemplified in the Pre-election Tweets of D. Trump and H. Clinton

    Directory of Open Access Journals (Sweden)

    Diana S. Sergeeva

    2017-10-01

    Full Text Available The strategy of self-presentation and discreditation are considered as the main strategies of the pre-election virtual discourse. The language units, used at tactics realization of communicative strategies, promote necessary political image formation during the election campaign. Tactics of «incrimination» (strategy of discreditation is frequently used in D. Trump’s tweets, whereas H. Clinton prefers tactics «consolidation» (strategy of selfpresentation.

  8. Exceptionnalisme et impérialisme dans le discours de politique étrangère américain des années Clinton Exceptionalism and Imperialism in US Foreign Policy Discourse: The Clinton Years

    Directory of Open Access Journals (Sweden)

    Frédéric Heurtebize

    2009-10-01

    Full Text Available The United States has to a great extent asserted itself as a nation through the victories of its military and, even more so perhaps, through binary oppositions: democratic republic vs. British monarchy, progress vs. barbarity, capitalism vs. Communism, freedom vs. tyranny or, more recently, terror, to name but a few. This article examines the discourse and arguments elaborated throughout the Clinton presidency by politicians and academics to shape and legitimize U.S. foreign policy in peace time. What ideological justifications could underpin the maintenance or strengthening of the U.S. presence worldwide once the Soviet threat had vanished and yet before the dramatic eruption of terrorism in New York and Washington? How to redefine the country’s mission and its national interest? Did America’s exceptionalist rhetoric survive between the end of the Cold War and 9/11? It may be easy to focus the energy and attention of a nation on a clearly identified enemy; but what can be done or said when there is no clearly recognizable target? In other words, are exceptionalism and imperialism intrinsic features of American identity or are they just products of adversity?

  9. “Let Me Tell You...”: Audience Engagement Strategies in the Campaign Speeches of Trump, Clinton, and Sanders

    Directory of Open Access Journals (Sweden)

    Джастин Куам

    2016-12-01

    Full Text Available Throughout the 2016 campaign, presidential candidate Donald Trump surprised observers with his ability to maintain his popularity in the face of unorthodox and often offensive statements. Trump likely bolstered his electoral chances by appealing to a large segment of voters with whom other candidates failed to align themselves. To quote one news anchor, “People tried to attack Trump; it just didn’t work - voters liked him anyway”. As previous work by Miller (2002; 2004 has shown, systemic functional linguistic (SFL analysis (Halliday & Matthiessen, 2004 can illuminate particular strategies politicians employ to strengthen their arguments and exhort their audiences to join their efforts. In this paper, we employ the SFL-based Engagement framework (White, 2003; Martin & White, 2005 to examine ways in which the 2016 presidential candidates aligned themselves with their audiences. Our analysis of the speeches of Donald Trump, Hillary Clinton, and Bernie Sanders reveals markedly different patterns of interaction with the voters in terms of ways expansive and contractive dialogic strategies are used, an intended audience is identified and thematized, and shared assumptions are made. While Trump makes his arguments in a highly constrained dialogic space, taking the agreement with the audience for granted, his opponents often employ a mix of contractive and expansive argumentative strategies and make more explicit overtures to the audiences whose perspectives they share. This study offers insights as to how each candidate identifies and addresses his or her ideological sympathizers or opponents and exhorts the former to intensify their support.

  10. Using group consciousness theories to understand political activism: case studies of Barack Obama, Hillary Clinton, and Ingo Hasselbach.

    Science.gov (United States)

    Duncan, Lauren E

    2010-12-01

    I describe and integrate several theories of group consciousness and collective action, along with 3 case studies of political activists. I have 2 goals: (1) to use the theories to help us understand something puzzling about each life and (2) to use the cases to complicate and expand the theories. Barack Obama's case raises the question of how someone with a politicized Black identity evolved into a politician working for all oppressed people and complicates racial identity development theory. Hillary Clinton's case raises the question of how a middle-class White girl raised in a conservative family became a prominent Democratic Party politician and complicates group consciousness theories by demonstrating the importance of generation and personality. Ingo Hasselbach's (a former German neo-Nazi leader) case illustrates relative deprivation theory and raises the question of whether theories developed to explain subordinate group consciousness can be applied to movements of dominant group consciousness. © 2010 The Author. Journal of Personality © 2010, Wiley Periodicals, Inc.

  11. Differentiating Between Donald Trump and Hillary Clinton Voters Using Facets of Right-Wing Authoritarianism and Social-Dominance Orientation.

    Science.gov (United States)

    Crowson, Howard Michael; Brandes, Joyce A

    2017-06-01

    Historically, much of the research on right-wing authoritarianism and social dominance orientation has proceeded from the assumption that they are unidimensional. Recently, researchers have begun to seriously consider the possibility that they are multidimensional in nature and should be measured as such. Several studies have examined the unique relationships between right-wing authoritarianism and social dominance orientation facets and social and political outcome measures of interest. However, there have been no efforts to include the full slate of right-wing authoritarianism and social dominance orientation facets as predictors in the same model. This is problematic when investigating the discriminant validity of these facets, given the potential empirical overlap among the facets both within and across scales. We included facets of right-wing authoritarianism and social dominance orientation as predictors of U.S. voters' intentions to vote for Hillary Clinton versus Donald Trump in the 2016 Presidential Election. Data were collected in September 2016. We found evidence for the discriminant validity of several of the right-wing authoritarianism and social dominance orientation facets.

  12. Validation of Twitter opinion trends with national polling aggregates: Hillary Clinton vs Donald Trump.

    Science.gov (United States)

    Bovet, Alexandre; Morone, Flaviano; Makse, Hernán A

    2018-06-06

    Measuring and forecasting opinion trends from real-time social media is a long-standing goal of big-data analytics. Despite the large amount of work addressing this question, there has been no clear validation of online social media opinion trend with traditional surveys. Here we develop a method to infer the opinion of Twitter users by using a combination of statistical physics of complex networks and machine learning based on hashtags co-occurrence to build an in-domain training set of the order of a million tweets. We validate our method in the context of 2016 US Presidential Election by comparing the Twitter opinion trend with the New York Times National Polling Average, representing an aggregate of hundreds of independent traditional polls. The Twitter opinion trend follows the aggregated NYT polls with remarkable accuracy. We investigate the dynamics of the social network formed by the interactions among millions of Twitter supporters and infer the support of each user to the presidential candidates. Our analytics unleash the power of Twitter to uncover social trends from elections, brands to political movements, and at a fraction of the cost of traditional surveys.

  13. Investigating the metabolic capabilities of Mycobacterium tuberculosis H37Rv using the in silico strain iNJ661 and proposing alternative drug targets

    Directory of Open Access Journals (Sweden)

    Palsson Bernhard Ø

    2007-06-01

    Full Text Available Abstract Background: Mycobacterium tuberculosis continues to be a major pathogen in the third world, killing almost 2 million people a year by the most recent estimates. Even in industrialized countries, the emergence of multi-drug resistant (MDR strains of tuberculosis hails the need to develop additional medications for treatment. Many of the drugs used for treatment of tuberculosis target metabolic enzymes. Genome-scale models can be used for analysis, discovery, and as hypothesis generating tools, which will hopefully assist the rational drug development process. These models need to be able to assimilate data from large datasets and analyze them. Results: We completed a bottom up reconstruction of the metabolic network of Mycobacterium tuberculosis H37Rv. This functional in silico bacterium, iNJ661, contains 661 genes and 939 reactions and can produce many of the complex compounds characteristic to tuberculosis, such as mycolic acids and mycocerosates. We grew this bacterium in silico on various media, analyzed the model in the context of multiple high-throughput data sets, and finally we analyzed the network in an 'unbiased' manner by calculating the Hard Coupled Reaction (HCR sets, groups of reactions that are forced to operate in unison due to mass conservation and connectivity constraints. Conclusion: Although we observed growth rates comparable to experimental observations (doubling times ranging from about 12 to 24 hours in different media, comparisons of gene essentiality with experimental data were less encouraging (generally about 55%. The reasons for the often conflicting results were multi-fold, including gene expression variability under different conditions and lack of complete biological knowledge. Some of the inconsistencies between in vitro and in silico or in vivo and in silico results highlight specific loci that are worth further experimental investigations. Finally, by considering the HCR sets in the context of known

  14. Role Models and Mentors in Mid-Pipeline Retention of Geoscience Students, Newark, NJ

    Science.gov (United States)

    Gates, A. E.; Kalczynski, M. J.

    2012-12-01

    Undergraduate minority students retained enthusiasm for majoring in the geosciences by a combination of working with advanced minority mentors and role models as well as serving as role models for middle and high school students in Geoscience Education programs in Newark, NJ. An academic year program to interest 8-10th grade students from the Newark Public schools in the Geosciences employs minority undergraduate students from Rutgers University and Essex Community College as assistants. There is an academic year program (Geoexplorers) and a science festival (Dinosaur Day) at the Newark Museum that employs Rutgers University students and a summer program that employs Rutgers and Essex Community College students. All students are members of the Garden State LSAMP and receive any needed academic support from that program. The students receive mentoring from minority graduate students, project personnel and participating Newark Public School teachers, many of whom are from minority groups. The main factor in success and retention, however, is their role as authorities and role models for the K-12 students. The assistants are respected and consulted by the K-12 students for their knowledge and authority in the geosciences. This positive feedback shows them that they can be regarded as geoscientists and reinforces their self-image and enthusiasm. It further reinforces their knowledge of Geoscience concepts. It also binds the assistants together into a self-supporting community that even extends to the non-participating minority students in the Rutgers program. Although the drop-out rate among minority Geoscience majors was high (up to 100%) prior to the initiation of the program, it has dropped to 0% over the past 3 years with 2 participants now in PhD programs and 2 others completing MS degrees this year. Current students are seriously considering graduate education. Prior to this program, only one minority graduate from the program continued to graduate school in the

  15. Reconstruction of the PETM onset from single specimen analyses of foraminiferal stable isotopes at Medford, NJ

    Science.gov (United States)

    Makarova, M.; Miller, K. G.; Wright, J. D.

    2017-12-01

    deepest water Bass River core, NJ with newly generated lithologic and single specimen isotopic data at most proximal Medford. This allows high resolution reconstruction of the PETM onset at marginal depositional settings along the New Jersey paleoshelf: from 25 m at Medford to over 100 m at Bass River.

  16. 650-nJ pulses from a cavity-dumped Yb:fiber-pumped ultrafast optical parametric oscillator

    Science.gov (United States)

    Lamour, Tobias P.; Reid, Derryck T.

    2011-08-01

    Sub-250-fs pulses with energies of up to 650 nJ and peak powers up to 2.07 MW were generated from a cavity-dumped optical parametric oscillator, synchronously-pumped at 15.3 MHz with sub-400-fs pulses from an Yb:fiber laser. The average beam quality factor of the dumped output was M2 ~1.2 and the total relative-intensity noise was 8 mdBc, making the system a promising candidate for ultrafast laser inscription of infrared materials.

  17. Safety evaluation report related to the operation of Clinton Power Station, Unit No. 1 (Docket No. 50-461). Suppl. 3

    International Nuclear Information System (INIS)

    1984-05-01

    Supplement No. 3 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc., as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of certain items that had not been resolved at the time of publication of the Safety Evaluation Report and Supplements No. 1 and 2

  18. Safety Evaluation Report related to the operation of Clinton Power Station, Unit No. 1 (Docket No. 50-461). Supplement No. 6

    International Nuclear Information System (INIS)

    1986-07-01

    Supplement No. 6 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc., as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of items that have been resolved by the staff since Supplement No. 5 was issued

  19. Safety evaluation report related to the operation of Clinton Power Station, Unit No. 1 (Docket No. 50-461). Supplement No. 5

    International Nuclear Information System (INIS)

    1986-01-01

    Supplement No. 5 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc. as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of items that have been resolved by the staff since supplement No. 4 was issued

  20. Safety Evaluation Report related to the operation of Clinton Power Station, Unit No. 1 (Docket No. 50-461). Supplement No. 7

    International Nuclear Information System (INIS)

    1986-09-01

    Supplement No. 7 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc., as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of items that have been resolved by the staff since Supplement No. 6 was issued

  1. Safety Evaluation Report related to the operation of Clinton Power Station, Unit No. 1 (Docket No. 50-461). Supplement No. 4

    International Nuclear Information System (INIS)

    1985-02-01

    Supplement No. 4 to the Safety Evaluation Report on the application filed by Illinois Power Company, Soyland Power Cooperative, Inc., and Western Illinois Power Cooperative, Inc., as applicants and owners, for a license to operate the Clinton Power Station, Unit No. 1, has been prepared by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission. The facility is located in Harp Township, DeWitt County, Illinois. This supplement reports the status of items that have been resolved by the staff since Supplement No. 3 was issued

  2. Comparison of vesicular-arbuscular mycorrhizae in plants from disturbed and adjacent undisturbed regions of a coastal salt marsh in Clinton, Connecticut, USA

    Science.gov (United States)

    Cooke, John C.; Lefor, Michael W.

    1990-01-01

    Roots of salt marsh plant species Spartina alterniflora, S. patens, Distichlis spicata, and others were examined for the presence of vesicular-arbuscular mycorrhizal (VAM) fungi. Samples were taken from introduced planted material in a salt marsh restoration project and from native material in adjacent marsh areas along the Indian River, Clinton, Connecticut, USA. After ten years the replanted area still has sites devoid of vegetation. The salt marsh plants introduced there were devoid of VAM fungi, while high marsh species from the adjacent undisturbed region showed consistent infection, leading the authors to suggest that VAM fungal infection of planting stocks may be a factor in the success of marsh restoration.

  3. Expression and enzymatic characterization of a cold-adapted β-agarase from Antarctic bacterium Pseudoalteromonas sp. NJ21

    Science.gov (United States)

    Li, Jiang; Sha, Yujie

    2015-03-01

    An agar-degrading bacterium, designated as Pseudoalteromonas sp. NJ21, was isolated from an Antarctic sediment sample. The agarase gene aga1161 from Pseudoalteromonas sp. NJ21 consisting of a 2 382-bp coding region was cloned. The gene encodes a 793-amino acids protein and was found to possess characteristic features of the Glyco_hydro_42 family. The recombinant agarase (rAga1161) was overexpressed in Escherichia coli and purified as a fusion protein. Enzyme activity analysis revealed that the optimum temperature and pH for the purified recombinant agarase were 30-40°C and 8.0, respectively. rAga1161 was found to maintain as much as 80% of its maximum activity at 10°C, which is typical of a coldadapted enzyme. The pattern of agar hydrolysis demonstrated that the enzyme is an β-agarase, producing neoagarobiose (NA2) as the final main product. Furthermore, this work is the first proof of an agarolytic activity in Antarctic bacteria and these results indicate the potential for the Antarctic agarase as a catalyst in medicine, food and cosmetic industries.

  4. Development and demonstration of indoor radon-reduction measures for 10 homes in Clinton, New Jersey. Final report, April 1986-January 1987

    International Nuclear Information System (INIS)

    Michaels, L.D.; Brennan, T.; Viner, A.S.; Mattes, A.; Turner, W.

    1987-07-01

    This report discusses the development and demonstration of indoor radon reduction methods for 10 houses in Clinton, New Jersey, where (in the spring of 1986) the New Jersey Department of Environmental Protection (DEP) located a cluster of houses with extremely high radon levels. The work was to be completed before the 1986-87 winter heating season began. The demonstration houses were selected from 56 in the Clinton Knolls subdivision. All of these houses had shown radon concentrations in excess of 64 pCi/1 when monitored in the spring of 1986. Each house was inspected, and 10 representative houses were selected for the radon-reduction demonstration project. Following intensive diagnostic work and monitoring in each house, house-specific radon-reduction plans were developed. With the agreement of the homeowners, radon-reduction systems were installed during the summer of 1986. All 10 of the houses had radon concentrations reduced significantly by the fall of 1986. The average cost of radon reduction was $3127

  5. The Draft Genome Sequence of Clostridium sp. Strain NJ4, a Bacterium Capable of Producing Butanol from Inulin Through Consolidated Bioprocessing.

    Science.gov (United States)

    Jiang, Yujia; Lu, Jiasheng; Chen, Tianpeng; Yan, Wei; Dong, Weiliang; Zhou, Jie; Zhang, Wenming; Ma, Jiangfeng; Jiang, Min; Xin, Fengxue

    2018-05-23

    A novel butanogenic Clostridium sp. NJ4 was successfully isolated and characterized, which could directly produce relatively high titer of butanol from inulin through consolidated bioprocessing (CBP). The assembled draft genome of strain NJ4 is 4.09 Mp, containing 3891 encoded protein sequences with G+C content of 30.73%. Among these annotated genes, a levanase, a hypothetical inulinase, and two bifunctional alcohol/aldehyde dehydrogenases (AdhE) were found to play key roles in the achievement of ABE production from inulin through CBP.

  6. Hillary Clinton / Judith Warner

    Index Scriptorium Estoniae

    Warner, Judith

    1994-01-01

    Kõige mõjuvõimsam naine maailmas - algus EA 22. veebruar 1994. May/4,11,18,25 lk. 22;22;22;21; Jun/1,8,15,22,29 lk. 21; Jul/6,13,20,27 21; Aug/3,10,17,24,31 lk. 21; Sep/7,14,21,28 lk. 21; Oct/5,12,19 lk. 21

  7. Arsenic Removal from Drinking Water by Oxidation/Filtration and Adsorptive Media, U.S. EPA Demonstration Project at Clinton Christian School in Goshen, IN - Final Performance Evaluation Report

    Science.gov (United States)

    This report documents the activities performed for and the results obtained from the arsenic removal treatment technology demonstration project at the Clinton Christian School in Goshen, IN. The objectives of the project were to evaluate the effectiveness of AdEdge Technologies’...

  8. American Presidents and Their Attitudes, Beliefs, and Actions Surrounding Education and Multiculturalism. A Series of Research Studies in Educational Policy. Sixth Installment: Examining Presidents Ronald Reagan, George H. W. Bush, and William Jefferson Clinton. Research

    Science.gov (United States)

    Baptiste, H. Prentice; Orvosh-Kamenski, Heidi; Kamenski, Christopher J.

    2005-01-01

    This article focuses on the recent presidencies of Ronald Reagan, George H. W. Bush, and William Jefferson Clinton and is the sixth installment in a series that examines how presidents, through their office of power, have impacted U.S. citizens by their actions and policies. By viewing the presidents through a multicultural lense we can more…

  9. Dim Networks: The Utility of Social Network Analysis for Illuminating Partner Security Force Networks

    Science.gov (United States)

    2015-12-01

    2012. In a 2011 op-ed for Foreign Policy Magazine, “America’s Pacific Century,” Hillary Clinton , then-Secretary of State, addressed the importance of...22 Hillary Clinton , “America’s Pacific Century,” Foreign Policy, October 11, 2011. 23 The Trans-Pacific Partnership (TPP) is an...carley_2004_oraorganizationris k.pdf. Clinton , Hillary . “America’s Pacific Century.” Foreign Policy. October 11, 2011. Accessed September 30, 2015 . http

  10. Nuclear structure studies using the high resolution spectrometer at the Los Alamos Clinton P. Anderson Meson Physics Facility: Progress report, [1986-1987

    International Nuclear Information System (INIS)

    Hoffmann, G.W.

    1986-12-01

    A major part of the work done this past year was associated with research conducted at the Los Alamos Clinton P. Anderson Meson Physics Facility (LAMPF) using the High Resolution Spectrometer (HRS) and the External Proton Beam (EPB). The research focussed on (1) providing p + nucleus data which test nonrelativistic and relativistic models of the medium energy proton + nucleus interaction, (2) providing (p,p) and (p,n) data which are to be analyzed to provide new nuclear structure information (both ground state and excited state), (3) providing nucleon + nucleon data to aid in the systematic study of the fundamental nucleon-nucleon interaction, (4) developing and improving the pA models themselves, and (5) initiating new experimental programs whose goals are to search for new phenomena in nuclear physics

  11. Technical evaluation report TMI action - NUREG-0737 (II.D.1) relief and safety valve testing for Clinton Power Station Unit 1. (Docket No. 50-461)

    International Nuclear Information System (INIS)

    Burr, T.K.; Magleby, H.L.

    1985-05-01

    Light water reactors operators have experienced a number of occurrences of improper performance by safety and relief valves installed in their primary coolant systems. Because of this, the authors of NUREG-0578 (TMI-2 Lessons Learned Task Force Status Report and Short-Term Recommendations) recommended that programs be developed and completed which would reevaluate the performance capabilities of BWR safety and relief valves. This report has examined the response of the Licensee for the Clinton Power Station, Unit 1 to the requirements of NUREG-0578 and subsequently NUREG-0737 and finds that the Licensee has provided an acceptable response, reconfirming that the General Design Criteria 14, 15 and 30 of Appendix A to 10 CFR-50 have been met

  12. Productivity and river flux variability in response to the PETM on Atlantic margin at Bass River, NJ.

    Science.gov (United States)

    Stoll, H.; Shimizu, N.; Savain, R.; Zachos, J.; Ziveri, P.

    2009-04-01

    While the dramatic climate warming of the Paleocene-Eocene Thermal Maximum has been well characterized, changes in the hydrological cycle and the broader biogeochemical feedbacks (weathering, nutrients, productivity) are less well constrained. Here we describe new geochemical results from a coastal section on the midlatitude Atlantic margin of the U.S. at Bass River, NJ. We measured the elemental geochemistry of coccoliths to probe the productivity of these algae in response to the changing nutrient dynamics on the shelf in the time interval preceding and during the PETM. Coccoliths extracted from the siliclastic coastal section at Bass River NJ exhibit exceptionally good preservation and negligible overgrowth compared to typical ocean carbonate-rich sediments. Analysis of individual coccoliths using secondary ion mass spectrometry (SIMS) facilitates reliable trace element measurements in this low-carbonate section. Published sequence stratigraphy and microfossil analysis have revealed several third order sea level cycles in the late Paleocene including a highstand during the PETM. Consequently we extend our paleoproductivity records far below the PETM to characterize this background variability. We recognize a pattern of generally maximum productivity during lowstands and minimal productivity during highstands. Because nutrient concentrations decrease significantly with distance from the coast, highstands reduce productivity by shifting the highest nutrient levels landward, away from the site. This is likely due to greater distance from river sources as well as reduced wave turbulence which mixes nutrients into the photic zone. This general pattern is broken during the PETM, which features high productivity despite a sea level highstand. This anomalous high productivity may reflect enhanced riverine nutrient delivery, and potentially changes in wind strength and mixing intensity. Riverine nutrient delivery could increase with higher precipitation or precipitation

  13. 5-nJ Femtosecond Ti3+:sapphire laser pumped with a single 1 W green diode

    Science.gov (United States)

    Muti, Abdullah; Kocabas, Askin; Sennaroglu, Alphan

    2018-05-01

    We report a Kerr-lens mode-locked, extended-cavity femtosecond Ti3+:sapphire laser directly pumped at 520 nm with a 1 W AlInGaN green diode. To obtain energy scaling, the short x-cavity was extended with a q-preserving multi-pass cavity to reduce the pulse repetition rate to 5.78 MHz. With 880 mW of incident pump power, we obtained as high as 90 mW of continuous-wave output power from the short cavity by using a 3% output coupler. In the Kerr-lens mode-locked regime, the extended cavity produced nearly transform-limited 95 fs pulses at 776 nm. The resulting energy and peak power of the pulses were 5.1 nJ and 53 kW, respectively. To our knowledge, this represents the highest pulse energy directly obtained to date from a mode-locked, single-diode-pumped Ti3+:sapphire laser.

  14. A 158 fs 5.3 nJ fiber-laser system at 1 mu m using photonic bandgap fibers for dispersion control and pulse compression

    DEFF Research Database (Denmark)

    Nielsen, C.K.; Jespersen, Kim Giessmann; Keiding, S.R.

    2006-01-01

    We demonstrate a 158 fs 5.3 nJ mode-locked laser system based on a fiber oscillator, fiber amplifier and fiber compressor. Dispersion compensation in the fiber oscillator was obtained with a solid-core photonic bandgap (SC-PBG) fiber spliced to standard fibers, and external compression is obtained...... with a hollow-core photonic bandgap (HC-PBG) fiber....

  15. Nuclear structure studies using the high resolution spectrometer at the Los Alamos Clinton P. Anderson Meson Physics Facility: Annual progress report, [1987-1988

    International Nuclear Information System (INIS)

    1987-09-01

    This document constitutes the (1987 to 1988) progress report for the ongoing medium energy nuclear physics research program supported by the US Department of Energy with the University of Texas at Austin. A major part of the work has been and will continue to be associated with research done at the Los Alamos Clinton P. Anderson Meson Physics Facility (LAMPF) using the High Resolution Spectrometer (HRS), the External Proton Beam (EPB), and the new Neutron Time of Flight Facility (NTOF). Other research is done at the Fermi National Accelerator Laboratory (FNAL). The research focuses on (1) providing proton + nucleus data which test nonrelativistic and relativistic models of the medium energy proton + nucleus interaction, (2) providing (p,p) and (p,n) data which are to be analyzed to provide new nuclear structure information (both ground state and excited state), (3) providing nucleon + nucleon data to aid in the systematic study of the fundamental nucleon-nucleon interaction, (4) developing and improving the proton + nucleus theoretical models themselves, and (5) initiating new experimental programs whose goals are to search for new phenomena in nuclear physics. 182 refs., 71 figs., 5 tabs

  16. Gender-specific induction of cytochrome P450s in nonylphenol-treated FVB/NJ mice

    International Nuclear Information System (INIS)

    Hernandez, Juan P.; Chapman, Laura M.; Kretschmer, Xiomara C.; Baldwin, William S.

    2006-01-01

    Nonylphenol (NP) is a breakdown product of nonylphenol ethoxylates, which are used in a variety of industrial, agricultural, household cleaning, and beauty products. NP is one of the most commonly found toxicants in the United States and Europe and is considered a toxicant of concern because of its long half-life. NP is an environmental estrogen that also activates the pregnane X-receptor (PXR) and in turn induces P450s. No study to date has examined the gender-specific effects of NP on hepatic P450 expression. We provided NP at 0, 50 or 75 mg/kg/day for 7 days to male and female FVB/NJ mice and compared their P450 expression profiles. Q-PCR was performed on hepatic cDNA using primers to several CYP isoforms regulated by PXR or its relative, the constitutive androstane receptor (CAR). In female mice, NP induced Cyp2b10 and Cyp2b13, and downregulated the female-specific P450s, Cyp3a41 and Cyp3a44. In contrast, male mice treated with NP showed increased expression of Cyp2a4, Cyp2b9, and Cyp2b10. Western blots confirmed induction of Cyp2b subfamily members in both males and females. Consistent with the Q-PCR data, Western blots showed dose-dependent downregulation of Cyp3a only in females and induction of Cyp2a only in males. The overall increase in female-predominant P450s in males (Cyp2a4, 2b9) and the decrease in female-predominant P450s in females (Cyp3a41, 3a44) suggest that NP is in part feminizing the P450 profile in males and masculinizing the P450 profile in females. Testosterone hydroxylation was also altered in a gender-specific manner, as testosterone 16α-hydroxylase activity was only induced in NP-treated males. In contrast, NP-treated females demonstrated a greater propensity for metabolizing zoxazolamine probably due to greater Cyp2b induction in females. In conclusion, NP causes gender-specific P450 induction and therefore exposure to NP may cause distinct pharmacological and toxicological effects in males compared to females

  17. Exploring Student Use of Social Networking Services (SNS) Surrounding Moral Development, Gender, Campus Crime, Safety, and the Clery Act: A Mixed Methods Study

    Science.gov (United States)

    Baum, Haley

    2017-01-01

    The purpose of this explanatory sequential mixed methods study was to explore college students' use of social networking services (SNS); examining how and why they communicate about campus safety information. This study took place at Stockton University, a regional state institution in NJ. Undergraduate students took part in an online quantitative…

  18. Landscape consequences of natural gas extraction in Bedford, Blair, Cambria, Centre, Clearfield, Clinton, Columbia, Huntingdon, and Luzerne counties, Pennsylvania, 2004-2010

    Science.gov (United States)

    Slonecker, E.T.; Milheim, L.E.; Roig-Silva, C.M.; Winters, S.G.

    2014-01-01

    Increased demands for cleaner burning energy, coupled with the relatively recent technological advances in accessing unconventional hydrocarbon-rich geologic formations, have led to an intense effort to find and extract natural gas from various underground sources around the country. One of these sources, the Marcellus Shale, located in the Allegheny Plateau, is currently undergoing extensive drilling and production. The technology used to extract gas in the Marcellus Shale is known as hydraulic fracturing and has garnered much attention because of its use of large amounts of fresh water, its use of proprietary fluids for the hydraulic-fracturing process, its potential to release contaminants into the environment, and its potential effect on water resources. Nonetheless, development of natural gas extraction wells in the Marcellus Shale is only part of the overall natural gas story in this area of Pennsylvania. Conventional natural gas wells, which sometimes use the same technique, are commonly located in the same general area as the Marcellus Shale and are frequently developed in clusters across the landscape. The combined effects of these two natural gas extraction methods create potentially serious patterns of disturbance on the landscape. This document quantifies the landscape changes and consequences of natural gas extraction for Bedford, Blair, Cambria, Centre, Clearfield, Clinton, Columbia, Huntingdon, and Luzerne Counties in Pennsylvania between 2004 and 2010. Patterns of landscape disturbance related to natural gas extraction activities were collected and digitized using National Agriculture Imagery Program (NAIP) imagery for 2004, 2005/2006, 2008, and 2010. The disturbance patterns were then used to measure changes in land cover and land use using the National Land Cover Database (NLCD) of 2001. A series of landscape metrics is also used to quantify these changes and is included in this publication. In this region, natural gas development disturbed

  19. Application of local area network technology in an engineering environment

    International Nuclear Information System (INIS)

    Powell, A.D.; Sokolowski, M.A.

    1990-01-01

    This paper reports on the application of local area network technology in an engineering environment. Mobil Research and Development Corporation Engineering, Dallas, texas has installed a local area network (LAN) linking over 85 microcomputers. This network, which has been in existence for more than three years, provides common access by all engineers to quality output devices such as laser printers and multi-color pen plotters; IBM mainframe connections; electronic mail and file transfer; and common engineering program. The network has been expanded via a wide area ethernet network to link the Dallas location with a functionally equivalent LAN of over 400 microcomputers in Princeton, N.J. Additionally, engineers on assignment at remote areas in Europe, U.S., Africa and project task forces have dial-in access to the network via telephone lines

  20. Lysophosphatidic acid receptor activation affects the C13NJ microglia cell line proteome leading to alterations in glycolysis, motility, and cytoskeletal architecture

    Science.gov (United States)

    Bernhart, Eva; Kollroser, Manfred; Rechberger, Gerald; Reicher, Helga; Heinemann, Akos; Schratl, Petra; Hallström, Seth; Wintersperger, Andrea; Nusshold, Christoph; DeVaney, Trevor; Zorn-Pauly, Klaus; Malli, Roland; Graier, Wolfgang; Malle, Ernst; Sattler, Wolfgang

    2014-01-01

    Microglia, the immunocompetent cells of the CNS, are rapidly activated in response to injury and microglia migration towards and homing at damaged tissue plays a key role in CNS regeneration. Lysophosphatidic acid (LPA) is involved in signaling events evoking microglia responses through cognate G protein-coupled receptors. Here we show that human immortalized C13NJ microglia express LPA receptor subtypes LPA1, LPA2, and LPA3 on mRNA and protein level. LPA activation of C13NJ cells induced Rho and extracellular signal-regulated kinase activation and enhanced cellular ATP production. In addition, LPA induced process retraction, cell spreading, led to pronounced changes of the actin cytoskeleton and reduced cell motility, which could be reversed by inhibition of Rho activity. To get an indication about LPA-induced global alterations in protein expression patterns a 2-D DIGE/LC-ESI-MS proteomic approach was applied. On the proteome level the most prominent changes in response to LPA were observed for glycolytic enzymes and proteins regulating cell motility and/or cytoskeletal dynamics. The present findings suggest that naturally occurring LPA is a potent regulator of microglia biology. This might be of particular relevance in the pathophysiological context of neurodegenerative disorders where LPA concentrations can be significantly elevated in the CNS. PMID:19899077

  1. TERRAIN, CLINTON COUNTY, KENTUCKY USA

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Terrain data, as defined in FEMA Guidelines and Specifications, Appendix N: Data Capture Standards, describes the digital topographic data that was used to create...

  2. FLOODPLAIN MAPPING, Clinton COUNTY, IN

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Floodplain Mapping study deliverables depict and quantify the flood risks for the study area. The primary risk classifications used are the...

  3. Transport and Storage Economics of CCS Networks in the Netherlands

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-04-15

    A team from the Rotterdam Climate Initiative, CATO-2 (the Dutch national R and D programme on CCS) and the Clinton Climate Initiative, developed a financial model to assess the economics of alternative CO2 transport and storage options in the North Sea, based on common user infrastructure. The purpose of the financial model is to introduce a simple planning tool relating to the transport and storage components of an integrated CCS project using readily available, non-confidential data. A steering group of major emitters with advanced plans for CCS projects in the Netherlands and Belgium guided the project. Although the report focusses on potential projects in the Netherlands (Rotterdam and Eemshaven) and Belgium (Antwerp) in the short to medium term, the analysis and lessons could be useful to other regions considering CO2 network solutions.

  4. Computing spin networks

    International Nuclear Information System (INIS)

    Marzuoli, Annalisa; Rasetti, Mario

    2005-01-01

    We expand a set of notions recently introduced providing the general setting for a universal representation of the quantum structure on which quantum information stands. The dynamical evolution process associated with generic quantum information manipulation is based on the (re)coupling theory of SU (2) angular momenta. Such scheme automatically incorporates all the essential features that make quantum information encoding much more efficient than classical: it is fully discrete; it deals with inherently entangled states, naturally endowed with a tensor product structure; it allows for generic encoding patterns. The model proposed can be thought of as the non-Boolean generalization of the quantum circuit model, with unitary gates expressed in terms of 3nj coefficients connecting inequivalent binary coupling schemes of n + 1 angular momentum variables, as well as Wigner rotations in the eigenspace of the total angular momentum. A crucial role is played by elementary j-gates (6j symbols) which satisfy algebraic identities that make the structure of the model similar to 'state sum models' employed in discretizing topological quantum field theories and quantum gravity. The spin network simulator can thus be viewed also as a Combinatorial QFT model for computation. The semiclassical limit (large j) is discussed

  5. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  6. NJ transportation fact book, 2007

    Science.gov (United States)

    2010-01-01

    The New Jersey Transportation Fact Book 2006-07 presents information about the New Jersey Department of Transportation : and other agencies that provide transportation services in New Jersey. We hope it will prove helpful.

  7. Review of NJ point system.

    Science.gov (United States)

    2013-03-01

    The purpose of this study is to investigate the comparative effectiveness of point-based versus incident-based : negligent driver monitoring systems and to explore how certain changes to the existing point-based system used in : New Jersey might impr...

  8. atlantic_city_nj.grd

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — NGDC builds and distributes high-resolution, coastal digital elevation models (DEMs) that integrate ocean bathymetry and land topography to support NOAA's mission to...

  9. Experience of wireless local area network in a radiation oncology department.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  10. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  11. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  12. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  13. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  14. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  15. Temporal networks

    CERN Document Server

    Saramäki, Jari

    2013-01-01

    The concept of temporal networks is an extension of complex networks as a modeling framework to include information on when interactions between nodes happen. Many studies of the last decade examine how the static network structure affect dynamic systems on the network. In this traditional approach  the temporal aspects are pre-encoded in the dynamic system model. Temporal-network methods, on the other hand, lift the temporal information from the level of system dynamics to the mathematical representation of the contact network itself. This framework becomes particularly useful for cases where there is a lot of structure and heterogeneity both in the timings of interaction events and the network topology. The advantage compared to common static network approaches is the ability to design more accurate models in order to explain and predict large-scale dynamic phenomena (such as, e.g., epidemic outbreaks and other spreading phenomena). On the other hand, temporal network methods are mathematically and concept...

  16. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  17. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  18. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  19. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  20. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  1. Network Convergence

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Network Convergence. User is interested in application and content - not technical means of distribution. Boundaries between distribution channels fade out. Network convergence leads to seamless application and content solutions.

  2. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...

  3. Network Science

    National Research Council Canada - National Science Library

    Leland, Will

    2006-01-01

    OVERVIEW: (1) A committee of technical experts, military officers and R&D managers was assembled by the National Research Council to reach consensus on the nature of networks and network research. (2...

  4. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  5. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  6. Indiiskaja Hillary Clinton? / Vishakha N. Desai

    Index Scriptorium Estoniae

    Desai, Vishakha N.

    2007-01-01

    Autor nimetab India presidendiks valitud Pratibha Patili vastuoluliseks figuuriks, kelle professionaalne kvalifikatsioon on kaheldav. Ta väljendab lootust, et Patil tõestab kritiseerijatele vastupidist

  7. Point of view: Hillary Rodham Clinton.

    Science.gov (United States)

    Clinton, H R

    1999-04-01

    During the 1994 International Conference on Population and Development (ICPD) in Cairo, 180 nations agreed for the first time that women's reproductive health and empowerment are crucial to national sustainability and growth. In the US the government has increased funding to family planning (FP) and reproductive care services nationwide, while continuing to ensure that abortion remain safe, legal, and increasingly rare. Commitments to FP must be continued in light of the nearly 600,000 annual deaths worldwide from pregnancy-related causes. Commitments to education must continue because two-thirds of the 960 million illiterate adults are women. The goals to reach by the year 2015 are for pregnancies to be planned, children to be wanted, and women to achieve their rightful place in society. Educating women means educating families, and educating families means educating societies.

  8. Clinton River Sediment Transport Modeling Study

    Science.gov (United States)

    The U.S. ACE develops sediment transport models for tributaries to the Great Lakes that discharge to AOCs. The models developed help State and local agencies to evaluate better ways for soil conservation and non-point source pollution prevention.

  9. Tulekul naiste duell : Rice - Clinton? / Aadu Hiietamm

    Index Scriptorium Estoniae

    Hiietamm, Aadu, 1954-

    2005-01-01

    Kui intervjuus Washington Postile ei välistanud USA välisminister Condoleezza Rice võimalust kandideerida presidendivalimistel, siis hilisemas intervjuus telekanalile ABC ütles ta, et tal puudub soov saada presidendiks. Samal ajal arutavad demokraadid Hillary Clintoni võimalusi saavutada edu järgmistel presidendivalimistel

  10. Did Johnson affect Trump or Clinton?

    DEFF Research Database (Denmark)

    Kurrild-Klitgaard, Peter

    It is widely suspected that the candidates of the US Libertarian Party usually take votes almost exclusively or at least predominantly from Republican Party candidates. A look at almost 200 published 3- and 4-way polls (March-October) in the 2016 US presidential election indicates that Gary Johnson’s...

  11. Executive Orders-William J. Clinton

    Data.gov (United States)

    National Archives and Records Administration — Executive orders are official documents, numbered consecutively, through which the President of the United States manages the operations of the Federal Government....

  12. CALS Test Network Handbook

    Science.gov (United States)

    1993-03-01

    Ltd Gillette Company Dorset, England Boston MA Foreign Broadcast Information Set. Giordano Associates Inc Frederick MD Long Branch NJ Formtek Inc...Associates Orem UT College Park MD InfoDesign Corp Johns Hopkins University Toronto, Ontario Laurel MD Information Spectrum Inc Joint Committee on Printing...Inc Washington DC Bel Air MD Navy Naval Research Laboratory OutSource Inc Washington DC Los Angeles CA 22 i +’ . S.. . -- -,•w• -- w,,Wmwmm mm -- m mmm

  13. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  14. Spatial networks

    Science.gov (United States)

    Barthélemy, Marc

    2011-02-01

    Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, and neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields, ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated with the length of edges which in turn has dramatic effects on the topological structure of these networks. We will thoroughly explain the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spatial networks, such as phase transitions, random walks, synchronization, navigation, resilience, and disease spread.

  15. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  16. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  17. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  18. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  19. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  20. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago V. V.; Giannitsarou, Chryssi; Johnson, Charles R.

    2016-01-01

    This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s00199-016-0992-1 We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and d...

  1. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  2. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  3. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  4. Bipartite Networks

    NARCIS (Netherlands)

    Agneessens, F.; Moser, C.; Barnett, G.A.

    2011-01-01

    Bipartite networks refer to a specific kind of network in which the nodes (or actors) can be partitioned into two subsets based on the fact that no links exist between actors within each subset, but only between the two subsets. Due to the partition of actors in two sets and the absence of relations

  5. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  6. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  7. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  8. Accelerating networks

    International Nuclear Information System (INIS)

    Smith, David M D; Onnela, Jukka-Pekka; Johnson, Neil F

    2007-01-01

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  9. Surface-water data and statistics from U.S. Geological Survey data-collection networks in New Jersey on the World Wide Web

    Science.gov (United States)

    Reiser, Robert G.; Watson, Kara M.; Chang, Ming; Nieswand, Steven P.

    2002-01-01

    The U.S. Geological Survey (USGS), in cooperation with other Federal, State, and local agencies, operates and maintains a variety of surface-water data-collection networks throughout the State of New Jersey. The networks include streamflow-gaging stations, low-flow sites, crest-stage gages, tide gages, tidal creststage gages, and water-quality sampling sites. Both real-time and historical surface-water data for many of the sites in these networks are available at the USGS, New Jersey District, web site (http://nj.usgs.gov/), and water-quality data are available at the USGS National Water Information System (NWIS) web site (http://waterdata.usgs.gov/nwis/). These data are an important source of information for water managers, engineers, environmentalists, and private citizens.

  10. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  11. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  12. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide......-Configurable Intelligent Distributed Antenna System (SCIDAS)’ that overlays intelligence over the conventional DAS architecture and latter is in the form of a swarm of intelligent hovering base stations working in a team to cooperatively resolve the PTC congestion at the Area of Event (AoE). A suitable network...

  13. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... of more than a million people in more than 100 countries have attended courses in Japan funded fully or partly by Japanese ODA since the inception of the technical assistance programs in 1954 through the Colombo Plan and since 1959 through the Association of Overseas Technical Scholarships (AOTS from 2009...... HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...

  14. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  15. Exchange Network

    Science.gov (United States)

    The Environmental Information Exchange Network (EN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.

  16. Diversity Networks

    Science.gov (United States)

    and professional growth of women through networking, mentoring and training. We strive to ensure that will be used. National Processing Center Seniors Leader: Jo Anne Hankins Champion: Eric Milliner NO

  17. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    , as a Danida fellow. Today, the older sister works in Nepal and the younger in Seattle, where they still make use of their personal networks including connections to their fellow alumni of technical assistance courses. Inspired by work on social remittances in combination with network theory , I argue......Technical Assistance courses have many functions apart from disseminating knowledge and information, one such function is to engender networks. During the course period, participants meet and establish contact and some of these contacts remain connections between alumni for many years after...... the courses are finished. The alumni networks depend on the uses they are put to by the individual alumni and the support they get from alumni and host countries. The United Nations initiated technical assistance courses in the late 1940s in order to train nationals from developing countries as a means...

  18. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  19. Neural networks

    International Nuclear Information System (INIS)

    Denby, Bruce; Lindsey, Clark; Lyons, Louis

    1992-01-01

    The 1980s saw a tremendous renewal of interest in 'neural' information processing systems, or 'artificial neural networks', among computer scientists and computational biologists studying cognition. Since then, the growth of interest in neural networks in high energy physics, fueled by the need for new information processing technologies for the next generation of high energy proton colliders, can only be described as explosive

  20. Pintadas network

    OpenAIRE

    Cruz, Maria do Carmo Meirelles T.

    2006-01-01

    The Pintadas Network has been organized in Pintadas, a small municipality (11.254 inhabitants) in Bahia, located in the semi-arid region. It has been composed by civil society organizacions (social, productive, cultural and religious organizations and a credit cooperative), with support from the local town hall and from national and international institutions. The Network is a space for articulation, which intends to formulate, execute, follow-up, inspect and evaluate the municipal public pol...

  1. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...... the organizational forms discussed in the paper. It is asserted that the underlying organizational phenomena are not changing but that the manifestations and representations are shifting due to technological developments....

  2. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  3. Neural Networks

    International Nuclear Information System (INIS)

    Smith, Patrick I.

    2003-01-01

    Physicists use large detectors to measure particles created in high-energy collisions at particle accelerators. These detectors typically produce signals indicating either where ionization occurs along the path of the particle, or where energy is deposited by the particle. The data produced by these signals is fed into pattern recognition programs to try to identify what particles were produced, and to measure the energy and direction of these particles. Ideally, there are many techniques used in this pattern recognition software. One technique, neural networks, is particularly suitable for identifying what type of particle caused by a set of energy deposits. Neural networks can derive meaning from complicated or imprecise data, extract patterns, and detect trends that are too complex to be noticed by either humans or other computer related processes. To assist in the advancement of this technology, Physicists use a tool kit to experiment with several neural network techniques. The goal of this research is interface a neural network tool kit into Java Analysis Studio (JAS3), an application that allows data to be analyzed from any experiment. As the final result, a physicist will have the ability to train, test, and implement a neural network with the desired output while using JAS3 to analyze the results or output. Before an implementation of a neural network can take place, a firm understanding of what a neural network is and how it works is beneficial. A neural network is an artificial representation of the human brain that tries to simulate the learning process [5]. It is also important to think of the word artificial in that definition as computer programs that use calculations during the learning process. In short, a neural network learns by representative examples. Perhaps the easiest way to describe the way neural networks learn is to explain how the human brain functions. The human brain contains billions of neural cells that are responsible for processing

  4. FLOODPLAIN MAPPING SUBMITTAL, HUNTERDON CO., NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Floodplain Mapping study deliverables depict and quantify the flood risks for the study area. The primary risk classifications used are the...

  5. Hydrology submission for Middlesex County, NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Hydrology data include spatial datasets and data tables necessary for documenting the hydrologic procedures for estimating flood discharges for a flood insurance...

  6. Hydraulics submission for Middlesex County, NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Hydraulics data include spatial datasets and data tables necessary for documenting the hydraulic procedures for estimating base flood elevation for a flood insurance...

  7. DCS Terrain for Middlesex County, NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Terrain data, as defined in FEMA Guidelines and Specifications, Appendix N: Data Capture Standards, describes the digital topographic data that were used to create...

  8. DCS Survey Submission for Middlesex County NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Survey data includes spatial datasets and data tables necessary to digitally represent data collected in the survey phase of the study. (Source: FEMA Guidelines and...

  9. DCS Survey Submission for Gloucester County NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Survey data includes spatial datasets and data tables necessary to digitally represent data collected in the survey phase of the study. (Source: FEMA Guidelines and...

  10. PODAAC-TEOCN-0NJ05

    Data.gov (United States)

    National Aeronautics and Space Administration — The twin satellites of the Gravity Recovery and Climate Experiment (GRACE), launched in March of 2002, are making detailed monthly measurements of Earth's gravity...

  11. Hydraulics submission for Gloucester County, NJ

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Hydraulics data include spatial datasets and data tables necessary for documenting the hydraulic procedures for estimating base flood elevation for a flood insurance...

  12. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  13. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...... they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics....

  14. Nuclear networking.

    Science.gov (United States)

    Xie, Wei; Burke, Brian

    2017-07-04

    Nuclear lamins are intermediate filament proteins that represent important structural components of metazoan nuclear envelopes (NEs). By combining proteomics and superresolution microscopy, we recently reported that both A- and B-type nuclear lamins form spatially distinct filament networks at the nuclear periphery of mouse fibroblasts. In particular, A-type lamins exhibit differential association with nuclear pore complexes (NPCs). Our studies reveal that the nuclear lamina network in mammalian somatic cells is less ordered and more complex than that of amphibian oocytes, the only other system in which the lamina has been visualized at high resolution. In addition, the NPC component Tpr likely links NPCs to the A-type lamin network, an association that appears to be regulated by C-terminal modification of various A-type lamin isoforms. Many questions remain, however, concerning the structure and assembly of lamin filaments, as well as with their mode of association with other nuclear components such as peripheral chromatin.

  15. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... threats to the critical infrastructure. Finally, before our conclusions and outlook, we give a brief overview of some key activities in the field and what research directions are currently investigated....

  16. Network interruptions

    CERN Multimedia

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  17. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies....

  18. Deposition of pyromagnetically-enhanced Marlboro Clay offset from spherule peak at onset of CIE and Paleocene-Eocene boundary at the midshelf Millville core site (NJ Coastal Plain)

    Science.gov (United States)

    Kent, D. V.; Lanci, L.; Wang, H.; Wright, J.

    2017-12-01

    Wilson Lake B and Millville are the two core sites on the NJ Coastal Plain where an impact spherule layer was discovered at the base of the Marlboro Clay, coinciding with the onset of the carbon isotope excursion (CIE) that identifies the Paleocene-Eocene boundary (Schaller+2016 Science). At the more proximal Wilson Lake site ( 35 m paleowater depth, 20 km from the paleoshore), enhanced magnetization of the Marlboro Clay marked by a dramatic increase in concentration of submicron magnetic particles closely coincided with the sharp peak in abundance of the spherules (Kent+2017 EPSL). Discounting magnetotactic bacteria and impact plume condensate as significant sources of the magnetic nanoparticles that dominate the magnetization of the 10 m-thick Marlboro Clay, a pyrogenetic origin was postulated whereby a widespread and intense conflagration over the hinterlands, quite possibly impact-induced, produced magnetic nanoparticles in the heated soils, a process long known from wildfires and laboratory heating experiments. The pyromagnetically-enhanced kaolinite-rich soils would have been swept from the denuded landscape and deposited across the adjoining shelf, perhaps as mudwaves, to become the Marlboro Clay. The Millville site at double the paleowater depth and distance to the paleoshore compared to Wilson Lake (Makarova+2017 Paleoceanography) shows a similar enhancement in magnetization of the Marlboro Clay. However, the increase in magnetization in Millville starts well above ( 50 cm) the spherule peak and the onset of the CIE, which coincide with a sharp drop in what little carbonate content there is in the Marlboro Clay, resulting in a zone barren of foraminifers (Makarova+2017 op. cit.). The offset in deposition might be due to added barren zone or a longer transit of the soil muds to the more distant Millville site but would not be expected if the magnetic nanoparticles were produced in more direct response to the onset of the CIE, as from proliferation of

  19. Percolation of interdependent network of networks

    International Nuclear Information System (INIS)

    Havlin, Shlomo; Stanley, H. Eugene; Bashan, Amir; Gao, Jianxi; Kenett, Dror Y.

    2015-01-01

    Complex networks appear in almost every aspect of science and technology. Previous work in network theory has focused primarily on analyzing single networks that do not interact with other networks, despite the fact that many real-world networks interact with and depend on each other. Very recently an analytical framework for studying the percolation properties of interacting networks has been introduced. Here we review the analytical framework and the results for percolation laws for a Network Of Networks (NONs) formed by n interdependent random networks. The percolation properties of a network of networks differ greatly from those of single isolated networks. In particular, because the constituent networks of a NON are connected by node dependencies, a NON is subject to cascading failure. When there is strong interdependent coupling between networks, the percolation transition is discontinuous (first-order) phase transition, unlike the well-known continuous second-order transition in single isolated networks. Moreover, although networks with broader degree distributions, e.g., scale-free networks, are more robust when analyzed as single networks, they become more vulnerable in a NON. We also review the effect of space embedding on network vulnerability. It is shown that for spatially embedded networks any finite fraction of dependency nodes will lead to abrupt transition

  20. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2017-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  1. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2018-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  2. Network Views

    Science.gov (United States)

    Alexander, Louis

    2010-01-01

    The world changed in 2008. The financial crisis brought with it a deepening sense of insecurity, and the desire to be connected to a network increased. Throughout the summer and fall of 2008, events were unfolding with alarming rapidity. The Massachusetts Institute of Technology (MIT) Alumni Association wanted to respond to this change in the…

  3. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  4. Global Networking.

    Science.gov (United States)

    Lynch, Clifford

    1997-01-01

    Discusses the state of the Internet. Highlights include the magnitude of the infrastructure, costs, its increasing pace, constraints in international links, provision of network capacity to homes and small businesses, cable television modems, political and cultural problems, the digital library concept, search engines, the failure of personal…

  5. Ecological network analysis: network construction

    NARCIS (Netherlands)

    Fath, B.D.; Scharler, U.M.; Ulanowicz, R.E.; Hannon, B.

    2007-01-01

    Ecological network analysis (ENA) is a systems-oriented methodology to analyze within system interactions used to identify holistic properties that are otherwise not evident from the direct observations. Like any analysis technique, the accuracy of the results is as good as the data available, but

  6. Neural Networks

    Directory of Open Access Journals (Sweden)

    Schwindling Jerome

    2010-04-01

    Full Text Available This course presents an overview of the concepts of the neural networks and their aplication in the framework of High energy physics analyses. After a brief introduction on the concept of neural networks, the concept is explained in the frame of neuro-biology, introducing the concept of multi-layer perceptron, learning and their use as data classifer. The concept is then presented in a second part using in more details the mathematical approach focussing on typical use cases faced in particle physics. Finally, the last part presents the best way to use such statistical tools in view of event classifers, putting the emphasis on the setup of the multi-layer perceptron. The full article (15 p. corresponding to this lecture is written in french and is provided in the proceedings of the book SOS 2008.

  7. Feedback Networks

    OpenAIRE

    Zamir, Amir R.; Wu, Te-Lin; Sun, Lin; Shen, William; Malik, Jitendra; Savarese, Silvio

    2016-01-01

    Currently, the most successful learning models in computer vision are based on learning successive representations followed by a decision layer. This is usually actualized through feedforward multilayer neural networks, e.g. ConvNets, where each layer forms one of such successive representations. However, an alternative that can achieve the same goal is a feedback based approach in which the representation is formed in an iterative manner based on a feedback received from previous iteration's...

  8. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  9. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  10. Networks of networks – An introduction

    International Nuclear Information System (INIS)

    Kenett, Dror Y.; Perc, Matjaž; Boccaletti, Stefano

    2015-01-01

    Graphical abstract: Interdependent network reciprocity. Only those blue cooperative domains that are initially present on both networks survive. Abstract: This is an introduction to the special issue titled “Networks of networks” that is in the making at Chaos, Solitons & Fractals. Recent research and reviews attest to the fact that networks of networks are the next frontier in network science [1–7]. Not only are interactions limited and thus inadequately described by well-mixed models, it is also a fact that the networks that should be an integral part of such models are often interconnected, thus making the processes that are unfolding on them interdependent. From the World economy and transportation systems to social media, it is clear that processes taking place in one network might significantly affect what is happening in many other networks. Within an interdependent system, each type of interaction has a certain relevance and meaning, so that treating all the links identically inevitably leads to information loss. Networks of networks, interdependent networks, or multilayer networks are therefore a much better and realistic description of such systems, and this Special Issue is devoted to their structure, dynamics and evolution, as well as to the study of emergent properties in multi-layered systems in general. Topics of interest include but are not limited to the spread of epidemics and information, percolation, diffusion, synchronization, collective behavior, and evolutionary games on networks of networks. Interdisciplinary work on all aspects of networks of networks, regardless of background and motivation, is very welcome.

  11. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  12. ENLIGHT Network

    CERN Multimedia

    Ballantine, A; Dixon-Altaber, H; Dosanjh, M; Kuchina, L

    2011-01-01

    State-of-the-art techniques borrowed from particle accelerators and detectors are a key element in hadrontherapy and several European projects are actively fostering the collaboration amongst the various disciplines and countries. ENLIGHT was established in 2002 to coordinate these European efforts in hadron therapy. The ENLIGHT network is formed by the European hadrontherapy Community, with more than 300 participants from twenty European countries. A major achievement of ENLIGHT has been the blending of traditionally separate communities so that clinicians, physicists, biologists and engineers with experience and interest in particle therapy are working together.

  13. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  14. 75 FR 18190 - New Jersey Water Supply Authority; Notice of Preliminary Permit Application Accepted for Filing...

    Science.gov (United States)

    2010-04-09

    ... Contact: Edward Buss, P.E., New Jersey Water Supply Authority, 1851 State Hwy. 31, Clinton, NJ 08800, (908... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Project No. 13399-000] New Jersey Water Supply Authority; Notice of Preliminary Permit Application Accepted for Filing and Soliciting Comments...

  15. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  16. Synchronization of networks

    Indian Academy of Sciences (India)

    We study the synchronization of coupled dynamical systems on networks. The dynamics is .... Such a time-varying topology can occur in social networks, computer networks, WWW ... This has the effect of reducing the spread of the transverse ...

  17. Reconfigurable network processing platforms

    NARCIS (Netherlands)

    Kachris, C.

    2007-01-01

    This dissertation presents our investigation on how to efficiently exploit reconfigurable hardware to design flexible, high performance, and power efficient network devices capable to adapt to varying processing requirements of network applications and traffic. The proposed reconfigurable network

  18. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    Camarinha-Matos, L.M.; Afsarmanesh, H.

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  19. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  20. Visualization of Social Networks

    NARCIS (Netherlands)

    Boertjes, E.M.; Kotterink, B.; Jager, E.J.

    2011-01-01

    Current visualizations of social networks are mostly some form of node-link diagram. Depending on the type of social network, this can be some treevisualization with a strict hierarchical structure or a more generic network visualization.

  1. Animal transportation networks

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-01-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. PMID:25165598

  2. Network development plan 1995

    International Nuclear Information System (INIS)

    Anon.

    1995-11-01

    Network plan 1995 concerns several strategic problems, among others environmental policy of power transmission lines. Possibilities of restructuring aerial cable network are described. The state of the existing systems and plans for new network systems are presented. (EG)

  3. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  4. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  5. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  6. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  7. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  8. Integrating Networking into ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2018-01-01

    Networking is foundational to the ATLAS distributed infrastructure and there are many ongoing activities related to networking both within and outside of ATLAS. We will report on the progress in a number of areas exploring ATLAS's use of networking and our ability to monitor the network, analyze metrics from the network, and tune and optimize application and end-host parameters to make the most effective use of the network. Specific topics will include work on Open vSwitch for production systems, network analytics, FTS testing and tuning, and network problem alerting and alarming.

  9. Network Plus

    Science.gov (United States)

    Bender, Walter; Chesnais, Pascal

    1988-05-01

    Over the past several years, the Electronic Publishing Group at the MIT Media Laboratory has been conducting a family of media experiments which explore a new kind of broadcast: the distribution of data and computer programs rather than pre-packaged material. This broadcast is not directed to a human recipient, but to a local computational agent acting on his behalf. In response to instructions from both the broadcaster and the reader, this agent selects from the incoming data and presents it in a manner suggestive of traditional media. The embodiment of these media experiments is a news retrieval system where the news editor has been replaced by the personal computer. A variety of both local and remote databases which operate passively as well as interac-tively are accessed by "reporters." These "reporters" are actually software interfaces, which are programmed to gather news. Ideally, they are "broadcatching" that is to say, watching all broadcast television channels, listening to all radio transmissions, and reading all newspapers, magazines, and journals. 1 A possible consequence of the synthesis of media through active processing is the merger of newspapers and television (figure 1). The result is either a newspaper with illustrations which move 2 or, conversely, print as television output. The latter is the theme of Network Plus.

  10. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  11. Data center networks and network architecture

    Science.gov (United States)

    Esaki, Hiroshi

    2014-02-01

    This paper discusses and proposes the architectural framework, which is for data center networks. The data center networks require new technical challenges, and it would be good opportunity to change the functions, which are not need in current and future networks. Based on the observation and consideration on data center networks, this paper proposes; (i) Broadcast-free layer 2 network (i.e., emulation of broadcast at the end-node), (ii) Full-mesh point-to-point pipes, and (iii) IRIDES (Invitation Routing aDvertisement for path Engineering System).

  12. Open innovation in networks

    DEFF Research Database (Denmark)

    Hu, Yimei

    and hierarchy can be analyzed from a network approach. Within a network perspective, there are different levels of network, and a firm may not always has the power to “manage” innovation networks due to different levels of power. Based on the strength of a firm’s power, its role may varies from manager...

  13. Formation of multiple networks

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    we introduce the first network formation model for multiple networks. Network formation models are among the most popular tools in traditional network studies, because of both their practical and theoretical impact. However, existing models are not sufficient to describe the generation of multiple...

  14. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  15. Modeling Network Interdiction Tasks

    Science.gov (United States)

    2015-09-17

    118 xiii Table Page 36 Computation times for weighted, 100-node random networks for GAND Approach testing in Python ...in Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 38 Accuracy measures for weighted, 100-node random networks for GAND...networks [15:p. 1]. A common approach to modeling network interdiction is to formulate the problem in terms of a two-stage strategic game between two

  16. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  17. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  18. Epidemics on interconnected networks

    Science.gov (United States)

    Dickison, Mark; Havlin, S.; Stanley, H. E.

    2012-06-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties but will also interact with individuals in other networks. We study the susceptible-infected-recovered process on interconnected network systems and find two distinct regimes. In strongly coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength βc, below which the disease does not spread. In contrast, in weakly coupled network systems, a mixed phase exists below βc of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  19. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  20. Networks in Cell Biology

    Science.gov (United States)

    Buchanan, Mark; Caldarelli, Guido; De Los Rios, Paolo; Rao, Francesco; Vendruscolo, Michele

    2010-05-01

    Introduction; 1. Network views of the cell Paolo De Los Rios and Michele Vendruscolo; 2. Transcriptional regulatory networks Sarath Chandra Janga and M. Madan Babu; 3. Transcription factors and gene regulatory networks Matteo Brilli, Elissa Calistri and Pietro Lió; 4. Experimental methods for protein interaction identification Peter Uetz, Björn Titz, Seesandra V. Rajagopala and Gerard Cagney; 5. Modeling protein interaction networks Francesco Rao; 6. Dynamics and evolution of metabolic networks Daniel Segré; 7. Hierarchical modularity in biological networks: the case of metabolic networks Erzsébet Ravasz Regan; 8. Signalling networks Gian Paolo Rossini; Appendix 1. Complex networks: from local to global properties D. Garlaschelli and G. Caldarelli; Appendix 2. Modelling the local structure of networks D. Garlaschelli and G. Caldarelli; Appendix 3. Higher-order topological properties S. Ahnert, T. Fink and G. Caldarelli; Appendix 4. Elementary mathematical concepts A. Gabrielli and G. Caldarelli; References.

  1. An Artificial Neural Network-Based Decision-Support System for Integrated Network Security

    Science.gov (United States)

    2014-09-01

    inbreeding, hybridization, or mutation, a concept introduced by Charles Darwin in 1809 (Quammen, 2008). Within the field of CAS, emergent behavior...Enterprise. Upper Saddle River, NJ, USA: Prentice Hall. Quammen, D. (2008). Charles Darwin : On the Origin of Species The Illustrated Edition. New

  2. vhv supply networks, problems of network structure

    Energy Technology Data Exchange (ETDEWEB)

    Raimbault, J

    1966-04-01

    The present and future power requirements of the Paris area and the structure of the existing networks are discussed. The various limitations that will have to be allowed for to lay down the structure of a regional transmission network leading in the power of the large national transmission network to within the Paris built up area are described. The theoretical solution that has been adopted, and the features of its final achievement, which is planned for about the year 2000, and the intermediate stages are given. The problem of the structure of the National Power Transmission network which is to supply the regional network was studied. To solve this problem, a 730 kV voltage network will have to be introduced.

  3. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  4. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  5. Network connectivity value.

    Science.gov (United States)

    Dragicevic, Arnaud; Boulanger, Vincent; Bruciamacchie, Max; Chauchard, Sandrine; Dupouey, Jean-Luc; Stenger, Anne

    2017-04-21

    In order to unveil the value of network connectivity, we formalize the construction of ecological networks in forest environments as an optimal control dynamic graph-theoretic problem. The network is based on a set of bioreserves and patches linked by ecological corridors. The node dynamics, built upon the consensus protocol, form a time evolutive Mahalanobis distance weighted by the opportunity costs of timber production. We consider a case of complete graph, where the ecological network is fully connected, and a case of incomplete graph, where the ecological network is partially connected. The results show that the network equilibrium depends on the size of the reception zone, while the network connectivity depends on the environmental compatibility between the ecological areas. Through shadow prices, we find that securing connectivity in partially connected networks is more expensive than in fully connected networks, but should be undertaken when the opportunity costs are significant. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  7. Morphological neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, G.X.; Sussner, P. [Univ. of Florida, Gainesville, FL (United States)

    1996-12-31

    The theory of artificial neural networks has been successfully applied to a wide variety of pattern recognition problems. In this theory, the first step in computing the next state of a neuron or in performing the next layer neural network computation involves the linear operation of multiplying neural values by their synaptic strengths and adding the results. Thresholding usually follows the linear operation in order to provide for nonlinearity of the network. In this paper we introduce a novel class of neural networks, called morphological neural networks, in which the operations of multiplication and addition are replaced by addition and maximum (or minimum), respectively. By taking the maximum (or minimum) of sums instead of the sum of products, morphological network computation is nonlinear before thresholding. As a consequence, the properties of morphological neural networks are drastically different than those of traditional neural network models. In this paper we consider some of these differences and provide some particular examples of morphological neural network.

  8. Network Transformations in Economy

    Directory of Open Access Journals (Sweden)

    Bolychev O.

    2014-09-01

    Full Text Available In the context of ever-increasing market competition, networked interactions play a special role in the economy. The network form of entrepreneurship is increasingly viewed as an effective organizational structure to create a market value embedded in innovative business solutions. The authors study the characteristics of a network as an economic category and emphasize certain similarities between Rus sian and international approaches to identifying interactions of economic systems based on the network principle. The paper focuses on the types of networks widely used in the economy. The authors analyze the transformation of business networks along two lines: from an intra- to an inter-firm network and from an inter-firm to an inter-organizational network. The possible forms of network formation are described depending on the strength of connections and the type of integration. The drivers and reasons behind process of transition from a hierarchical model of the organizational structure to a network type are identified. The authors analyze the advantages of creating inter-firm networks and discuss the features of inter-organizational networks as compares to inter-firm ones. The article summarizes the reasons for and advantages of participation in inter-rganizational networks and identifies the main barriers to the formation of inter-organizational network.

  9. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  10. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  11. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  12. Cisco networking essentials

    CERN Document Server

    McMillan, Troy

    2015-01-01

    Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and c

  13. Airborne Network Optimization with Dynamic Network Update

    Science.gov (United States)

    2015-03-26

    source si and a target ti . For each commodity (si, ki) the commodity specifies a non- negative demand di [5]. The objective of the multi-commodity...queue predictions, and network con- gestion [15]. The implementation of the DRQC uses the Kalman filter to predict the state of the network and optimize

  14. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  15. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  16. Innovations, status, and networks

    NARCIS (Netherlands)

    P. Wang (Pengfei)

    2016-01-01

    markdownabstractTo obtain and maintain competitive advantage, firms need to implement appropriate innovation strategies (i.e. exploration or exploitation) and acquire status in external networks. In this dissertation, I investigate how innovation strategy, status, and network structure jointly

  17. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  18. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  19. Cooperative Hurricane Network Obs

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations from the Cooperative Hurricane Reporting Network (CHURN), a special network of stations that provided observations when tropical cyclones approached the...

  20. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described......Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  1. Bladder Cancer Advocacy Network

    Science.gov (United States)

    ... Grants Bladder Cancer Think Tank Bladder Cancer Research Network Bladder Cancer Genomics Consortium Get Involved Ways to ... us? Who we are The Bladder Cancer Advocacy Network (BCAN) is a community of patients, caregivers, survivors, ...

  2. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  3. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  4. Temporal network epidemiology

    CERN Document Server

    Holme, Petter

    2017-01-01

    This book covers recent developments in epidemic process models and related data on temporally varying networks. It is widely recognized that contact networks are indispensable for describing, understanding, and intervening to stop the spread of infectious diseases in human and animal populations; “network epidemiology” is an umbrella term to describe this research field. More recently, contact networks have been recognized as being highly dynamic. This observation, also supported by an increasing amount of new data, has led to research on temporal networks, a rapidly growing area. Changes in network structure are often informed by epidemic (or other) dynamics, in which case they are referred to as adaptive networks. This volume gathers contributions by prominent authors working in temporal and adaptive network epidemiology, a field essential to understanding infectious diseases in real society.

  5. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  6. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...... from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight...

  7. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  8. Stabilizing weighted complex networks

    International Nuclear Information System (INIS)

    Xiang Linying; Chen Zengqiang; Liu Zhongxin; Chen Fei; Yuan Zhuzhi

    2007-01-01

    Real networks often consist of local units which interact with each other via asymmetric and heterogeneous connections. In this paper, the V-stability problem is investigated for a class of asymmetric weighted coupled networks with nonidentical node dynamics, which includes the unweighted network as a special case. Pinning control is suggested to stabilize such a coupled network. The complicated stabilization problem is reduced to measuring the semi-negative property of the characteristic matrix which embodies not only the network topology, but also the node self-dynamics and the control gains. It is found that network stabilizability depends critically on the second largest eigenvalue of the characteristic matrix. The smaller the second largest eigenvalue is, the more the network is pinning controllable. Numerical simulations of two representative networks composed of non-chaotic systems and chaotic systems, respectively, are shown for illustration and verification

  9. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  10. Reciprocity of weighted networks.

    Science.gov (United States)

    Squartini, Tiziano; Picciolo, Francesco; Ruzzenenti, Franco; Garlaschelli, Diego

    2013-01-01

    In directed networks, reciprocal links have dramatic effects on dynamical processes, network growth, and higher-order structures such as motifs and communities. While the reciprocity of binary networks has been extensively studied, that of weighted networks is still poorly understood, implying an ever-increasing gap between the availability of weighted network data and our understanding of their dyadic properties. Here we introduce a general approach to the reciprocity of weighted networks, and define quantities and null models that consistently capture empirical reciprocity patterns at different structural levels. We show that, counter-intuitively, previous reciprocity measures based on the similarity of mutual weights are uninformative. By contrast, our measures allow to consistently classify different weighted networks according to their reciprocity, track the evolution of a network's reciprocity over time, identify patterns at the level of dyads and vertices, and distinguish the effects of flux (im)balances or other (a)symmetries from a true tendency towards (anti-)reciprocation.

  11. Energy Sciences Network (ESnet)

    Data.gov (United States)

    Federal Laboratory Consortium — The Energy Sciences Network is the Department of Energy’s high-speed network that provides the high-bandwidth, reliable connections that link scientists at national...

  12. Network survivability performance

    Science.gov (United States)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  13. Local network assessment

    Science.gov (United States)

    Glen, D. V.

    1985-04-01

    Local networks, related standards activities of the Institute of Electrical and Electronics Engineers the American National Standards Institute and other elements are presented. These elements include: (1) technology choices such as topology, transmission media, and access protocols; (2) descriptions of standards for the 802 local area networks (LAN's); high speed local networks (HSLN's) and military specification local networks; and (3) intra- and internetworking using bridges and gateways with protocols Interconnection (OSI) reference model. The convergence of LAN/PBX technology is also described.

  14. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project.......Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  15. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  16. Routed planar networks

    Directory of Open Access Journals (Sweden)

    David J. Aldous

    2016-04-01

    Full Text Available Modeling a road network as a planar graph seems very natural. However, in studying continuum limits of such networks it is useful to take {\\em routes} rather than {\\em edges} as primitives. This article is intended to introduce the relevant (discrete setting notion of {\\em routed network} to graph theorists. We give a naive classification of all 71 topologically different such networks on 4 leaves, and pose a variety of challenging research questions.

  17. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  18. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  19. Heterogeneity and Networks

    OpenAIRE

    Goyal, S.

    2018-01-01

    This chapter shows that networks can have large and differentiated effects on behavior and then argues that social and economic pressures facilitate the formation of heterogenous networks. Thus networks can play an important role in understanding the wide diversity in human behaviour and in economic outcomes.

  20. Synchronization of networks

    Indian Academy of Sciences (India)

    We study the synchronization of coupled dynamical systems on networks. The dynamics is governed by a local nonlinear oscillator for each node of the network and interactions connecting different nodes via the links of the network. We consider existence and stability conditions for both single- and multi-cluster ...

  1. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm

    2017-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how such gender......Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how...... such gendering of entrepreneurs’ networks differ between societies and cultures. Research Design: Based on survey data from the Global Entrepreneurships Monitor, a sample of 16,365 entrepreneurs is used to compare the gendering of entrepreneurs’ networks in China, and five countries largely located around...... the Persian Gulf, namely Yemen, Iran, Saudi Arabia, Qatar and United Arab Emirates. Findings: Analyses show that female entrepreneurs tend to have slightly larger private sphere networks than male entrepreneurs. The differences between male and female entrepreneurs’ networking in the public sphere...

  2. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  3. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  4. Optimal Fragile Financial Networks

    NARCIS (Netherlands)

    Castiglionesi, F.; Navarro, N.

    2007-01-01

    We study a financial network characterized by the presence of depositors, banks and their shareholders. Belonging to a financial network is beneficial for both the depositors and banks' shareholders since the return to investment increases with the number of banks connected. However, the network is

  5. Actor-Network Procedures

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Ramanujam, R.; Ramaswamy, Srini

    2012-01-01

    In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks, as an extension

  6. Herding Complex Networks

    KAUST Repository

    Ruf, Sebastian F.; Egersted, Magnus; Shamma, Jeff S.

    2018-01-01

    the ability to drive a system to a specific set in the state space, was recently introduced as an alternative network control notion. This paper considers the application of herdability to the study of complex networks. The herdability of a class of networked

  7. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  8. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  9. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    different online networks for communities of people who share interests or individuals who presents themselves through user produced content is what makes up the social networking of today. The purpose of this paper is to discuss perceived user requirements to the next generation social networks. The paper...

  10. Hillary Clinton kutsus Lennart Meri USAsse Euroopa eestkõnelejaks

    Index Scriptorium Estoniae

    2004-01-01

    President Lennart Meri võõrustas Eestis visiidil viibinud senaator Hillary Clintonit. Pr. Clintoni arvates vajaks USA Vaclav Haveli ja Lennart Meri taoliste Euroopat sügavuti tundvate inimeste selgitusi

  11. DIGITAL FLOOD INSURANCE RATE MAP DATABASE, CLINTON COUNTY, MISSOURI, USA

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Digital Flood Insurance Rate Map (DFIRM) Database depicts flood risk information and supporting data used to develop the risk data. The primary risk...

  12. OrthoImagery submittal for Clinton County, Indiana

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — Digital orthographic imagery datasets contain georeferenced images of the Earth?s surface, collected by a sensor in which object displacement has been removed for...

  13. Solar energy system economic evaluation: IBM System 4, Clinton, Mississippi

    Science.gov (United States)

    1980-01-01

    An economic analysis of the solar energy system was developed for five sites, typical of a wide range of environmental and economic conditions in the continental United States. The analysis was based on the technical and economic models in the F-chart design procedure, with inputs based on the characteristic of the installed system and local conditions. The results are of the economic parameters of present worth of system cost over a 20 year time span: life cycle savings, year of positive savings and year of payback for the optimized solar energy system at each of the analysis sites. The sensitivity of the economic evaluation to uncertainties in constituent system and economic variables is also investigated.

  14. Status of the Clinton P. Anderson Meson Physics Facility (LAMPF)

    International Nuclear Information System (INIS)

    Jain, M.; Rosen, L.

    1975-01-01

    A brief history and a description of the LAMPF Linac is given, followed by a discussion of the experimental areas, some selected experimental results, and some practical applications. Differential cross section data for n-p charge exchange scattering near 640 MeV are compared with data taken on other machines, and data on pion scattering are presented. The application of negative pions to the treatment of cancer is discussed

  15. Needed: A Clinton Crusade for Quality and Equality.

    Science.gov (United States)

    Clinchy, Evans

    1993-01-01

    Our present factory-model educational system, now desperately undergoing "restructuring," was never intended as a social equalizer but as a great American academic and social sorting machine. The archaic, restrictive goals of America 2000 are doomed, along with narrowly defined intelligence quotients. A more revolutionary, restructuring…

  16. DIGITAL FLOOD INSURANCE RATE MAP DATABASE, CLINTON COUNTY, USA

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Floodplain Mapping/Redelineation study deliverables depict and quantify the flood risks for the study area. The primary risk classifications used are the...

  17. Crime e castigo nos Estados Unidos: de Nixon a Clinton

    Directory of Open Access Journals (Sweden)

    Loïc Wacquant

    1999-11-01

    Full Text Available Este artigo analisa o crescimento exponencial do número de detentos ocorrido nos Estados Unidos a partir de meados dos anos 70. Procura mostrar que esse crescimento não corresponde a um aumento da criminalidade, mas à conjugação de três séries causais, quais sejam: o declínio do "ideal de reabilitação" dos prisioneiros, a instrumentalização do medo da violência pelos políticos e pela mídia e a função de mecanismo de controle racial assumido pelo sistema penal americano. Em suma, a hiperflação carcerária revela a contraface do enfraquecimento do Estado de Bem-Estar Social e a sua substituição por um Estado penal.

  18. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  19. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  20. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique; Ahmad, Qutbuddin S.

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009

  1. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  2. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  3. Logistical networking: a global storage network

    International Nuclear Information System (INIS)

    Beck, Micah; Moore, Terry

    2005-01-01

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it

  4. Learning conditional Gaussian networks

    DEFF Research Database (Denmark)

    Bøttcher, Susanne Gammelgaard

    This paper considers conditional Gaussian networks. The parameters in the network are learned by using conjugate Bayesian analysis. As conjugate local priors, we apply the Dirichlet distribution for discrete variables and the Gaussian-inverse gamma distribution for continuous variables, given...... a configuration of the discrete parents. We assume parameter independence and complete data. Further, to learn the structure of the network, the network score is deduced. We then develop a local master prior procedure, for deriving parameter priors in these networks. This procedure satisfies parameter...... independence, parameter modularity and likelihood equivalence. Bayes factors to be used in model search are introduced. Finally the methods derived are illustrated by a simple example....

  5. Network Characterization Service (NCS)

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yang, George [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Crowley, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-06-06

    Distributed applications require information to effectively utilize the network. Some of the information they require is the current and maximum bandwidth, current and minimum latency, bottlenecks, burst frequency, and congestion extent. This type of information allows applications to determine parameters like optimal TCP buffer size. In this paper, we present a cooperative information-gathering tool called the network characterization service (NCS). NCS runs in user space and is used to acquire network information. Its protocol is designed for scalable and distributed deployment, similar to DNS. Its algorithms provide efficient, speedy and accurate detection of bottlenecks, especially dynamic bottlenecks. On current and future networks, dynamic bottlenecks do and will affect network performance dramatically.

  6. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  7. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  8. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  9. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  10. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  11. Entropy of network ensembles

    Science.gov (United States)

    Bianconi, Ginestra

    2009-03-01

    In this paper we generalize the concept of random networks to describe network ensembles with nontrivial features by a statistical mechanics approach. This framework is able to describe undirected and directed network ensembles as well as weighted network ensembles. These networks might have nontrivial community structure or, in the case of networks embedded in a given space, they might have a link probability with a nontrivial dependence on the distance between the nodes. These ensembles are characterized by their entropy, which evaluates the cardinality of networks in the ensemble. In particular, in this paper we define and evaluate the structural entropy, i.e., the entropy of the ensembles of undirected uncorrelated simple networks with given degree sequence. We stress the apparent paradox that scale-free degree distributions are characterized by having small structural entropy while they are so widely encountered in natural, social, and technological complex systems. We propose a solution to the paradox by proving that scale-free degree distributions are the most likely degree distribution with the corresponding value of the structural entropy. Finally, the general framework we present in this paper is able to describe microcanonical ensembles of networks as well as canonical or hidden-variable network ensembles with significant implications for the formulation of network-constructing algorithms.

  12. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  13. Networks in ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2016-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  14. Networks in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00260714; The ATLAS collaboration

    2017-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  15. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  16. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  17. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Jimenez, Tamara

    2013-01-01

    The use of cognition is a promising element for the control of heterogeneous optical networks. Not only are cognitive networks able to sense current network conditions and act according to them, but they also take into account the knowledge acquired through past experiences; that is, they include...... learning with the aim of improving performance. In this paper, we review the fundamentals of cognitive networks and focus on their application to the optical networking area. In particular, a number of cognitive network architectures proposed so far, as well as their associated supporting technologies......, are reviewed. Moreover, several applications, mainly developed in the framework of the EU FP7 Cognitive Heterogeneous Reconfigurable Optical Network (CHRON) project, are also described....

  18. Attachment and social networks.

    Science.gov (United States)

    Gillath, Omri; C Karantzas, Gery; Lee, Juwon

    2018-02-21

    The current review covers two lines of research linking attachment and social networks. One focuses on attachment networks (the people who fulfill one's attachment needs), examining composition and age-related differences pertaining to these networks. The other line integrates attachment with social network analysis to investigate how individual differences in adult attachment are associated with the management and characteristics (e.g., density, multiplexity, and centrality) of people's social networks. We show that most people's attachment networks are small and hierarchical, with one figure being the primary attachment figure (often a mother or romantic partner, depending on age). Furthermore, attachment style predicts network characteristics and management, such that insecurity is associated with less closeness, multiplexity, centrality, and poorer management (less maintenance, more dissolution). Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Setting up virtual private network

    International Nuclear Information System (INIS)

    Huang Hongmei; Zhang Chengjun

    2003-01-01

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise's network function and enlarges its private scope. The text introduces virtual private network's principal, privileges and protocols that use in virtual private network. At last, this paper introduces several setting up virtual private network's technologies which based on LAN

  20. Setting up virtual private network

    International Nuclear Information System (INIS)

    Huang Hongmei; Zhang Chengjun

    2003-01-01

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise network function and enlarges its private scope. This text introduces virtual private network principal, privileges and protocols applied in virtual private network. At last, this paper introduces several setting up virtual private network technologies which is based on LAN

  1. Networks : Empowering Communities through Telecentre Networking

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... Egypt, Syria, Lebanon and Morocco - have pulled together in loose networks for peer support. ... IDRC “unpacks women's empowerment” at McGill University Conference ... New funding opportunity for gender equality and climate change.

  2. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  3. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  4. Organization of complex networks

    Science.gov (United States)

    Kitsak, Maksim

    Many large complex systems can be successfully analyzed using the language of graphs and networks. Interactions between the objects in a network are treated as links connecting nodes. This approach to understanding the structure of networks is an important step toward understanding the way corresponding complex systems function. Using the tools of statistical physics, we analyze the structure of networks as they are found in complex systems such as the Internet, the World Wide Web, and numerous industrial and social networks. In the first chapter we apply the concept of self-similarity to the study of transport properties in complex networks. Self-similar or fractal networks, unlike non-fractal networks, exhibit similarity on a range of scales. We find that these fractal networks have transport properties that differ from those of non-fractal networks. In non-fractal networks, transport flows primarily through the hubs. In fractal networks, the self-similar structure requires any transport to also flow through nodes that have only a few connections. We also study, in models and in real networks, the crossover from fractal to non-fractal networks that occurs when a small number of random interactions are added by means of scaling techniques. In the second chapter we use k-core techniques to study dynamic processes in networks. The k-core of a network is the network's largest component that, within itself, exhibits all nodes with at least k connections. We use this k-core analysis to estimate the relative leadership positions of firms in the Life Science (LS) and Information and Communication Technology (ICT) sectors of industry. We study the differences in the k-core structure between the LS and the ICT sectors. We find that the lead segment (highest k-core) of the LS sector, unlike that of the ICT sector, is remarkably stable over time: once a particular firm enters the lead segment, it is likely to remain there for many years. In the third chapter we study how

  5. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  6. Adverse Outcome Pathway Networks II: Network Analytics.

    Science.gov (United States)

    Villeneuve, Daniel L; Angrish, Michelle M; Fortin, Marie C; Katsiadaki, Ioanna; Leonard, Marc; Margiotta-Casaluci, Luigi; Munn, Sharon; O'Brien, Jason M; Pollesch, Nathan L; Smith, L Cody; Zhang, Xiaowei; Knapen, Dries

    2018-02-28

    Toxicological responses to stressors are more complex than the simple one biological perturbation to one adverse outcome model portrayed by individual adverse outcome pathways (AOPs). Consequently, the AOP framework was designed to facilitate de facto development of AOP networks that can aid understanding and prediction of pleiotropic and interactive effects more common to environmentally realistic, complex exposure scenarios. The present paper introduces nascent concepts related to the qualitative analysis of AOP networks. First, graph theory-based approaches for identifying important topological features are illustrated using two example AOP networks derived from existing AOP descriptions. Second, considerations for identifying the most significant path(s) through an AOP network from either a biological or risk assessment perspective are described. Finally, approaches for identifying interactions among AOPs that may result in additive, synergistic, or antagonistic responses, or previously undefined emergent patterns of response, are introduced. Along with a companion article (Knapen et al. part I), these concepts set the stage for development of tools and case studies that will facilitate more rigorous analysis of AOP networks, and the utility of AOP network-based predictions, for use in research and regulatory decision-making. Collectively, this work addresses one of the major themes identified through a SETAC Horizon Scanning effort focused on advancing the AOP framework. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  7. Quantum and semiclassical spin networks: from atomic and molecular physics to quantum computing and gravity

    Science.gov (United States)

    Aquilanti, Vincenzo; Bitencourt, Ana Carla P.; Ferreira, Cristiane da S.; Marzuoli, Annalisa; Ragni, Mirco

    2008-11-01

    The mathematical apparatus of quantum-mechanical angular momentum (re)coupling, developed originally to describe spectroscopic phenomena in atomic, molecular, optical and nuclear physics, is embedded in modern algebraic settings which emphasize the underlying combinatorial aspects. SU(2) recoupling theory, involving Wigner's 3nj symbols, as well as the related problems of their calculations, general properties, asymptotic limits for large entries, nowadays plays a prominent role also in quantum gravity and quantum computing applications. We refer to the ingredients of this theory—and of its extension to other Lie and quantum groups—by using the collective term of 'spin networks'. Recent progress is recorded about the already established connections with the mathematical theory of discrete orthogonal polynomials (the so-called Askey scheme), providing powerful tools based on asymptotic expansions, which correspond on the physical side to various levels of semi-classical limits. These results are useful not only in theoretical molecular physics but also in motivating algorithms for the computationally demanding problems of molecular dynamics and chemical reaction theory, where large angular momenta are typically involved. As for quantum chemistry, applications of these techniques include selection and classification of complete orthogonal basis sets in atomic and molecular problems, either in configuration space (Sturmian orbitals) or in momentum space. In this paper, we list and discuss some aspects of these developments—such as for instance the hyperquantization algorithm—as well as a few applications to quantum gravity and topology, thus providing evidence of a unifying background structure.

  8. Recent advances on failure and recovery in networks of networks

    International Nuclear Information System (INIS)

    Shekhtman, Louis M.; Danziger, Michael M.; Havlin, Shlomo

    2016-01-01

    Until recently, network science has focused on the properties of single isolated networks that do not interact or depend on other networks. However it has now been recognized that many real-networks, such as power grids, transportation systems, and communication infrastructures interact and depend on other networks. Here, we will present a review of the framework developed in recent years for studying the vulnerability and recovery of networks composed of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes, like for example certain people, play a role in two networks, i.e. in a multiplex. Dependency relations may act recursively and can lead to cascades of failures concluding in sudden fragmentation of the system. We review the analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. The general theory and behavior of interdependent networks has many novel features that are not present in classical network theory. Interdependent networks embedded in space are significantly more vulnerable compared to non-embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences. Finally, when recovery of components is possible, global spontaneous recovery of the networks and hysteresis phenomena occur. The theory developed for this process points to an optimal repairing strategy for a network of networks. Understanding realistic effects present in networks of networks is required in order to move towards determining system vulnerability.

  9. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  10. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  11. Local dependency in networks

    Directory of Open Access Journals (Sweden)

    Kudĕlka Miloš

    2015-06-01

    Full Text Available Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network’s nodes from the structure in local surroundings of individual nodes. For the tasks we deal with in this article, the key technical parameter is locality. Since only the surroundings of the examined nodes are used in computations, there is no need to analyze the entire network. This allows the application of our approach in the area of large-scale networks. We present several experiments using small networks as well as large-scale artificial and real world networks. The results of the experiments show high effectiveness due to the locality of our approach and also high quality node ranking comparable to PageRank.

  12. Serial Network Flow Monitor

    Science.gov (United States)

    Robinson, Julie A.; Tate-Brown, Judy M.

    2009-01-01

    Using a commercial software CD and minimal up-mass, SNFM monitors the Payload local area network (LAN) to analyze and troubleshoot LAN data traffic. Validating LAN traffic models may allow for faster and more reliable computer networks to sustain systems and science on future space missions. Research Summary: This experiment studies the function of the computer network onboard the ISS. On-orbit packet statistics are captured and used to validate ground based medium rate data link models and enhance the way that the local area network (LAN) is monitored. This information will allow monitoring and improvement in the data transfer capabilities of on-orbit computer networks. The Serial Network Flow Monitor (SNFM) experiment attempts to characterize the network equivalent of traffic jams on board ISS. The SNFM team is able to specifically target historical problem areas including the SAMS (Space Acceleration Measurement System) communication issues, data transmissions from the ISS to the ground teams, and multiple users on the network at the same time. By looking at how various users interact with each other on the network, conflicts can be identified and work can begin on solutions. SNFM is comprised of a commercial off the shelf software package that monitors packet traffic through the payload Ethernet LANs (local area networks) on board ISS.

  13. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  14. Multilayer Brain Networks

    Science.gov (United States)

    Vaiana, Michael; Muldoon, Sarah Feldt

    2018-01-01

    The field of neuroscience is facing an unprecedented expanse in the volume and diversity of available data. Traditionally, network models have provided key insights into the structure and function of the brain. With the advent of big data in neuroscience, both more sophisticated models capable of characterizing the increasing complexity of the data and novel methods of quantitative analysis are needed. Recently, multilayer networks, a mathematical extension of traditional networks, have gained increasing popularity in neuroscience due to their ability to capture the full information of multi-model, multi-scale, spatiotemporal data sets. Here, we review multilayer networks and their applications in neuroscience, showing how incorporating the multilayer framework into network neuroscience analysis has uncovered previously hidden features of brain networks. We specifically highlight the use of multilayer networks to model disease, structure-function relationships, network evolution, and link multi-scale data. Finally, we close with a discussion of promising new directions of multilayer network neuroscience research and propose a modified definition of multilayer networks designed to unite and clarify the use of the multilayer formalism in describing real-world systems.

  15. Innovation and network collaboration

    DEFF Research Database (Denmark)

    Kesting, Peter; Müller, Sabine; Jørgensen, Frances

    2011-01-01

    Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size...... and their inherent shortage of resources. In this paper, we propose that human resource management (HRM) practices may provide a means by which SMEs can increase their innovation capacity through network collaboration. Following a brief presentation of the relevant literature on networks, and innovation in networks...... in particular, and HRM, we analyse and evaluate the potential applicability of existing models for supporting innovation in SMEs participating in networks. Finally, we propose several lines of inquiry arising from our analysis that provide directions for future research....

  16. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  17. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  18. Social cognitive radio networks

    CERN Document Server

    Chen, Xu

    2015-01-01

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  19. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  20. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    Network Service Providers (NSP) often choose to overprovision their networks instead of deploying proper Quality of Services (QoS) mechanisms that allow for traffic differentiation and predictable quality. This tendency of overprovisioning is not sustainable for the simple reason that network...... resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  1. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed...... different manufacturing plants in the network and their impact on network transformation. Findings – The paper highlights the dominant role of manufacturing plants in the continuously changing shape of a manufacturing network. The paper demonstrates that a product or process change at one manufacturing...... by identifying the gaps in the reviewed literature. The paper is based on three case studies undertaken in Danish manufacturing companies to explore in detail their manufacturing plants and networks. The cases provide a sound basis for developing the research questions and explaining the interaction between...

  2. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated. Additionally...... with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with elevation......Aim Interacting communities of species are organized into complex networks, and network analysis is reckoned to be a strong tool for describing their architecture. Many species assemblies show strong macroecological patterns, e.g. increasing species richness with decreasing latitude, but whether...

  3. Bio-inspired networking

    CERN Document Server

    Câmara, Daniel

    2015-01-01

    Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks. Future networks are expected to be autonomous, scalable and adaptive. During millions of years of evolution, nature has developed a number of different systems that present these and other characteristics required for the next generation networks. Indeed, a series of bio-inspired methods have been successfully used to solve the most diverse problems linked to computer networks. This book presents some of these techniques from a theoretical and practical point of view. Discusses the key concepts of bio-inspired networking to aid you in finding efficient networking solutions Delivers examples of techniques both in theoretical concepts and practical applications Helps you apply nature's dynamic resource and task management to your co...

  4. Reflections on Active Networking

    Science.gov (United States)

    2005-01-01

    with a Software Switch for Active Networks ”. We had initially called the project “ SoftSwitch ”, but after some concerns David Farber raised that this...Reflections on Active Networking Jonathan M. Smith CIS Department, University of Pennsylvania jms@cis.upenn.edu Abstract Interactions among...telecommunications networks , computers, and other peripheral devices have been of interest since the earliest distributed computing systems. A key

  5. Personal network (PN) applications

    DEFF Research Database (Denmark)

    Prasad, R.; Skouby, Knud Erik

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  6. Prostate Cancer Biorepository Network

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-14-2-0185 TITLE: Prostate Cancer Biorepository Network PRINCIPAL INVESTIGATOR: Jonathan Melamed, MD CONTRACTING ORGANIZATION...AND SUBTITLE 5a. CONTRACT NUMBER Prostate Cancer Biorepository Network 5b. GRANT NUMBER W81XWH-14-2-0185 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...infrastructure and operations of the Prostate Cancer Biorepository Network (PCBN). The aim of the PCBN is to provide prostate researchers with high-quality

  7. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  8. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  9. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  10. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  11. Molecular ecological network analyses.

    Science.gov (United States)

    Deng, Ye; Jiang, Yi-Huei; Yang, Yunfeng; He, Zhili; Luo, Feng; Zhou, Jizhong

    2012-05-30

    Understanding the interaction among different species within a community and their responses to environmental changes is a central goal in ecology. However, defining the network structure in a microbial community is very challenging due to their extremely high diversity and as-yet uncultivated status. Although recent advance of metagenomic technologies, such as high throughout sequencing and functional gene arrays, provide revolutionary tools for analyzing microbial community structure, it is still difficult to examine network interactions in a microbial community based on high-throughput metagenomics data. Here, we describe a novel mathematical and bioinformatics framework to construct ecological association networks named molecular ecological networks (MENs) through Random Matrix Theory (RMT)-based methods. Compared to other network construction methods, this approach is remarkable in that the network is automatically defined and robust to noise, thus providing excellent solutions to several common issues associated with high-throughput metagenomics data. We applied it to determine the network structure of microbial communities subjected to long-term experimental warming based on pyrosequencing data of 16 S rRNA genes. We showed that the constructed MENs under both warming and unwarming conditions exhibited topological features of scale free, small world and modularity, which were consistent with previously described molecular ecological networks. Eigengene analysis indicated that the eigengenes represented the module profiles relatively well. In consistency with many other studies, several major environmental traits including temperature and soil pH were found to be important in determining network interactions in the microbial communities examined. To facilitate its application by the scientific community, all these methods and statistical tools have been integrated into a comprehensive Molecular Ecological Network Analysis Pipeline (MENAP), which is open

  12. NASA Integrated Network COOP

    Science.gov (United States)

    Anderson, Michael L.; Wright, Nathaniel; Tai, Wallace

    2012-01-01

    Natural disasters, terrorist attacks, civil unrest, and other events have the potential of disrupting mission-essential operations in any space communications network. NASA's Space Communications and Navigation office (SCaN) is in the process of studying options for integrating the three existing NASA network elements, the Deep Space Network, the Near Earth Network, and the Space Network, into a single integrated network with common services and interfaces. The need to maintain Continuity of Operations (COOP) after a disastrous event has a direct impact on the future network design and operations concepts. The SCaN Integrated Network will provide support to a variety of user missions. The missions have diverse requirements and include anything from earth based platforms to planetary missions and rovers. It is presumed that an integrated network, with common interfaces and processes, provides an inherent advantage to COOP in that multiple elements and networks can provide cross-support in a seamless manner. The results of trade studies support this assumption but also show that centralization as a means of achieving integration can result in single points of failure that must be mitigated. The cost to provide this mitigation can be substantial. In support of this effort, the team evaluated the current approaches to COOP, developed multiple potential approaches to COOP in a future integrated network, evaluated the interdependencies of the various approaches to the various network control and operations options, and did a best value assessment of the options. The paper will describe the trade space, the study methods, and results of the study.

  13. Networks in ATLAS

    Science.gov (United States)

    McKee, Shawn; ATLAS Collaboration

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage

  14. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  15. Chaotic diagonal recurrent neural network

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos, and its structure and learning algorithm are designed. The multilayer feedforward neural network, diagonal recurrent neural network, and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map. The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks. (interdisciplinary physics and related areas of science and technology)

  16. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  17. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  18. Networked professional learning

    NARCIS (Netherlands)

    Sloep, Peter

    2013-01-01

    Sloep, P. B. (2013). Networked professional learning. In A. Littlejohn, & A. Margaryan (Eds.), Technology-enhanced Professional Learning: Processes, Practices and Tools (pp. 97–108). London: Routledge.

  19. Directed network modules

    International Nuclear Information System (INIS)

    Palla, Gergely; Farkas, Illes J; Pollner, Peter; Derenyi, Imre; Vicsek, Tamas

    2007-01-01

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs

  20. Networked Instrumentation Element

    Data.gov (United States)

    National Aeronautics and Space Administration — Armstrong researchers have developed a networked instrumentation system that connects modern experimental payloads to existing analog and digital communications...

  1. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ...) to increase competitive advantage, innovation, and mission effectiveness. Network-based effectiveness occurs due to the influence of various factors such as people, procedures, technology, and organizations...

  2. Networks and Interactivity

    DEFF Research Database (Denmark)

    Considine, Mark; Lewis, Jenny

    2012-01-01

    of `street-level' employment services staff for the impacts of this. Contrary to expectations, networking has generally declined over the last decade. There are signs of path dependence in networking patterns within each country, but also a convergence of patterns for the UK and Australia......The systemic reform of employment services in OECD countries was driven by New Public Management (NPM) and then post-NPM reforms, when first-phase changes such as privatization were amended with `joined up' processes to help manage fragmentation. This article examines the networking strategies......, but not The Netherlands. Networking appears to be mediated by policy and regulatory imperatives....

  3. Dynamic Sensor Networks

    National Research Council Canada - National Science Library

    Schott, Brian

    2004-01-01

    ...: Declarative Languages and Execution Environment includes topographical soldier interface and a sensor network simulation environment for algorithm development, deployment planning, and operational support. Finally, Task 3...

  4. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  5. Introduction to neural networks

    International Nuclear Information System (INIS)

    Pavlopoulos, P.

    1996-01-01

    This lecture is a presentation of today's research in neural computation. Neural computation is inspired by knowledge from neuro-science. It draws its methods in large degree from statistical physics and its potential applications lie mainly in computer science and engineering. Neural networks models are algorithms for cognitive tasks, such as learning and optimization, which are based on concepts derived from research into the nature of the brain. The lecture first gives an historical presentation of neural networks development and interest in performing complex tasks. Then, an exhaustive overview of data management and networks computation methods is given: the supervised learning and the associative memory problem, the capacity of networks, the Perceptron networks, the functional link networks, the Madaline (Multiple Adalines) networks, the back-propagation networks, the reduced coulomb energy (RCE) networks, the unsupervised learning and the competitive learning and vector quantization. An example of application in high energy physics is given with the trigger systems and track recognition system (track parametrization, event selection and particle identification) developed for the CPLEAR experiment detectors from the LEAR at CERN. (J.S.). 56 refs., 20 figs., 1 tab., 1 appendix

  6. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  7. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  8. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  9. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  10. Competing edge networks

    Science.gov (United States)

    Parsons, Mark; Grindrod, Peter

    2012-06-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails.

  11. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  12. Effective professional networking.

    Science.gov (United States)

    Goolsby, Mary Jo; Knestrick, Joyce M

    2017-08-01

    The reasons for nurse practitioners to develop a professional network are boundless and are likely to change over time. Networking opens doors and creates relationships that support new opportunities, personal development, collaborative research, policy activism, evidence-based practice, and more. Successful professional networking involves shared, mutually beneficial interactions between individuals and/or individuals and groups, regardless of whether it occurs face to face or electronically. This article combines nuggets from the literature with guidance based on the authors' combined experience in networking activities at the local, national, and international levels. ©2017 American Association of Nurse Practitioners.

  13. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  14. Modelling dendritic ecological networks in space: An integrated network perspective

    Science.gov (United States)

    Erin E. Peterson; Jay M. Ver Hoef; Dan J. Isaak; Jeffrey A. Falke; Marie-Josee Fortin; Chris E. Jordan; Kristina McNyset; Pascal Monestiez; Aaron S. Ruesch; Aritra Sengupta; Nicholas Som; E. Ashley Steel; David M. Theobald; Christian E. Torgersen; Seth J. Wenger

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of...

  15. Better sales networks.

    Science.gov (United States)

    Ustüner, Tuba; Godes, David

    2006-01-01

    Anyone in sales will tell you that social networks are critical. The more contacts you have, the more leads you'll generate, and, ultimately, the more sales you'll make. But that's a vast oversimplification. Different configurations of networks produce different results, and the salesperson who develops a nuanced understanding of social networks will outshine competitors. The salesperson's job changes over the course of the selling process. Different abilities are required in each stage of the sale: identifying prospects, gaining buy-in from potential customers, creating solutions, and closing the deal. Success in the first stage, for instance, depends on the salesperson acquiring precise and timely information about opportunities from contacts in the marketplace. Closing the deal requires the salesperson to mobilize contacts from prior sales to act as references. Managers often view sales networks only in terms of direct contacts. But someone who knows lots of people doesn't necessarily have an effective network because networks often pay off most handsomely through indirect contacts. Moreover, the density of the connections in a network is important. Do a salesperson's contacts know all the same people, or are their associates widely dispersed? Sparse networks are better, for example, at generating unique information. Managers can use three levers--sales force structure, compensation, and skills development--to encourage salespeople to adopt a network-based view and make the best possible use of social webs. For example, the sales force can be restructured to decouple lead generation from other tasks because some people are very good at building diverse ties but not so good at maintaining other kinds of networks. Companies that take steps of this kind to help their sales teams build better networks will reap tremendous advantages.

  16. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  17. The Benefits of Grid Networks

    Science.gov (United States)

    Tennant, Roy

    2005-01-01

    In the article, the author talks about the benefits of grid networks. In speaking of grid networks the author is referring to both networks of computers and networks of humans connected together in a grid topology. Examples are provided of how grid networks are beneficial today and the ways in which they have been used.

  18. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  19. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  20. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  1. Classroom Computer Network.

    Science.gov (United States)

    Lent, John

    1984-01-01

    This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)

  2. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various...

  3. Online Social Network Interactions:

    Directory of Open Access Journals (Sweden)

    Hui-Jung Chang

    2018-01-01

    Full Text Available A cross-cultural comparison of social networking structure on McDonald’s Facebook fan sites between Taiwan and the USA was conducted utilizing the individualism/collectivism dimension proposed by Hofstede. Four network indicators are used to describe the network structure of McDonald’s Facebook fan sites: size, density, clique and centralization. Individuals who post on both Facebook sites for the year of 2012 were considered as network participants for the purpose of the study. Due to the huge amount of data, only one thread of postings was sampled from each month of the year of 2012. The final data consists of 1002 postings written by 896 individuals and 5962 postings written by 5532 individuals from Taiwan and the USA respectively. The results indicated that the USA McDonald’s Facebook fan network has more fans, while Taiwan’s McDonald’s Facebook fan network is more densely connected. Cliques did form among the overall multiplex and within the individual uniplex networks in two countries, yet no significant differences were found between them. All the fan networks in both countries are relatively centralized, mostly on the site operators.

  4. Brokerage in SME networks

    NARCIS (Netherlands)

    Kirkels, Y.E.M.; Duysters, G.M.

    2010-01-01

    This study focuses on SME networks of design and high-tech companies in Southeast Netherlands. By highlighting the personal networks of members across design and high-tech industries, the study attempts to identify the main brokers in this dynamic environment. In addition, we investigate whether

  5. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  6. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  7. Joint Hub Network Development

    NARCIS (Netherlands)

    Cruijssen, F.C.A.M.; Borm, P.E.M.; Dullaert, W.; Hamers, H.J.M.

    2007-01-01

    This paper introduces a framework for joint hub network development. Building a joint physical hub for transhipment of goods is expensive and therefore involves considerable risks for the cooperating companies. In a practical setting, it is unlikely that an entire network will be built at once.

  8. FTS2000 network architecture

    Science.gov (United States)

    Klenart, John

    1991-01-01

    The network architecture of FTS2000 is graphically depicted. A map of network A topology is provided, with interservice nodes. Next, the four basic element of the architecture is laid out. Then, the FTS2000 time line is reproduced. A list of equipment supporting FTS2000 dedicated transmissions is given. Finally, access alternatives are shown.

  9. Local Area Networks.

    Science.gov (United States)

    Marks, Kenneth E.; Nielsen, Steven

    1991-01-01

    Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)

  10. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and......, hopefully, to enhance the level of security provided by these solutions even further....

  11. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  12. Network SCADA System

    International Nuclear Information System (INIS)

    Milivojevic, Dragan R.; Tasic, Visa; Karabasevic, Dejan

    2003-01-01

    Copper Institute, Industrial Informatics department, is developing and applying network real time process monitoring and control systems. Some of these systems are already in use. The paper presents some hardware and software general remarks and performances, with special regard to communication sub-systems and network possibilities. (Author)

  13. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... organisation theories and theories about strategic management....

  14. Network Visualization Project (NVP)

    Science.gov (United States)

    2016-07-01

    Application data flow .............................................................................2 Fig. 2 Sample JSON data...interface supporting improved network analysis and network communication visualization. 2. Application Design NVP consists of 2 parts: back-end data...notation ( JSON ) format. This JSON is provided as input to the front-end application of the project. This interaction of the user with the back-end

  15. Building the quantum network

    International Nuclear Information System (INIS)

    Elliott, Chip

    2002-01-01

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  16. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2017-01-01

    A telecommunications network is an electronic system of links, nodes and the controls that govern their operations to allow voice and data transfer among users and devices. This fully revised, updated and expanded second edition covers all aspects of today's networks, including how they are planned, formed and operated.

  17. The Photograph as Network

    DEFF Research Database (Denmark)

    Wiegand, Frauke Katharina

    2017-01-01

    Inspired by actor-network theory (ANT), this article develops a theoretical framework to grasp the dynamic visual work of memory. It introduces three sensitizing concepts of actor-network methodology, namely entanglement, relationality and traceability, and operationalizes them in a methodological...

  18. Networked business process management

    NARCIS (Netherlands)

    Grefen, P.W.P.J.

    2013-01-01

    In the current economy, a shift can be seen from stand-alone business organizations to networks of tightly collaborating business organizations. To allow this tight collaboration, business process management in these collaborative networks is becoming increasingly important. This paper discusses

  19. Integrating networks with Mathematica

    NARCIS (Netherlands)

    Strijkers, R.J.; Meijer, R.J.

    2008-01-01

    We have developed a concept that considers network behavior as a collection of software objects, which can be used or modified in computer programs. The interfaces of these software objects are exposed as web services and enable applications to analyze and manipulate networks, e.g. to find

  20. Communication Network Analysis Methods.

    Science.gov (United States)

    Farace, Richard V.; Mabee, Timothy

    This paper reviews a variety of analytic procedures that can be applied to network data, discussing the assumptions and usefulness of each procedure when applied to the complexity of human communication. Special attention is paid to the network properties measured or implied by each procedure. Factor analysis and multidimensional scaling are among…

  1. CRCHD Integrated Networks

    Science.gov (United States)

    INB supports two network-based programs—the National Outreach Network (NON) and the Geographic Management of Cancer Health Disparities Program (GMaP)—as well as advising on women’s health and sexual and gender minority opportunities within and across the NCI.

  2. A balanced memory network.

    Directory of Open Access Journals (Sweden)

    Yasser Roudi

    2007-09-01

    Full Text Available A fundamental problem in neuroscience is understanding how working memory--the ability to store information at intermediate timescales, like tens of seconds--is implemented in realistic neuronal networks. The most likely candidate mechanism is the attractor network, and a great deal of effort has gone toward investigating it theoretically. Yet, despite almost a quarter century of intense work, attractor networks are not fully understood. In particular, there are still two unanswered questions. First, how is it that attractor networks exhibit irregular firing, as is observed experimentally during working memory tasks? And second, how many memories can be stored under biologically realistic conditions? Here we answer both questions by studying an attractor neural network in which inhibition and excitation balance each other. Using mean-field analysis, we derive a three-variable description of attractor networks. From this description it follows that irregular firing can exist only if the number of neurons involved in a memory is large. The same mean-field analysis also shows that the number of memories that can be stored in a network scales with the number of excitatory connections, a result that has been suggested for simple models but never shown for realistic ones. Both of these predictions are verified using simulations with large networks of spiking neurons.

  3. Advanced Polymer Network Structures

    Science.gov (United States)

    2016-02-01

    attractive interaction (n = 2.0) and a neutral interaction (n = 1.0); n is equal to unity for self-interactions among the monomers of first network and...... Network Structures by Robert Lambeth, Joseph Lenhart, and Tim Sirk Weapons and Materials Research Directorate, ARL Yelena Sliozberg TKC Global

  4. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  5. Home area networks

    NARCIS (Netherlands)

    Koonen, A.M.J.

    2013-01-01

    This article consists of a collection of slides from the author's conference presentation. Some of the specific areas/topics discussed include: Convergence in home networks, home service scenarios; Home wired network architectures, CapEx and OpEx; Residential Gateway; Optical fiber types;

  6. Personalized Home-Networks

    DEFF Research Database (Denmark)

    Soler, José; Gandy, Michael

    2007-01-01

    The paper provides details of a home-networking architecture based on an enhanced residential gateway. Initially the need for mechanisms allowing user-dependent network behavior is described and afterwards details of an initial implementation are provided in terms of architectural description...

  7. CAISSON: Interconnect Network Simulator

    Science.gov (United States)

    Springer, Paul L.

    2006-01-01

    Cray response to HPCS initiative. Model future petaflop computer interconnect. Parallel discrete event simulation techniques for large scale network simulation. Built on WarpIV engine. Run on laptop and Altix 3000. Can be sized up to 1000 simulated nodes per host node. Good parallel scaling characteristics. Flexible: multiple injectors, arbitration strategies, queue iterators, network topologies.

  8. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  9. Deep Spiking Networks

    NARCIS (Netherlands)

    O'Connor, P.; Welling, M.

    2016-01-01

    We introduce an algorithm to do backpropagation on a spiking network. Our network is "spiking" in the sense that our neurons accumulate their activation into a potential over time, and only send out a signal (a "spike") when this potential crosses a threshold and the neuron is reset. Neurons only

  10. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  11. Competing Transport Networks

    NARCIS (Netherlands)

    M.J. van der Leij (Marco)

    2003-01-01

    textabstractIn a circular city model, I consider network design and pricing decisions for a single fast transport connection that faces competition from a slower but better accessible transport mode. To access the fast transport network individuals have to make complementary trips by slow mode. This

  12. Robustness Envelopes of Networks

    NARCIS (Netherlands)

    Trajanovski, S.; Martín-Hernández, J.; Winterbach, W.; Van Mieghem, P.

    2013-01-01

    We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case

  13. Innovation in Virtual Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    2011-01-01

    The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective......The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective...

  14. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  15. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  16. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    In the present paper we consider the allocation of cost in connection networks. Agents have connection demands in form of pairs of locations they want to be connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection demands...

  17. Wireless Sensor Networks Approach

    Science.gov (United States)

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  18. Trends in Optical Networks

    Indian Academy of Sciences (India)

    Integrated TDM/IP Service Network: Built using next-generation SDH · Case 2: ISP Backbone over SONET/SDH · Solution for the PoPs · Solution for the Gateway site · Case 3: Ethernet Leased Line Services over Existing Infrastructure · Transport for Mobile Voice/Data Networks · Functions needed for mapping Ethernet to ...

  19. Clustering of correlated networks

    OpenAIRE

    Dorogovtsev, S. N.

    2003-01-01

    We obtain the clustering coefficient, the degree-dependent local clustering, and the mean clustering of networks with arbitrary correlations between the degrees of the nearest-neighbor vertices. The resulting formulas allow one to determine the nature of the clustering of a network.

  20. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  1. Network ties and survival

    DEFF Research Database (Denmark)

    Acheampong, George; Narteh, Bedman; Rand, John

    2017-01-01

    Poultry farming has been touted as one of the major ways by which poverty can be reduced in low-income economies like Ghana. Yet, anecdotally there is a high failure rate among these poultry farms. This current study seeks to understand the relationship between network ties and survival chances...... of small commercial poultry farms (SCPFs). We utilize data from a 2-year network survey of SCPFs in rural Ghana. The survival of these poultry farms are modelled using a lagged probit model of farms that persisted from 2014 into 2015. We find that network ties are important to the survival chances...... but this probability reduces as the number of industry ties increases but moderation with dynamic capability of the firm reverses this trend. Our findings show that not all network ties aid survival and therefore small commercial poultry farmers need to be circumspect in the network ties they cultivate and develop....

  2. Categorical Tensor Network States

    Directory of Open Access Journals (Sweden)

    Jacob D. Biamonte

    2011-12-01

    Full Text Available We examine the use of string diagrams and the mathematics of category theory in the description of quantum states by tensor networks. This approach lead to a unification of several ideas, as well as several results and methods that have not previously appeared in either side of the literature. Our approach enabled the development of a tensor network framework allowing a solution to the quantum decomposition problem which has several appealing features. Specifically, given an n-body quantum state |ψ〉, we present a new and general method to factor |ψ〉 into a tensor network of clearly defined building blocks. We use the solution to expose a previously unknown and large class of quantum states which we prove can be sampled efficiently and exactly. This general framework of categorical tensor network states, where a combination of generic and algebraically defined tensors appear, enhances the theory of tensor network states.

  3. Organization Virtual or Networked?

    Directory of Open Access Journals (Sweden)

    Rūta Tamošiūnaitė

    2013-08-01

    Full Text Available Purpose—to present distinction between “virtual organization” and “networked organization”; giving their definitions.Design/methodology/approach—review of previous researches, systemic analyses of their findings and synthesis of distinctive characteristics of ”virtual organization” and “networked organization.”Findings—the main result of the research is key diverse features separating ”virtual organization” and ”networked organization.” Definitions of “virtual organization” and “networked organization” are presented.Originality/Value—distinction between “virtual organization” and “networked organization” creates possibilities to use all advantages of those types of organizations and gives foundation for deeper researches in this field.Research type: general review.

  4. High-Performance Networking

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The series will start with an historical introduction about what people saw as high performance message communication in their time and how that developed to the now to day known "standard computer network communication". It will be followed by a far more technical part that uses the High Performance Computer Network standards of the 90's, with 1 Gbit/sec systems as introduction for an in depth explanation of the three new 10 Gbit/s network and interconnect technology standards that exist already or emerge. If necessary for a good understanding some sidesteps will be included to explain important protocols as well as some necessary details of concerned Wide Area Network (WAN) standards details including some basics of wavelength multiplexing (DWDM). Some remarks will be made concerning the rapid expanding applications of networked storage.

  5. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  6. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    2015-01-01

    In the present paper we consider the allocation of costs in connection networks. Agents have connection demands in form of pairs of locations they want to have connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection...... demands. We use a few axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well...... as all connection costs; (3) the central planner selects a cost minimizing network satisfying reported connection demands based on the estimated costs; and, (4) the planner allocates the true costs of the selected network. It turns out that an allocation rule satisfies the axioms if and only if relative...

  7. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  8. Semaphore network encryption report

    Science.gov (United States)

    Johnson, Karen L.

    1994-03-01

    This paper documents the results of a preliminary assessment performed on the commercial off-the-shelf (COTS) Semaphore Communications Corporation (SCC) Network Security System (NSS). The Semaphore NSS is a family of products designed to address important network security concerns, such as network source address authentication and data privacy. The assessment was performed in the INFOSEC Core Integration Laboratory, and its scope was product usability focusing on interoperability and system performance in an existing operational network. Included in this paper are preliminary findings. Fundamental features and functionality of the Semaphore NSS are identified, followed by details of the assessment, including test descriptions and results. A summary of test results and future plans are also included. These findings will be useful to those investigating the use of commercially available solutions to network authentication and data privacy.

  9. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  10. Theory of spatial networks

    Energy Technology Data Exchange (ETDEWEB)

    Watanabe, T

    1983-01-01

    A new framework of synchronous parallel processing systems called spatial networks is examined, in which the family of all cellular automata is included perfectly. This framework is free from the two restrictions of cellular automata of which one is the finiteness of the set of states of a cell and the other is the countability of an array space. Throughout this article, the relationships between function and structure of spatial networks are considered. First, the necessary and sufficient condition for spatial networks to be uniformly interconnected is given. That for spatial networks to be finitely interconnected is also given with a topological approach. The characterization theorem of cellular automata comes from these results. Second, it is shown that finitely and uniformly interconnected linear spatial networks can be characterized by the convolution form. Last, the conditions for their global mappings to be injective or surjective are discussed. 10 references.

  11. Circuit switched optical networks

    DEFF Research Database (Denmark)

    Kloch, Allan

    2003-01-01

    Some of the most important components required for enabling optical networking are investigated through both experiments and modelling. These all-optical components are the wavelength converter, the regenerator and the space switch. When these devices become "off-the-shelf" products, optical cross......, it is expected that the optical solution will offer an economical benefit for hight bit rate networks. This thesis begins with a discussion of the expected impact on communications systems from the rapidly growing IP traffic, which is expected to become the dominant source for traffic. IP traffic has some...... characteristics, which are best supported by an optical network. The interest for such an optical network is exemplified by the formation of the ACTS OPEN project which aim was to investigate the feasibility of an optical network covering Europe. Part of the work presented in this thesis is carried out within...

  12. Optical packet switched networks

    DEFF Research Database (Denmark)

    Hansen, Peter Bukhave

    1999-01-01

    Optical packet switched networks are investigated with emphasis on the performance of the packet switch blocks. Initially, the network context of the optical packet switched network is described showing that a packet network will provide transparency, flexibility and bridge the granularity gap...... in interferometric wavelength converters is investigated showing that a 10 Gbit/s 19 4x4 swich blocks can be cascaded at a BER of 10-14. An analytical traffic model enables the calculation of the traffice performance of a WDM packet network. Hereby the importance of WDM and wavelegth conversion in the switch blocks...... is established as a flexible means to reduce the optical buffer, e.g., the number of fibre delay lines for a 16x16 switch block is reduced from 23 to 6 by going from 2 to 8 wavelength channels pr. inlet. Additionally, a component count analysis is carried out to illustrate the trade-offs in the switch block...

  13. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  14. Maintenance of family networks

    DEFF Research Database (Denmark)

    marsico, giuseppina; Chaudhary, N; Valsiner, Jaan

    2015-01-01

    Families are social units that expand in time (across generations) and space (as a geographically distributed sub-structures of wider kinship networks). Understanding of intergenerational family relations thus requires conceptualization of communication processes that take place within a small...... collective of persons linked with one another by a flexible social network. Within such networks, Peripheral Communication Patterns set the stage for direct everyday life activities within the family context. Peripheral Communication Patterns are conditions where one family network member (A) communicates...... manifestly with another member (B) with the aim of bringing the communicative message to the third member (C) who is present but is not explicitly designated as the manifest addressee of the intended message. Inclusion of physically non-present members of the family network (elders living elsewhere, deceased...

  15. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Competing edge networks

    International Nuclear Information System (INIS)

    Parsons, Mark; Grindrod, Peter

    2012-01-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails. -- Highlights: ► A model for edgewise-competing evolving network pairs is introduced. ► Defined competition equations yield to a mean field analysis. ► Multiple equilibrium states and different bifurcation types can occur. ► The system is sensitive to sparse initial conditions and near unstable equilibriums.

  18. Complex Networks IX

    CERN Document Server

    Coronges, Kate; Gonçalves, Bruno; Sinatra, Roberta; Vespignani, Alessandro; Proceedings of the 9th Conference on Complex Networks; CompleNet 2018

    2018-01-01

    This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks. It collects the works presented at the 9th International Conference on Complex Networks (CompleNet) 2018 in Boston, MA in March, 2018. With roots in physical, information and social science, the study of complex networks provides a formal set of mathematical methods, computational tools and theories to describe prescribe and predict dynamics and behaviors of complex systems. Despite their diversity, whether the systems are made up of physical, technological, informational, or social networks, they share many common organizing principles and thus can be studied with similar approaches. This book provides a view of the state-of-the-art in this dynamic field and covers topics such as group decision-making, brain and cellular connectivity, network controllability and resiliency, online activism, recommendation systems, and cyber security.

  19. Tinnitus: Network pathophysiology-network pharmacology

    Directory of Open Access Journals (Sweden)

    Ana Belen eElgoyhen

    2012-01-01

    Full Text Available Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for 1 in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single FDA-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in central nervous system pathologies is changing from that of magic bullets that target individual chemoreceptors or disease-causing genes into that of magic shotguns, promiscuous or dirty drugs that target disease-causing networks, also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  20. Tinnitus: network pathophysiology-network pharmacology.

    Science.gov (United States)

    Elgoyhen, Ana B; Langguth, Berthold; Vanneste, Sven; De Ridder, Dirk

    2012-01-01

    Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for one in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single Food and Drug Administration (FDA)-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system (CNS) disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in CNS pathologies is changing from that of "magic bullets" that target individual chemoreceptors or "disease-causing genes" into that of "magic shotguns," "promiscuous" or "dirty drugs" that target "disease-causing networks," also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  1. Network topology descriptions in hybrid networks

    NARCIS (Netherlands)

    Grosso, P.; Brown, A.; Cedeyn, A.; Dijkstra, F.; van der Ham, J.; Patil, A.; Primet, P.; Swany, M.; Zurawski, J.

    2010-01-01

    The NML-WG goal is to define a schema for describing topologies of hybrid networks. This schema is in first instance intended for: • lightpath provisioning applications to exchange topology information intra and inter domain; • reporting performance metrics. This document constitutes Deliverable 1

  2. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  3. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  4. Network class superposition analyses.

    Directory of Open Access Journals (Sweden)

    Carl A B Pearson

    Full Text Available Networks are often used to understand a whole system by modeling the interactions among its pieces. Examples include biomolecules in a cell interacting to provide some primary function, or species in an environment forming a stable community. However, these interactions are often unknown; instead, the pieces' dynamic states are known, and network structure must be inferred. Because observed function may be explained by many different networks (e.g., ≈ 10(30 for the yeast cell cycle process, considering dynamics beyond this primary function means picking a single network or suitable sample: measuring over all networks exhibiting the primary function is computationally infeasible. We circumvent that obstacle by calculating the network class ensemble. We represent the ensemble by a stochastic matrix T, which is a transition-by-transition superposition of the system dynamics for each member of the class. We present concrete results for T derived from boolean time series dynamics on networks obeying the Strong Inhibition rule, by applying T to several traditional questions about network dynamics. We show that the distribution of the number of point attractors can be accurately estimated with T. We show how to generate Derrida plots based on T. We show that T-based Shannon entropy outperforms other methods at selecting experiments to further narrow the network structure. We also outline an experimental test of predictions based on T. We motivate all of these results in terms of a popular molecular biology boolean network model for the yeast cell cycle, but the methods and analyses we introduce are general. We conclude with open questions for T, for example, application to other models, computational considerations when scaling up to larger systems, and other potential analyses.

  5. Network on Target: Remotely Configured Adaptive Tactical Networks

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Bourakov, Eugene

    2006-01-01

    The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer...

  6. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  7. Neural Networks: Implementations and Applications

    OpenAIRE

    Vonk, E.; Veelenturf, L.P.J.; Jain, L.C.

    1996-01-01

    Artificial neural networks, also called neural networks, have been used successfully in many fields including engineering, science and business. This paper presents the implementation of several neural network simulators and their applications in character recognition and other engineering areas

  8. Wireless sensor network topology control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  9. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  10. Flow whitelisting in SCADA networks

    NARCIS (Netherlands)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    Supervisory control and data acquisition (SCADA) networks are commonly deployed in large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber attacks due to the common use of standard communications protocols and increased interconnections with corporate networks and

  11. Real-Time Network Management

    National Research Council Canada - National Science Library

    Riolo, Joseph

    1998-01-01

    .... According to our Phase I research, it is possible to collect data on the network and morph it into queuing models to produce information about the network and physical layers of nodes on a network...

  12. Neural networks for aircraft control

    Science.gov (United States)

    Linse, Dennis

    1990-01-01

    Current research in Artificial Neural Networks indicates that networks offer some potential advantages in adaptation and fault tolerance. This research is directed at determining the possible applicability of neural networks to aircraft control. The first application will be to aircraft trim. Neural network node characteristics, network topology and operation, neural network learning and example histories using neighboring optimal control with a neural net are discussed.

  13. Leadership Networking Connect, Collaborate, Create

    CERN Document Server

    (CCL), Center for Creative Leadership; Baldwin, David

    2011-01-01

    Networking is essential to effective leadership in today's organizations. Leaders who are skilled networkers have access to people, information, and resources to help solve problems and create opportunities. Leaders who neglect their networks are missing out on a critical component of their role as leaders. This book will help leaders take a new view of networking and provide insight into how to enhance their networks and become effective at leadership networking.

  14. Collective Classification in Network Data

    OpenAIRE

    Sen, Prithviraj; Namata, Galileo; Bilgic, Mustafa; Getoor, Lise; University of Maryland; Galligher, Brian; Eliassi-Rad, Tina

    2008-01-01

    Many real-world applications produce networked data such as the world-wide web (hypertext documents connected via hyperlinks), social networks (for example, people connected by friendship links), communication networks (computers connected via communication links) and biological networks (for example, protein interaction networks). A recent focus in machine learning research has been to extend traditional machine learning classification techniques to classify nodes in such networks. In this a...

  15. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  16. Optical Network Testbeds Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Joe Mambretti

    2007-06-01

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking

  17. Networked Microgrids Scoping Study

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dobriansky, Larisa [General MicroGrids, San Diego, CA (United States); Glover, Steve [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Liu, Chen-Ching [Washington State Univ., Pullman, WA (United States); Looney, Patrick [Brookhaven National Lab. (BNL), Upton, NY (United States); Mashayekh, Salman [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Pratt, Annabelle [National Renewable Energy Lab. (NREL), Golden, CO (United States); Schneider, Kevin [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Stadler, Michael [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Starke, Michael [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wang, Jianhui [Argonne National Lab. (ANL), Argonne, IL (United States); Yue, Meng [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-12-05

    Much like individual microgrids, the range of opportunities and potential architectures of networked microgrids is very diverse. The goals of this scoping study are to provide an early assessment of research and development needs by examining the benefits of, risks created by, and risks to networked microgrids. At this time there are very few, if any, examples of deployed microgrid networks. In addition, there are very few tools to simulate or otherwise analyze the behavior of networked microgrids. In this setting, it is very difficult to evaluate networked microgrids systematically or quantitatively. At this early stage, this study is relying on inputs, estimations, and literature reviews by subject matter experts who are engaged in individual microgrid research and development projects, i.e., the authors of this study The initial step of the study gathered input about the potential opportunities provided by networked microgrids from these subject matter experts. These opportunities were divided between the subject matter experts for further review. Part 2 of this study is comprised of these reviews. Part 1 of this study is a summary of the benefits and risks identified in the reviews in Part 2 and synthesis of the research needs required to enable networked microgrids.

  18. Toward Optimal Transport Networks

    Science.gov (United States)

    Alexandrov, Natalia; Kincaid, Rex K.; Vargo, Erik P.

    2008-01-01

    Strictly evolutionary approaches to improving the air transport system a highly complex network of interacting systems no longer suffice in the face of demand that is projected to double or triple in the near future. Thus evolutionary approaches should be augmented with active design methods. The ability to actively design, optimize and control a system presupposes the existence of predictive modeling and reasonably well-defined functional dependences between the controllable variables of the system and objective and constraint functions for optimization. Following recent advances in the studies of the effects of network topology structure on dynamics, we investigate the performance of dynamic processes on transport networks as a function of the first nontrivial eigenvalue of the network's Laplacian, which, in turn, is a function of the network s connectivity and modularity. The last two characteristics can be controlled and tuned via optimization. We consider design optimization problem formulations. We have developed a flexible simulation of network topology coupled with flows on the network for use as a platform for computational experiments.

  19. Wireless mesh networks.

    Science.gov (United States)

    Wang, Xinheng

    2008-01-01

    Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.

  20. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.