WorldWideScience

Sample records for network destruction problem

  1. Bicriteria network design problems

    Energy Technology Data Exchange (ETDEWEB)

    Marathe, M.V.; Ravi, R.; Sundaram, R.; Ravi, S.S.; Rosenkrantz, D.J.; Hunt, H.B. III

    1994-12-31

    We study several bicriteria network design problems phrased as follows: given an undirected graph and two minimization objectives with a budget specified on one objective, find a subgraph satisfying certain connectivity requirements that minimizes the second objective subject to the budget on the first. Define an ({alpha}, {beta})-approximation algorithm as a polynomial-time algorithm that produces a solution in which the first objective value is at most {alpha} times the budget, and the second objective value is at most {alpha} times the minimum cost of a network obeying the budget oil the first objective. We, present the first approximation algorithms for bicriteria problems obtained by combining classical minimization objectives such as the total edge cost of the network, the diameter of the network and a weighted generalization of the maximum degree of any node in the network. We first develop some formalism related to bicriteria problems that leads to a clean way to state bicriteria approximation results. Secondly, when the two objectives are similar but only differ based on the cost function under which they are computed we present a general parametric search technique that yields approximation algorithms by reducing the problem to one of minimizing a single objective of the same type. Thirdly, we present an O(log n, log n)-approximation algorithm for finding a diameter-constrained minimum cost spanning tree of an undirected graph on n nodes generalizing the notion of shallow, light trees and light approximate shortest-path trees that have been studied before. Finally, for the class of treewidth-bounded graphs, we provide pseudopolynomial-time algorithms for a number of bicriteria problems using dynamic programming. These pseudopolynomial-time algorithms can be converted to fully polynomial-time approximation schemes using a scaling technique.

  2. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  3. Competence building or destruction in small business networks

    DEFF Research Database (Denmark)

    Neergaard, Helle

    The paper explores the evolution of government-funded strategic networks among Danish firms. It challenges the preoccupation of both policy makers and management scholars with network structures. It proposes that process analysis at the firm level is better suited to elucidate evolutionary network......, on the other hand, reveals only the discontinuance of the original, government-funded networks. Thus, network success should be measured in terms of competence building, organizational learning and change rather than in terms of longevity and stabillity of network structures....

  4. Neural network and principal component regression in non-destructive soluble solids content assessment: a comparison*

    OpenAIRE

    Chia, Kim-seng; Herlina ABDUL RAHIM; Ruzairi ABDUL RAHIM

    2012-01-01

    Visible and near infrared spectroscopy is a non-destructive, green, and rapid technology that can be utilized to estimate the components of interest without conditioning it, as compared with classical analytical methods. The objective of this paper is to compare the performance of artificial neural network (ANN) (a nonlinear model) and principal component regression (PCR) (a linear model) based on visible and shortwave near infrared (VIS-SWNIR) (400–1000 nm) spectra in the non-destructive sol...

  5. Competence Building or Destruction in Small Business Networks

    DEFF Research Database (Denmark)

    Neergaard, Helle; Nielsen, Kent T.

    The paper explores the evolution of government-funded strategic networks among Danish firms. It challenges the preoccupation of both policy makers and management scholars with network structures. It proposes that process analysis at the firm level is better suited to elucidate evolutionary networ...

  6. Problem Lokalitas dalam Bisnis Radio Network

    Directory of Open Access Journals (Sweden)

    - Rahayu

    2006-03-01

    Full Text Available The emergence of radio network has some consequencies. These relate to the ownership of the network, problems of locality and threads to democracy. Some may view that the networks have strengthened the position of radio. The others believe that the netwrok risks the local power in Indonesia. This article explores the problems of the radio networks in Indonesia, especially when dealing with the local elements.

  7. Controller placement problem in industrial networks

    OpenAIRE

    Macián Ribera, Sergi

    2016-01-01

    SDN is the new trend in networks, for next Mobile and optical networks. Dimensioning, design and optimization of Software Defined Optical Networks. To be done at Technical University Munich (TUM) In this work the Controller Placement Problem (CPP) for SDN architecture is studied when it is applied to industrial networks. En este trabajo se estudia el problema CPP (controller placement problem) para la arquitectura SDN, aplicado a redes industriales. En aquest treball s'estudia el pro...

  8. The role of asymmetric interactions on the effect of habitat destruction in mutualistic networks.

    Directory of Open Access Journals (Sweden)

    Guillermo Abramson

    Full Text Available Plant-pollinator mutualistic networks are asymmetric in their interactions: specialist plants are pollinated by generalist animals, while generalist plants are pollinated by a broad range involving specialists and generalists. It has been suggested that this asymmetric--or disassortative--assemblage could play an important role in determining the observed equal susceptibility of specialist and generalist plants under habitat destruction. At the core of the analysis of the phenomenon lies the observation that specialist plants, otherwise candidates to extinction, could cope with the disruption thanks to their interaction with a few generalist pollinators. We present a theoretical framework that supports this thesis. We analyze a dynamical model of a system of mutualistic plants and pollinators, subject to the destruction of their habitat. We analyze and compare two families of interaction topologies, ranging from highly assortative to highly disassortative ones, as well as real pollination networks. We found that several features observed in natural systems are predicted by the mathematical model. First, there is a tendency to increase the asymmetry of the network as a result of the extinctions. Second, an entropy measure of the differential susceptibility to extinction of specialist and generalist species show that they tend to balance when the network is disassortative. Finally, the disappearance of links in the network, as a result of extinctions, shows that specialist plants preserve more connections than the corresponding plants in an assortative system, enabling them to resist the disruption.

  9. Networks in Social Policy Problems

    Science.gov (United States)

    Vedres, Balázs; Scotti, Marco

    2012-08-01

    1. Introduction M. Scotti and B. Vedres; Part I. Information, Collaboration, Innovation: The Creative Power of Networks: 2. Dissemination of health information within social networks C. Dhanjal, S. Blanchemanche, S. Clemençon, A. Rona-Tas and F. Rossi; 3. Scientific teams and networks change the face of knowledge creation S. Wuchty, J. Spiro, B. F. Jones and B. Uzzi; 4. Structural folds: the innovative potential of overlapping groups B. Vedres and D. Stark; 5. Team formation and performance on nanoHub: a network selection challenge in scientific communities D. Margolin, K. Ognyanova, M. Huang, Y. Huang and N. Contractor; Part II. Influence, Capture, Corruption: Networks Perspectives on Policy Institutions: 6. Modes of coordination of collective action: what actors in policy making? M. Diani; 7. Why skewed distributions of pay for executives is the cause of much grief: puzzles and few answers so far B. Kogut and J.-S. Yang; 8. Networks of institutional capture: a case of business in the State apparatus E. Lazega and L. Mounier; 9. The social and institutional structure of corruption: some typical network configurations of corruption transactions in Hungary Z. Szántó, I. J. Tóth and S. Varga; Part III. Crisis, Extinction, World System Change: Network Dynamics on a Large Scale: 10. How creative elements help the recovery of networks after crisis: lessons from biology A. Mihalik, A. S. Kaposi, I. A. Kovács, T. Nánási, R. Palotai, Á. Rák, M. S. Szalay-Beko and P. Csermely; 11. Networks and globalization policies D. R. White; 12. Network science in ecology: the structure of ecological communities and the biodiversity question A. Bodini, S. Allesina and C. Bondavalli; 13. Supply security in the European natural gas pipeline network M. Scotti and B. Vedres; 14. Conclusions and outlook A.-L. Barabási; Index.

  10. Integrated network design and scheduling problems :

    Energy Technology Data Exchange (ETDEWEB)

    Nurre, Sarah G.; Carlson, Jeffrey J.

    2014-01-01

    We consider the class of integrated network design and scheduling problems. These problems focus on selecting and scheduling operations that will change the characteristics of a network, while being speci cally concerned with the performance of the network over time. Motivating applications of INDS problems include infrastructure restoration after extreme events and building humanitarian distribution supply chains. While similar models have been proposed, no one has performed an extensive review of INDS problems from their complexity, network and scheduling characteristics, information, and solution methods. We examine INDS problems under a parallel identical machine scheduling environment where the performance of the network is evaluated by solving classic network optimization problems. We classify that all considered INDS problems as NP-Hard and propose a novel heuristic dispatching rule algorithm that selects and schedules sets of arcs based on their interactions in the network. We present computational analysis based on realistic data sets representing the infrastructures of coastal New Hanover County, North Carolina, lower Manhattan, New York, and a realistic arti cial community CLARC County. These tests demonstrate the importance of a dispatching rule to arrive at near-optimal solutions during real-time decision making activities. We extend INDS problems to incorporate release dates which represent the earliest an operation can be performed and exible release dates through the introduction of specialized machine(s) that can perform work to move the release date earlier in time. An online optimization setting is explored where the release date of a component is not known.

  11. Neural Network Solves "Traveling-Salesman" Problem

    Science.gov (United States)

    Thakoor, Anilkumar P.; Moopenn, Alexander W.

    1990-01-01

    Experimental electronic neural network solves "traveling-salesman" problem. Plans round trip of minimum distance among N cities, visiting every city once and only once (without backtracking). This problem is paradigm of many problems of global optimization (e.g., routing or allocation of resources) occuring in industry, business, and government. Applied to large number of cities (or resources), circuits of this kind expected to solve problem faster and more cheaply.

  12. Neural network and principal component regression in non-destructive soluble solids content assessment: a comparison.

    Science.gov (United States)

    Chia, Kim-seng; Abdul Rahim, Herlina; Abdul Rahim, Ruzairi

    2012-02-01

    Visible and near infrared spectroscopy is a non-destructive, green, and rapid technology that can be utilized to estimate the components of interest without conditioning it, as compared with classical analytical methods. The objective of this paper is to compare the performance of artificial neural network (ANN) (a nonlinear model) and principal component regression (PCR) (a linear model) based on visible and shortwave near infrared (VIS-SWNIR) (400-1000 nm) spectra in the non-destructive soluble solids content measurement of an apple. First, we used multiplicative scattering correction to pre-process the spectral data. Second, PCR was applied to estimate the optimal number of input variables. Third, the input variables with an optimal amount were used as the inputs of both multiple linear regression and ANN models. The initial weights and the number of hidden neurons were adjusted to optimize the performance of ANN. Findings suggest that the predictive performance of ANN with two hidden neurons outperforms that of PCR.

  13. Neural network and principal component regression in non-destructive soluble solids content assessment: a comparison*

    Science.gov (United States)

    Chia, Kim-seng; Abdul Rahim, Herlina; Abdul Rahim, Ruzairi

    2012-01-01

    Visible and near infrared spectroscopy is a non-destructive, green, and rapid technology that can be utilized to estimate the components of interest without conditioning it, as compared with classical analytical methods. The objective of this paper is to compare the performance of artificial neural network (ANN) (a nonlinear model) and principal component regression (PCR) (a linear model) based on visible and shortwave near infrared (VIS-SWNIR) (400–1000 nm) spectra in the non-destructive soluble solids content measurement of an apple. First, we used multiplicative scattering correction to pre-process the spectral data. Second, PCR was applied to estimate the optimal number of input variables. Third, the input variables with an optimal amount were used as the inputs of both multiple linear regression and ANN models. The initial weights and the number of hidden neurons were adjusted to optimize the performance of ANN. Findings suggest that the predictive performance of ANN with two hidden neurons outperforms that of PCR. PMID:22302428

  14. Generalized network improvement and packing problems

    CERN Document Server

    Holzhauser, Michael

    2016-01-01

    Michael Holzhauser discusses generalizations of well-known network flow and packing problems by additional or modified side constraints. By exploiting the inherent connection between the two problem classes, the author investigates the complexity and approximability of several novel network flow and packing problems and presents combinatorial solution and approximation algorithms. Contents Fractional Packing and Parametric Search Frameworks Budget-Constrained Minimum Cost Flows: The Continuous Case Budget-Constrained Minimum Cost Flows: The Discrete Case Generalized Processing Networks Convex Generalized Flows Target Groups Researchers and students in the fields of mathematics, computer science, and economics Practitioners in operations research and logistics The Author Dr. Michael Holzhauser studied computer science at the University of Kaiserslautern and is now a research fellow in the Optimization Research Group at the Department of Mathematics of the University of Kaiserslautern.

  15. The Generalized Fixed-Charge Network Design Problem

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Stidsen, Thomas K.

    2007-01-01

    In this paper we present the generalized fixed-charge network design (GFCND) problem. The GFCND problem is an instance of the so-called generalized network design problems. In such problems, clusters instead of nodes have to be interconnected by a network. The network interconnecting the clusters...... is a fixed-charge network, and thus the GFCND problem generalizes the fixed-charge network design problem. The GFCND problem is related to the more general problem of designing hierarchical telecommunication networks. A mixed integer programming model is described and a branch-cut-and-price algorithm...... is implemented. Violated constraints and variables with negative reduced costs are found using enumeration. The algorithm is capable of obtaining optimal solutions for problems with up to 30 clusters and up to 300 nodes. This is possible, since the linear programming relaxation bound is very tight...

  16. Unsupervised neural networks for solving Troesch's problem

    Science.gov (United States)

    Muhammad, Asif Zahoor Raja

    2014-01-01

    In this study, stochastic computational intelligence techniques are presented for the solution of Troesch's boundary value problem. The proposed stochastic solvers use the competency of a feed-forward artificial neural network for mathematical modeling of the problem in an unsupervised manner, whereas the learning of unknown parameters is made with local and global optimization methods as well as their combinations. Genetic algorithm (GA) and pattern search (PS) techniques are used as the global search methods and the interior point method (IPM) is used for an efficient local search. The combination of techniques like GA hybridized with IPM (GA-IPM) and PS hybridized with IPM (PS-IPM) are also applied to solve different forms of the equation. A comparison of the proposed results obtained from GA, PS, IPM, PS-IPM and GA-IPM has been made with the standard solutions including well known analytic techniques of the Adomian decomposition method, the variational iterational method and the homotopy perturbation method. The reliability and effectiveness of the proposed schemes, in term of accuracy and convergence, are evaluated from the results of statistical analysis based on sufficiently large independent runs.

  17. Non-destructive and micro-invasive testing techniques for characterizing materials, structures and restoration problems in mural paintings

    Science.gov (United States)

    Tortora, Mariagrazia; Sfarra, Stefano; Chiarini, Marco; Daniele, Valeria; Taglieri, Giuliana; Cerichelli, Giorgio

    2016-11-01

    In this paper, chemical and structural studies of medieval wall paintings in Ocre (L'Aquila, Italy) are presented. During the latest restoration campaign, non-destructive (Near-Infrared Reflectography and Infrared Thermography) and micro-invasive (Nuclear Magnetic Resonance, Fourier Transform Infrared Spectroscopy, μ-Raman, Scanning Electron Microscopy with X-ray Microanalysis, X-Ray Diffraction, X-Ray Fluorescence, Optical Microscopy, Mass Spectrometry, Thermogravimetry) analyses were performed in order to determine the detachments of wall surfaces and the characterization of original and restoration materials. Data integration allowed to reconstruct the conservative history, the execution techniques and the conservation problems of the artefact, as well as to assess the effectiveness of restoration activities adopted. The combined use of physical and micro-chemical techniques proved to be effective for an in-depth study of materials stratification of paintings.

  18. Solving Hub Network Problem Using Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Mursyid Hasan Basri

    2012-01-01

    Full Text Available This paper addresses a network problem that described as follows. There are n ports that interact, and p of those will be designated as hubs. All hubs are fully interconnected. Each spoke will be allocated to only one of available hubs. Direct connection between two spokes is allowed only if they are allocated to the same hub. The latter is a distinct characteristic that differs it from pure hub-and-spoke system. In case of pure hub-and-spoke system, direct connection between two spokes is not allowed. The problem is where to locate hub ports and to which hub a spoke should be allocated so that total transportation cost is minimum. In the first model, there are some additional aspects are taken into consideration in order to achieve a better representation of the problem. The first, weekly service should be accomplished. Secondly, various vessel types should be considered. The last, a concept of inter-hub discount factor is introduced. Regarding the last aspect, it represents cost reduction factor at hub ports due to economies of scale. In practice, it is common that the cost rate for inter-hub movement is less than the cost rate for movement between hub and origin/destination. In this first model, inter-hub discount factor is assumed independent with amount of flows on inter-hub links (denoted as flow-independent discount policy. The results indicated that the patterns of enlargement of container ship size, to some degree, are similar with those in Kurokawa study. However, with regard to hub locations, the results have not represented the real practice. In the proposed model, unsatisfactory result on hub locations is addressed. One aspect that could possibly be improved to find better hub locations is inter-hub discount factor. Then inter-hub discount factor is assumed to depend on amount of inter-hub flows (denoted as flow-dependent discount policy. There are two discount functions examined in this paper. Both functions are characterized by

  19. Inverse kinematics problem in robotics using neural networks

    Science.gov (United States)

    Choi, Benjamin B.; Lawrence, Charles

    1992-01-01

    In this paper, Multilayer Feedforward Networks are applied to the robot inverse kinematic problem. The networks are trained with endeffector position and joint angles. After training, performance is measured by having the network generate joint angles for arbitrary endeffector trajectories. A 3-degree-of-freedom (DOF) spatial manipulator is used for the study. It is found that neural networks provide a simple and effective way to both model the manipulator inverse kinematics and circumvent the problems associated with algorithmic solution methods.

  20. Solving network design problems via decomposition, aggregation and approximation

    CERN Document Server

    Bärmann, Andreas

    2016-01-01

    Andreas Bärmann develops novel approaches for the solution of network design problems as they arise in various contexts of applied optimization. At the example of an optimal expansion of the German railway network until 2030, the author derives a tailor-made decomposition technique for multi-period network design problems. Next, he develops a general framework for the solution of network design problems via aggregation of the underlying graph structure. This approach is shown to save much computation time as compared to standard techniques. Finally, the author devises a modelling framework for the approximation of the robust counterpart under ellipsoidal uncertainty, an often-studied case in the literature. Each of these three approaches opens up a fascinating branch of research which promises a better theoretical understanding of the problem and an increasing range of solvable application settings at the same time. Contents Decomposition for Multi-Period Network Design Solving Network Design Problems via Ag...

  1. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  2. Information Dissemination Through Networking In Nigeria: Problems ...

    African Journals Online (AJOL)

    Information dissemination is an important element in teaching and research around the world. Dissemination of information through electronic networking has transformed the conduct of research and teaching in institutions and organizations. Electronic networks are offering researchers a wide range of opportunities in ...

  3. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  4. Network Monitoring as a Streaming Analytics Problem

    KAUST Repository

    Gupta, Arpit

    2016-11-02

    Programmable switches make it easier to perform flexible network monitoring queries at line rate, and scalable stream processors make it possible to fuse data streams to answer more sophisticated queries about the network in real-time. Unfortunately, processing such network monitoring queries at high traffic rates requires both the switches and the stream processors to filter the traffic iteratively and adaptively so as to extract only that traffic that is of interest to the query at hand. Others have network monitoring in the context of streaming; yet, previous work has not closed the loop in a way that allows network operators to perform streaming analytics for network monitoring applications at scale. To achieve this objective, Sonata allows operators to express a network monitoring query by considering each packet as a tuple and efficiently partitioning each query between the switches and the stream processor through iterative refinement. Sonata extracts only the traffic that pertains to each query, ensuring that the stream processor can scale traffic rates of several terabits per second. We show with a simple example query involving DNS reflection attacks and traffic traces from one of the world\\'s largest IXPs that Sonata can capture 95% of all traffic pertaining to the query, while reducing the overall data rate by a factor of about 400 and the number of required counters by four orders of magnitude. Copyright 2016 ACM.

  5. Non-destructive and micro-invasive testing techniques for characterizing materials, structures and restoration problems in mural paintings

    Energy Technology Data Exchange (ETDEWEB)

    Tortora, Mariagrazia, E-mail: Mariagrazia.Tortora@univaq.it [University of L’Aquila, Department of Physical and Chemical Sciences, Via Vetoio (Coppito 1), I-67100, Loc. Coppito, L’Aquila, AQ (Italy); Sfarra, Stefano, E-mail: Stefano.Sfarra@univaq.it [Las.E.R. Laboratory, University of L’Aquila, Department of Industrial and Information Engineering and Economics, Piazzale E. Pontieri 1, I-67100, Loc. Monteluco di Roio, Roio Poggio, L’Aquila, AQ, Italy, (Italy); Chiarini, Marco, E-mail: mchiarini@unite.it [University of Teramo, Department of Bioscience and Technology for Food Agriculture and Environment, Via Carlo Lerici 1, I-64023, Mosciano Sant’Angelo, Teramo, TE, Italy, (Italy); Daniele, Valeria, E-mail: Valeria.Daniele@univaq.it [University of L’Aquila, Department of Industrial and Information Engineering and Economics, Piazzale E. Pontieri 1, I-67100, Loc. Monteluco di Roio, Roio Poggio, L’Aquila, AQ (Italy); Taglieri, Giuliana, E-mail: Giuliana.Taglieri@univaq.it [University of L’Aquila, Department of Industrial and Information Engineering and Economics, Piazzale E. Pontieri 1, I-67100, Loc. Monteluco di Roio, Roio Poggio, L’Aquila, AQ (Italy); Cerichelli, Giorgio, E-mail: Giorgio.Cerichelli@univaq.it [University of L’Aquila, Department of Physical and Chemical Sciences, Via Vetoio (Coppito 1), I-67100, Loc. Coppito, L’Aquila, AQ (Italy)

    2016-11-30

    Highlights: • Infrared thermography allowed to identify structural damage and rising damp effect. • The present approach provided insights on the used pigments and painting techniques. • FT-IR, XRF and XRD analyses of the mortar sample showed the peculiar composition. • 1D, 2D NMR analyses were useful for the identification of the restoration polymer. • NMR technique also allowed to characterize the plasticizing agents. - Abstract: In this paper, chemical and structural studies of medieval wall paintings in Ocre (L’Aquila, Italy) are presented. During the latest restoration campaign, non-destructive (Near-Infrared Reflectography and Infrared Thermography) and micro-invasive (Nuclear Magnetic Resonance, Fourier Transform Infrared Spectroscopy, μ-Raman, Scanning Electron Microscopy with X-ray Microanalysis, X-Ray Diffraction, X-Ray Fluorescence, Optical Microscopy, Mass Spectrometry, Thermogravimetry) analyses were performed in order to determine the detachments of wall surfaces and the characterization of original and restoration materials. Data integration allowed to reconstruct the conservative history, the execution techniques and the conservation problems of the artefact, as well as to assess the effectiveness of restoration activities adopted. The combined use of physical and micro-chemical techniques proved to be effective for an in-depth study of materials stratification of paintings.

  6. Pricing and Capacity Planning Problems in Energy Transmission Networks

    DEFF Research Database (Denmark)

    Villumsen, Jonas Christoffer

    and transmission pricing problems in energy transmission networks. Although the modelling framework applies to energy networks in general, most of the applications discussed concern the transmission of electricity. A number of the problems presented involves transmission switching, which allows the operator...... of an electricity transmission network to switch lines in and out in an operational context in order to optimise the network flow. We show that transmission switching in systems with large-scale wind power may alleviate network congestions and reduce curtailment of wind power leading to higher utilisation...... of installed wind power capacity. We present formulations of — and efficient solution methods for— the transmission line capacity expansion problem and the unit commitment problem with transmission switching. We also show that transmission switching may radically change the optimal line capacity expansion...

  7. Decomposition method for zonal resource allocation problems in telecommunication networks

    Science.gov (United States)

    Konnov, I. V.; Kashuba, A. Yu

    2016-11-01

    We consider problems of optimal resource allocation in telecommunication networks. We first give an optimization formulation for the case where the network manager aims to distribute some homogeneous resource (bandwidth) among users of one region with quadratic charge and fee functions and present simple and efficient solution methods. Next, we consider a more general problem for a provider of a wireless communication network divided into zones (clusters) with common capacity constraints. We obtain a convex quadratic optimization problem involving capacity and balance constraints. By using the dual Lagrangian method with respect to the capacity constraint, we suggest to reduce the initial problem to a single-dimensional optimization problem, but calculation of the cost function value leads to independent solution of zonal problems, which coincide with the above single region problem. Some results of computational experiments confirm the applicability of the new methods.

  8. A Survey of Coverage Problems in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junbin LIANG

    2014-01-01

    Full Text Available Coverage problem is an important issue in wireless sensor networks, which has a great impact on the performance of wireless sensor networks. Given a sensor network, the coverage problem is to determine how well the sensing field is monitored or tracked by sensors. In this paper, we classify the coverage problem into three categories: area coverage, target coverage, and barrier coverage, give detailed description of different algorithms belong to these three categories. Moreover, we specify the advantages and disadvantages of the existing classic algorithms, which can give a useful direction in this area.

  9. Problem solving for wireless sensor networks

    CERN Document Server

    Garcia-Hernando, Ana-Belen; Lopez-Navarro, Juan-Manuel; Prayati, Aggeliki; Redondo-Lopez, Luis

    2008-01-01

    Wireless Sensor Networks (WSN) is an area of huge research interest, attracting substantial attention from industry and academia for its enormous potential and its inherent challenges. This reader-friendly text delivers a comprehensive review of the developments related to the important technological issues in WSN.

  10. A Very Large Area Network (VLAN) knowledge-base applied to space communication problems

    Science.gov (United States)

    Zander, Carol S.

    1988-01-01

    This paper first describes a hierarchical model for very large area networks (VLAN). Space communication problems whose solution could profit by the model are discussed and then an enhanced version of this model incorporating the knowledge needed for the missile detection-destruction problem is presented. A satellite network or VLAN is a network which includes at least one satellite. Due to the complexity, a compromise between fully centralized and fully distributed network management has been adopted. Network nodes are assigned to a physically localized group, called a partition. Partitions consist of groups of cell nodes with one cell node acting as the organizer or master, called the Group Master (GM). Coordinating the group masters is a Partition Master (PM). Knowledge is also distributed hierarchically existing in at least two nodes. Each satellite node has a back-up earth node. Knowledge must be distributed in such a way so as to minimize information loss when a node fails. Thus the model is hierarchical both physically and informationally.

  11. Robust p-median problem in changing networks

    Directory of Open Access Journals (Sweden)

    Štefan PEŠKO

    2015-09-01

    Full Text Available The robust p-median problem in changing networks is a version of known discrete p-median problem in network with uncertain edge lengths where uncertainty is characterised by given interval. The uncertainty in edge lengths may appear in travel time along the edges in any network location problem. Several possible future scenarios with respect to the lengths of edges are presented. The planner will want a strategy of positioning p medians that will be working “as well as possible" over the future scenarios. We present MILP formulation of the problem and the solution method based on exchange MILP heuristic. The cluster of each median is presented by rooted tree with the median as root. The performance of the proposed heuristic is compared to the optimal solution found via Gurobi solver for MILP models through some illustrative instances of Slovak road network in Žilina.

  12. Network capacity with probit-based stochastic user equilibrium problem.

    Science.gov (United States)

    Lu, Lili; Wang, Jian; Zheng, Pengjun; Wang, Wei

    2017-01-01

    Among different stochastic user equilibrium (SUE) traffic assignment models, the Logit-based stochastic user equilibrium (SUE) is extensively investigated by researchers. It is constantly formulated as the low-level problem to describe the drivers' route choice behavior in bi-level problems such as network design, toll optimization et al. The Probit-based SUE model receives far less attention compared with Logit-based model albeit the assignment result is more consistent with drivers' behavior. It is well-known that due to the identical and irrelevant alternative (IIA) assumption, the Logit-based SUE model is incapable to deal with route overlapping problem and cannot account for perception variance with respect to trips. This paper aims to explore the network capacity with Probit-based traffic assignment model and investigate the differences of it is with Logit-based SUE traffic assignment models. The network capacity is formulated as a bi-level programming where the up-level program is to maximize the network capacity through optimizing input parameters (O-D multiplies and signal splits) while the low-level program is the Logit-based or Probit-based SUE problem formulated to model the drivers' route choice. A heuristic algorithm based on sensitivity analysis of SUE problem is detailed presented to solve the proposed bi-level program. Three numerical example networks are used to discuss the differences of network capacity between Logit-based SUE constraint and Probit-based SUE constraint. This study finds that while the network capacity show different results between Probit-based SUE and Logit-based SUE constraints, the variation pattern of network capacity with respect to increased level of travelers' information for general network under the two type of SUE problems is the same, and with certain level of travelers' information, both of them can achieve the same maximum network capacity.

  13. An Electromagnetic Interference Problem via the Mains Distribution Networks

    Directory of Open Access Journals (Sweden)

    BUZDUGAN, M. I.

    2007-11-01

    Full Text Available The paper presents an electromagnetic interference problem, due to the proximity of two radio broadcasting stations which injected especially common mode conducted emissions over the maximal limits specified by the national regulations in the public low voltage mains network. These emissions determined the malfunction of the gas heating centrals Themaclassic Saunier Duval installed in the area. The problem was solved by the retro fitting of an extra EMI filter for the mains network, as presented in the paper.

  14. Cellular neural networks for the stereo matching problem

    Energy Technology Data Exchange (ETDEWEB)

    Taraglio, S. [ENEA, Centro Ricerche Casaccia, Rome (Italy). Dipt. Innovazione; Zanela, A. [Rome Univ. `La Sapienza` (Italy). Dipt. di Fisica

    1997-03-01

    The applicability of the Cellular Neural Network (CNN) paradigm to the problem of recovering information on the tridimensional structure of the environment is investigated. The approach proposed is the stereo matching of video images. The starting point of this work is the Zhou-Chellappa neural network implementation for the same problem. The CNN based system we present here yields the same results as the previous approach, but without the many existing drawbacks.

  15. Problems in the Deployment of Learning Networks In Small Organizations

    NARCIS (Netherlands)

    Shankle, Dean E.; Shankle, Jeremy P.

    2006-01-01

    Please, cite this publication as: Shankle, D.E., & Shankle, J.P. (2006). Problems in the Deployment of Learning Networks In Small Organizations. Proceedings of International Workshop in Learning Networks for Lifelong Competence Development, TENCompetence Conference. March 30th-31st, Sofia, Bulgaria:

  16. Solving constraint satisfaction problems with networks of spiking neurons

    Directory of Open Access Journals (Sweden)

    Zeno eJonke

    2016-03-01

    Full Text Available Network of neurons in the brain apply – unlike processors in our current generation ofcomputer hardware – an event-based processing strategy, where short pulses (spikes areemitted sparsely by neurons to signal the occurrence of an event at a particular point intime. Such spike-based computations promise to be substantially more power-efficient thantraditional clocked processing schemes. However it turned out to be surprisingly difficult todesign networks of spiking neurons that can solve difficult computational problems on the levelof single spikes (rather than rates of spikes. We present here a new method for designingnetworks of spiking neurons via an energy function. Furthermore we show how the energyfunction of a network of stochastically firing neurons can be shaped in a quite transparentmanner by composing the networks of simple stereotypical network motifs. We show that thisdesign approach enables networks of spiking neurons to produce approximate solutions todifficult (NP-hard constraint satisfaction problems from the domains of planning/optimizationand verification/logical inference. The resulting networks employ noise as a computationalresource. Nevertheless the timing of spikes (rather than just spike rates plays an essential rolein their computations. Furthermore, networks of spiking neurons carry out for the Traveling Salesman Problem a more efficient stochastic search for good solutions compared with stochastic artificial neural networks (Boltzmann machines and Gibbs sampling.

  17. Analysis of feeder bus network design and scheduling problems.

    Science.gov (United States)

    Almasi, Mohammad Hadi; Mirzapour Mounes, Sina; Koting, Suhana; Karim, Mohamed Rehan

    2014-01-01

    A growing concern for public transit is its inability to shift passenger's mode from private to public transport. In order to overcome this problem, a more developed feeder bus network and matched schedules will play important roles. The present paper aims to review some of the studies performed on Feeder Bus Network Design and Scheduling Problem (FNDSP) based on three distinctive parts of the FNDSP setup, namely, problem description, problem characteristics, and solution approaches. The problems consist of different subproblems including data preparation, feeder bus network design, route generation, and feeder bus scheduling. Subsequently, descriptive analysis and classification of previous works are presented to highlight the main characteristics and solution methods. Finally, some of the issues and trends for future research are identified. This paper is targeted at dealing with the FNDSP to exhibit strategic and tactical goals and also contributes to the unification of the field which might be a useful complement to the few existing reviews.

  18. Analysing Stagecoach Network Problem Using Dynamic ...

    African Journals Online (AJOL)

    In this paper we present a recursive dynamic programming algorithm for solving the stagecoach problem. The algorithm is computationally more efficient than the first method as it obtains its minimum total cost using the suboptimal policies of the different stages without computing the cost of all the routes. By the dynamic ...

  19. Hub location problems in transportation networks

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan

    2011-01-01

    . While the existing state-of-the-art MIP solvers fail to solve even small size instances of problem, our accelerated and efficient primal (Benders) decomposition solves larger ones. In addition, a very efficient greedy heuristic, proven to be capable of obtaining high quality solutions, is proposed. We...

  20. Combating Weapons of Mass Destruction: Models, Complexity, and Algorithms in Complex Dynamic and Evolving Networks

    Science.gov (United States)

    2015-11-01

    NLP Blondel Oslom Infomap 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 N M I (N = 5 0 0 0 ) µ SCD SCD- NLP Blondel Oslom Infomap A...Networks with minC ,maxC unconstrained. 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 N M I (N = 1 0 0 0 ) µ SCD SCD- NLP Blondel Oslom Infomap 0...0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 N M I (N = 5 0 0 0 ) µ SCD SCD- NLP Blondel Oslom Infomap B

  1. A matheuristic for the liner shipping network design problem

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard; Desaulniers, Guy

    2012-01-01

    We present a matheuristic, an integer programming based heuristic, for the Liner Shipping Network Design Problem. The heuristic applies a greedy construction heuristic based on an interpretation of the liner shipping network design problem as a multiple quadratic knapsack problem. The construction...... heuristic is combined with an improvement heuristic with a neighborhood defined by the solution space of a mixed integer program. The mixed integer program optimizes the removal and insertion of several port calls on a liner shipping service. The objective function is based on evaluation functions...

  2. Topics on data transmission problem in software definition network

    Science.gov (United States)

    Gao, Wei; Liang, Li; Xu, Tianwei; Gan, Jianhou

    2017-08-01

    In normal computer networks, the data transmission between two sites go through the shortest path between two corresponding vertices. However, in the setting of software definition network (SDN), it should monitor the network traffic flow in each site and channel timely, and the data transmission path between two sites in SDN should consider the congestion in current networks. Hence, the difference of available data transmission theory between normal computer network and software definition network is that we should consider the prohibit graph structures in SDN, and these forbidden subgraphs represent the sites and channels in which data can't be passed by the serious congestion. Inspired by theoretical analysis of an available data transmission in SDN, we consider some computational problems from the perspective of the graph theory. Several results determined in the paper imply the sufficient conditions of data transmission in SDN in the various graph settings.

  3. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  4. Neural network for solving convex quadratic bilevel programming problems.

    Science.gov (United States)

    He, Xing; Li, Chuandong; Huang, Tingwen; Li, Chaojie

    2014-03-01

    In this paper, using the idea of successive approximation, we propose a neural network to solve convex quadratic bilevel programming problems (CQBPPs), which is modeled by a nonautonomous differential inclusion. Different from the existing neural network for CQBPP, the model has the least number of state variables and simple structure. Based on the theory of nonsmooth analysis, differential inclusions and Lyapunov-like method, the limit equilibrium points sequence of the proposed neural networks can approximately converge to an optimal solution of CQBPP under certain conditions. Finally, simulation results on two numerical examples and the portfolio selection problem show the effectiveness and performance of the proposed neural network. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Social networking sites: an adjunctive treatment modality for psychological problems.

    Science.gov (United States)

    Menon, Indu S; Sharma, Manoj Kumar; Chandra, Prabha S; Thennarasu, K

    2014-07-01

    Social networking is seen as a way to enhance social support and feeling of well-being. The present work explores the potentials of social networking sites as an adjunctive treatment modality for initiating treatment contact as well as for managing psychological problems. Interview schedule, Facebook intensity questionnaire were administered on 28 subjects with a combination of 18 males and 10 females. They were taken from the in-patient and out-patient psychiatry setting of the hospital. Facebook was the most popular sites and used to seek emotional support on the basis of the frequent updates of emotional content that users put in their profile; reconciliations, escape from the problems or to manage the loneliness; getting information about illness and its treatment and interaction with experts and also manifested as problematic use. It has implications for developing social networking based adjunctive treatment modality for psychological problems.

  6. Sub-problem Optimization With Regression and Neural Network Approximators

    Science.gov (United States)

    Guptill, James D.; Hopkins, Dale A.; Patnaik, Surya N.

    2003-01-01

    Design optimization of large systems can be attempted through a sub-problem strategy. In this strategy, the original problem is divided into a number of smaller problems that are clustered together to obtain a sequence of sub-problems. Solution to the large problem is attempted iteratively through repeated solutions to the modest sub-problems. This strategy is applicable to structures and to multidisciplinary systems. For structures, clustering the substructures generates the sequence of sub-problems. For a multidisciplinary system, individual disciplines, accounting for coupling, can be considered as sub-problems. A sub-problem, if required, can be further broken down to accommodate sub-disciplines. The sub-problem strategy is being implemented into the NASA design optimization test bed, referred to as "CometBoards." Neural network and regression approximators are employed for reanalysis and sensitivity analysis calculations at the sub-problem level. The strategy has been implemented in sequential as well as parallel computational environments. This strategy, which attempts to alleviate algorithmic and reanalysis deficiencies, has the potential to become a powerful design tool. However, several issues have to be addressed before its full potential can be harnessed. This paper illustrates the strategy and addresses some issues.

  7. Client-Centered Problem-Solving Networks in Complex Organizations.

    Science.gov (United States)

    Tucker, Charles; Hanna, Michael

    Employees in different kinds of organizations were surveyed for their perceptions of their companies' client and operational problem-solving networks. The individuals came from a manufacturing firm, a community college, a telephone company, a farmers' cooperative, and a hospital. Interviews were conducted with those people reporting numerous…

  8. Countervailing Social Network Influences on Problem Behaviors among Homeless Youth

    Science.gov (United States)

    Rice, Eric; Stein, Judith A.; Milburn, Norweeta

    2008-01-01

    The impact of countervailing social network influences (i.e., pro-social, anti-social or HIV risk peers) on problem behaviors (i.e., HIV drug risk, HIV sex risk or anti-social behaviors) among 696 homeless youth was assessed using structural equation modeling. Results revealed that older youth were less likely to report having pro-social peers and…

  9. Evolving neural networks for strategic decision-making problems.

    Science.gov (United States)

    Kohl, Nate; Miikkulainen, Risto

    2009-04-01

    Evolution of neural networks, or neuroevolution, has been a successful approach to many low-level control problems such as pole balancing, vehicle control, and collision warning. However, certain types of problems-such as those involving strategic decision-making-have remained difficult for neuroevolution to solve. This paper evaluates the hypothesis that such problems are difficult because they are fractured: The correct action varies discontinuously as the agent moves from state to state. A method for measuring fracture using the concept of function variation is proposed and, based on this concept, two methods for dealing with fracture are examined: neurons with local receptive fields, and refinement based on a cascaded network architecture. Experiments in several benchmark domains are performed to evaluate how different levels of fracture affect the performance of neuroevolution methods, demonstrating that these two modifications improve performance significantly. These results form a promising starting point for expanding neuroevolution to strategic tasks.

  10. Subgradient-based neural networks for nonsmooth nonconvex optimization problems.

    Science.gov (United States)

    Bian, Wei; Xue, Xiaoping

    2009-06-01

    This paper presents a subgradient-based neural network to solve a nonsmooth nonconvex optimization problem with a nonsmooth nonconvex objective function, a class of affine equality constraints, and a class of nonsmooth convex inequality constraints. The proposed neural network is modeled with a differential inclusion. Under a suitable assumption on the constraint set and a proper assumption on the objective function, it is proved that for a sufficiently large penalty parameter, there exists a unique global solution to the neural network and the trajectory of the network can reach the feasible region in finite time and stay there thereafter. It is proved that the trajectory of the neural network converges to the set which consists of the equilibrium points of the neural network, and coincides with the set which consists of the critical points of the objective function in the feasible region. A condition is given to ensure the convergence to the equilibrium point set in finite time. Moreover, under suitable assumptions, the coincidence between the solution to the differential inclusion and the "slow solution" of it is also proved. Furthermore, three typical examples are given to present the effectiveness of the theoretic results obtained in this paper and the good performance of the proposed neural network.

  11. AMP-Inspired Deep Networks for Sparse Linear Inverse Problems

    Science.gov (United States)

    Borgerding, Mark; Schniter, Philip; Rangan, Sundeep

    2017-08-01

    Deep learning has gained great popularity due to its widespread success on many inference problems. We consider the application of deep learning to the sparse linear inverse problem, where one seeks to recover a sparse signal from a few noisy linear measurements. In this paper, we propose two novel neural-network architectures that decouple prediction errors across layers in the same way that the approximate message passing (AMP) algorithms decouple them across iterations: through Onsager correction. First, we propose a "learned AMP" network that significantly improves upon Gregor and LeCun's "learned ISTA." Second, inspired by the recently proposed "vector AMP" (VAMP) algorithm, we propose a "learned VAMP" network that offers increased robustness to deviations in the measurement matrix from i.i.d. Gaussian. In both cases, we jointly learn the linear transforms and scalar nonlinearities of the network. Interestingly, with i.i.d. signals, the linear transforms and scalar nonlinearities prescribed by the VAMP algorithm coincide with the values learned through back-propagation, leading to an intuitive interpretation of learned VAMP. Finally, we apply our methods to two problems from 5G wireless communications: compressive random access and massive-MIMO channel estimation.

  12. A Formal Model and Verification Problems for Software Defined Networks

    Directory of Open Access Journals (Sweden)

    V. A. Zakharov

    2013-01-01

    Full Text Available Software-defined networking (SDN is an approach to building computer networks that separate and abstract data planes and control planes of these systems. In a SDN a centralized controller manages a distributed set of switches. A set of open commands for packet forwarding and flow-table updating was defined in the form of a protocol known as OpenFlow. In this paper we describe an abstract formal model of SDN, introduce a tentative language for specification of SDN forwarding policies, and set up formally model-checking problems for SDN.

  13. Deep Convolutional Neural Network for Inverse Problems in Imaging.

    Science.gov (United States)

    Jin, Kyong Hwan; McCann, Michael T; Froustey, Emmanuel; Unser, Michael

    2017-06-15

    In this paper, we propose a novel deep convolutional neural network (CNN)-based algorithm for solving ill-posed inverse problems. Regularized iterative algorithms have emerged as the standard approach to ill-posed inverse problems in the past few decades. These methods produce excellent results, but can be challenging to deploy in practice due to factors including the high computational cost of the forward and adjoint operators and the difficulty of hyper parameter selection. The starting point of our work is the observation that unrolled iterative methods have the form of a CNN (filtering followed by point-wise nonlinearity) when the normal operator ( H*H where H* is the adjoint of the forward imaging operator, H ) of the forward model is a convolution. Based on this observation, we propose using direct inversion followed by a CNN to solve normal-convolutional inverse problems. The direct inversion encapsulates the physical model of the system, but leads to artifacts when the problem is ill-posed; the CNN combines multiresolution decomposition and residual learning in order to learn to remove these artifacts while preserving image structure. We demonstrate the performance of the proposed network in sparse-view reconstruction (down to 50 views) on parallel beam X-ray computed tomography in synthetic phantoms as well as in real experimental sinograms. The proposed network outperforms total variation-regularized iterative reconstruction for the more realistic phantoms and requires less than a second to reconstruct a 512 x 512 image on the GPU.

  14. Deep Convolutional Neural Network for Inverse Problems in Imaging

    Science.gov (United States)

    Jin, Kyong Hwan; McCann, Michael T.; Froustey, Emmanuel; Unser, Michael

    2017-09-01

    In this paper, we propose a novel deep convolutional neural network (CNN)-based algorithm for solving ill-posed inverse problems. Regularized iterative algorithms have emerged as the standard approach to ill-posed inverse problems in the past few decades. These methods produce excellent results, but can be challenging to deploy in practice due to factors including the high computational cost of the forward and adjoint operators and the difficulty of hyper parameter selection. The starting point of our work is the observation that unrolled iterative methods have the form of a CNN (filtering followed by point-wise non-linearity) when the normal operator (H*H, the adjoint of H times H) of the forward model is a convolution. Based on this observation, we propose using direct inversion followed by a CNN to solve normal-convolutional inverse problems. The direct inversion encapsulates the physical model of the system, but leads to artifacts when the problem is ill-posed; the CNN combines multiresolution decomposition and residual learning in order to learn to remove these artifacts while preserving image structure. We demonstrate the performance of the proposed network in sparse-view reconstruction (down to 50 views) on parallel beam X-ray computed tomography in synthetic phantoms as well as in real experimental sinograms. The proposed network outperforms total variation-regularized iterative reconstruction for the more realistic phantoms and requires less than a second to reconstruct a 512 x 512 image on GPU.

  15. A simulated annealing approach for redesigning a warehouse network problem

    Science.gov (United States)

    Khairuddin, Rozieana; Marlizawati Zainuddin, Zaitul; Jiun, Gan Jia

    2017-09-01

    Now a day, several companies consider downsizing their distribution networks in ways that involve consolidation or phase-out of some of their current warehousing facilities due to the increasing competition, mounting cost pressure and taking advantage on the economies of scale. Consequently, the changes on economic situation after a certain period of time require an adjustment on the network model in order to get the optimal cost under the current economic conditions. This paper aimed to develop a mixed-integer linear programming model for a two-echelon warehouse network redesign problem with capacitated plant and uncapacitated warehouses. The main contribution of this study is considering capacity constraint for existing warehouses. A Simulated Annealing algorithm is proposed to tackle with the proposed model. The numerical solution showed the model and method of solution proposed was practical.

  16. Problems of Using Femtocells in Public Cellular Networks

    Directory of Open Access Journals (Sweden)

    Karolis Žvinys

    2013-05-01

    Full Text Available This paper analyses the use of femtocells connected into a single macro network infrastructure. Different problems and possible solutions were discussed. The paper is focused on two separate benefits, which HNB could bring an operator and user. Femtocells are especially appealing due to the freedom of installation, increased macro network capacity, femto zone rates and etc. They provide users with better service quality, including voice service and higher throughput; while operators can reduce their network deployment expenditures. On the other hand, unplanned deployment, mobility issues and different types of user groups can cause a headache both for operators and customers. The analysis demonstrated that the majority of features of femtocells from the operator’s point of view were positive. Looking from the user’s point of view, most of shortcomings are difficult to remove. Positive and negative features both for operators and clients are presented in the HNB model.Article in Lithuanian

  17. Applying DNA computation to intractable problems in social network analysis.

    Science.gov (United States)

    Chen, Rick C S; Yang, Stephen J H

    2010-09-01

    From ancient times to the present day, social networks have played an important role in the formation of various organizations for a range of social behaviors. As such, social networks inherently describe the complicated relationships between elements around the world. Based on mathematical graph theory, social network analysis (SNA) has been developed in and applied to various fields such as Web 2.0 for Web applications and product developments in industries, etc. However, some definitions of SNA, such as finding a clique, N-clique, N-clan, N-club and K-plex, are NP-complete problems, which are not easily solved via traditional computer architecture. These challenges have restricted the uses of SNA. This paper provides DNA-computing-based approaches with inherently high information density and massive parallelism. Using these approaches, we aim to solve the three primary problems of social networks: N-clique, N-clan, and N-club. Their accuracy and feasible time complexities discussed in the paper will demonstrate that DNA computing can be used to facilitate the development of SNA. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  18. Kinetic Transition Networks for the Thomson Problem and Smale's Seventh Problem

    Science.gov (United States)

    Mehta, Dhagash; Chen, Jianxu; Chen, Danny Z.; Kusumaatmaja, Halim; Wales, David J.

    2016-07-01

    The Thomson problem, arrangement of identical charges on the surface of a sphere, has found many applications in physics, chemistry and biology. Here, we show that the energy landscape of the Thomson problem for N particles with N =132 , 135, 138, 141, 144, 147, and 150 is single funneled, characteristic of a structure-seeking organization where the global minimum is easily accessible. Algorithmically, constructing starting points close to the global minimum of such a potential with spherical constraints is one of Smale's 18 unsolved problems in mathematics for the 21st century because it is important in the solution of univariate and bivariate random polynomial equations. By analyzing the kinetic transition networks, we show that a randomly chosen minimum is, in fact, always "close" to the global minimum in terms of the number of transition states that separate them, a characteristic of small world networks.

  19. Neural network for regression problems with reduced training sets.

    Science.gov (United States)

    Bataineh, Mohammad; Marler, Timothy

    2017-11-01

    Although they are powerful and successful in many applications, artificial neural networks (ANNs) typically do not perform well with complex problems that have a limited number of training cases. Often, collecting additional training data may not be feasible or may be costly. Thus, this work presents a new radial-basis network (RBN) design that overcomes the limitations of using ANNs to accurately model regression problems with minimal training data. This new design involves a multi-stage training process that couples an orthogonal least squares (OLS) technique with gradient-based optimization. New termination criteria are also introduced to improve accuracy. In addition, the algorithms are designed to require minimal heuristic parameters, thus improving ease of use and consistency in performance. The proposed approach is tested with experimental and practical regression problems, and the results are compared with those from typical network models. The results show that the new design demonstrates improved accuracy with reduced dependence on the amount of training data. As demonstrated, this new ANN provides a platform for approximating potentially slow but high-fidelity computational models, and thus fostering inter-model connectivity and multi-scale modeling. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Address Translation Problems in IMS Based Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Balazs Godor

    2006-01-01

    Full Text Available The development of packed based multimedia networks reached a turning point when the ITU-T and the ETSIhave incorporated the IMS to the NGN. With the fast development of mobile communication more and more services andcontent are available. In contrast with fix network telephony both the services and the devices are personalized in the “mobileworld”. Services, known from the Internet - like e-mail, chat, browsing, presence, etc. – are already available via mobiledevices as well. The IMS originally wanted to exploit both the benefits of mobile networks and the fancy services of theInternet. But today it is already more than that. IMS is the core of the next generation telecommunication networks and abasis for fix-mobile convergent services. The fact however that IMS was originally a “mobile” standard, where IPv6 was notoddity generated some problems for the fix networks, where IPv4 is used. In this article I give an overview of these problemsand mention some solutions as well.

  1. Complex network problems in physics, computer science and biology

    Science.gov (United States)

    Cojocaru, Radu Ionut

    There is a close relation between physics and mathematics and the exchange of ideas between these two sciences are well established. However until few years ago there was no such a close relation between physics and computer science. Even more, only recently biologists started to use methods and tools from statistical physics in order to study the behavior of complex system. In this thesis we concentrate on applying and analyzing several methods borrowed from computer science to biology and also we use methods from statistical physics in solving hard problems from computer science. In recent years physicists have been interested in studying the behavior of complex networks. Physics is an experimental science in which theoretical predictions are compared to experiments. In this definition, the term prediction plays a very important role: although the system is complex, it is still possible to get predictions for its behavior, but these predictions are of a probabilistic nature. Spin glasses, lattice gases or the Potts model are a few examples of complex systems in physics. Spin glasses and many frustrated antiferromagnets map exactly to computer science problems in the NP-hard class defined in Chapter 1. In Chapter 1 we discuss a common result from artificial intelligence (AI) which shows that there are some problems which are NP-complete, with the implication that these problems are difficult to solve. We introduce a few well known hard problems from computer science (Satisfiability, Coloring, Vertex Cover together with Maximum Independent Set and Number Partitioning) and then discuss their mapping to problems from physics. In Chapter 2 we provide a short review of combinatorial optimization algorithms and their applications to ground state problems in disordered systems. We discuss the cavity method initially developed for studying the Sherrington-Kirkpatrick model of spin glasses. We extend this model to the study of a specific case of spin glass on the Bethe

  2. Towards overcoming the Monte Carlo sign problem with tensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Banuls, Mari Carmen; Cirac, J. Ignacio; Kuehn, Stefan [Max-Planck-Institut fuer Quantenoptik (MPQ), Garching (Germany); Cichy, Krzysztof [Frankfurt Univ. (Germany). Inst. fuer Theoretische Physik; Adam Mickiewicz Univ., Poznan (Poland). Faculty of Physics; Jansen, Karl [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany). John von Neumann-Inst. fuer Computing NIC; Saito, Hana [AISIN AW Co., Ltd., Aichi (Japan)

    2016-11-15

    The study of lattice gauge theories with Monte Carlo simulations is hindered by the infamous sign problem that appears under certain circumstances, in particular at non-zero chemical potential. So far, there is no universal method to overcome this problem. However, recent years brought a new class of non-perturbative Hamiltonian techniques named tensor networks, where the sign problem is absent. In previous work, we have demonstrated that this approach, in particular matrix product states in 1+1 dimensions, can be used to perform precise calculations in a lattice gauge theory, the massless and massive Schwinger model. We have computed the mass spectrum of this theory, its thermal properties and real-time dynamics. In this work, we review these results and we extend our calculations to the case of two flavours and non-zero chemical potential. We are able to reliably reproduce known analytical results for this model, thus demonstrating that tensor networks can tackle the sign problem of a lattice gauge theory at finite density.

  3. The concept and the principle of the diagnostic observability of the object in problems of monitoring and non-destructive testing

    Science.gov (United States)

    Sedov, A. V.

    2017-02-01

    The design of non-destructive testing systems relates to the solution of the problem of analysis of observability. It is the assessment of the opportunities of the set of measured parameters to diagnose the object, to identify emerging defects and the specific modes of operation. The term ‘observability’ in control theory does not correspond to the tasks of diagnosis and requires the model of the object’s state. The proposed concept of ‘diagnostic observability’ allows to use this term in tasks which aren’t related to the control. It doesn’t require the model of the object’s state, and realizes the estimation on the array of measurements performed for various diagnosed states of the object. The set of diagnostic state variables is determined as coordinates of diagnostic orthogonal space. The proposed principle of diagnostic observability is determined by the method of construction of the space of the diagnostics and by the analysis of the images of states of object. It can become a new basis for building an effective universal adaptive systems of non-destructive testing of complex technical and other objects.

  4. Stochastic Optimization for Network-Constrained Power System Scheduling Problem

    Directory of Open Access Journals (Sweden)

    D. F. Teshome

    2015-01-01

    Full Text Available The stochastic nature of demand and wind generation has a considerable effect on solving the scheduling problem of a modern power system. Network constraints such as power flow equations and transmission capacities also need to be considered for a comprehensive approach to model renewable energy integration and analyze generation system flexibility. Firstly, this paper accounts for the stochastic inputs in such a way that the uncertainties are modeled as normally distributed forecast errors. The forecast errors are then superimposed on the outputs of load and wind forecasting tools. Secondly, it efficiently models the network constraints and tests an iterative algorithm and a piecewise linear approximation for representing transmission losses in mixed integer linear programming (MILP. It also integrates load shedding according to priority factors set by the system operator. Moreover, the different interactions among stochastic programming, network constraints, and prioritized load shedding are thoroughly investigated in the paper. The stochastic model is tested on a power system adopted from Jeju Island, South Korea. Results demonstrate the impact of wind speed variability and network constraints on the flexibility of the generation system. Further analysis shows the effect of loss modeling approaches on total cost, accuracy, computational time, and memory requirement.

  5. A recurrent neural network for solving bilevel linear programming problem.

    Science.gov (United States)

    He, Xing; Li, Chuandong; Huang, Tingwen; Li, Chaojie; Huang, Junjian

    2014-04-01

    In this brief, based on the method of penalty functions, a recurrent neural network (NN) modeled by means of a differential inclusion is proposed for solving the bilevel linear programming problem (BLPP). Compared with the existing NNs for BLPP, the model has the least number of state variables and simple structure. Using nonsmooth analysis, the theory of differential inclusions, and Lyapunov-like method, the equilibrium point sequence of the proposed NNs can approximately converge to an optimal solution of BLPP under certain conditions. Finally, the numerical simulations of a supply chain distribution model have shown excellent performance of the proposed recurrent NNs.

  6. Mental Health, School Problems, and Social Networks: Modeling Urban Adolescent Substance Use

    Science.gov (United States)

    Mason, Michael J.

    2010-01-01

    This study tested a mediation model of the relationship with school problems, social network quality, and substance use with a primary care sample of 301 urban adolescents. It was theorized that social network quality (level of risk or protection in network) would mediate the effects of school problems, accounting for internalizing problems and…

  7. Artificial neural networks in high voltage transmission line problems

    Science.gov (United States)

    Ekonomou, L.; Kontargyri, V. T.; Kourtesi, St.; Maris, T. I.; Stathopulos, I. A.

    2007-07-01

    According to the literature high voltage transmission line problems are faced using conventional analytical methods, which include in most cases empirical and/or approximating equations. Artificial intelligence and more specifically artificial neural networks (ANN) are addressed in this work, in order to give accurate solutions to high voltage transmission line problems using in the calculations only actual field data. Two different case studies are studied, i.e., the estimation of critical flashover voltage on polluted insulators and the estimation of lightning performance of high voltage transmission lines. ANN models are developed and are tested on operating high voltage transmission lines and polluted insulators, producing very satisfactory results. These two ANN models can be used in electrical engineers' studies aiming at the more effective protection of high voltage equipment.

  8. Convolutional Neural Networks for Inverse Problems in Imaging: A Review

    Science.gov (United States)

    McCann, Michael T.; Jin, Kyong Hwan; Unser, Michael

    2017-11-01

    In this survey paper, we review recent uses of convolution neural networks (CNNs) to solve inverse problems in imaging. It has recently become feasible to train deep CNNs on large databases of images, and they have shown outstanding performance on object classification and segmentation tasks. Motivated by these successes, researchers have begun to apply CNNs to the resolution of inverse problems such as denoising, deconvolution, super-resolution, and medical image reconstruction, and they have started to report improvements over state-of-the-art methods, including sparsity-based techniques such as compressed sensing. Here, we review the recent experimental work in these areas, with a focus on the critical design decisions: Where does the training data come from? What is the architecture of the CNN? and How is the learning problem formulated and solved? We also bring together a few key theoretical papers that offer perspective on why CNNs are appropriate for inverse problems and point to some next steps in the field.

  9. Route Selection Problem Based on Hopfield Neural Network

    Directory of Open Access Journals (Sweden)

    N. Kojic

    2013-12-01

    Full Text Available Transport network is a key factor of economic, social and every other form of development in the region and the state itself. One of the main conditions for transport network development is the construction of new routes. Often, the construction of regional roads is dominant, since the design and construction in urban areas is quite limited. The process of analysis and planning the new roads is a complex process that depends on many factors (the physical characteristics of the terrain, the economic situation, political decisions, environmental impact, etc. and can take several months. These factors directly or indirectly affect the final solution, and in combination with project limitations and requirements, sometimes can be mutually opposed. In this paper, we present one software solution that aims to find Pareto optimal path for preliminary design of the new roadway. The proposed algorithm is based on many different factors (physical and social with the ability of their increase. This solution is implemented using Hopfield's neural network, as a kind of artificial intelligence, which has shown very good results for solving complex optimization problems.

  10. Rules Placement Problem in OpenFlow Networks: a Survey

    OpenAIRE

    Nguyen, Xuan Nam; Saucez, Damien; Barakat, Chadi; Turletti, Thierry

    2016-01-01

    International audience; Software-Defined Networking (SDN) abstracts low- level network functionalities to simplify network management and reduce costs. The OpenFlow protocol implements the SDN concept by abstracting network communications as flows to be processed by network elements. In OpenFlow, the high-level policies are translated into network primitives called rules that are distributed over the network. While the abstraction offered by OpenFlow allows to potentially implement any policy...

  11. A Hub Location Problem with Fully Interconnected Backbone and Access Networks

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Larsen, Jesper

    2007-01-01

    This paper considers the design of two-layered fully interconnected networks. A two-layered network consists of clusters of nodes, each defining an access network and a backbone network. We consider the integrated problem of determining the access networks and the backbone network simultaneously...... problems. We obtain superior bounds using the column generation approach than with the linear programming relaxation. The column generation method is therefore developed into an exact approach using the Branch-and-Price framework. With this approach we are able to solve problems consisting of up to 25...

  12. Enhancement of a model for Large-scale Airline Network Planning Problems

    NARCIS (Netherlands)

    Kölker, K.; Lopes dos Santos, B.F.; Lütjens, K.

    2016-01-01

    The main focus of this study is to solve the network planning problem based on passenger decision criteria including the preferred departure time and travel time for a real-sized airline network. For this purpose, a model of the integrated network planning problem is formulated including scheduling

  13. Sensitivity analysis of linear programming problem through a recurrent neural network

    Science.gov (United States)

    Das, Raja

    2017-11-01

    In this paper we study the recurrent neural network for solving linear programming problems. To achieve optimality in accuracy and also in computational effort, an algorithm is presented. We investigate the sensitivity analysis of linear programming problem through the neural network. A detailed example is also presented to demonstrate the performance of the recurrent neural network.

  14. Destructive Staffroom Discourse

    Directory of Open Access Journals (Sweden)

    Jonathan Pitt

    2009-01-01

    Full Text Available Holt’s first book “How Children Fail” set in motion the education reform of the 1960s. Holt illuminated the plethora of problems in ‘cookie-cutter’ mainstream schools, such as the culture of the fear of failure. This qualitative study examines the concept of the “Destructive Staffroom Discourse” in mainstream elementary schools as an impairment to the atmosphere necessary for learning to occur.

  15. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  16. Game Theoretic Solutions to Cyber Attack and Network Defense Problems

    National Research Council Canada - National Science Library

    Shen, Dan; Chen, Genshe; Cruz, Jr., , Jose B; Blasch, Erik; Kruger, Martin

    2007-01-01

    .... The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex...

  17. Recurrent neural network for non-smooth convex optimization problems with application to the identification of genetic regulatory networks.

    Science.gov (United States)

    Cheng, Long; Hou, Zeng-Guang; Lin, Yingzi; Tan, Min; Zhang, Wenjun Chris; Wu, Fang-Xiang

    2011-05-01

    A recurrent neural network is proposed for solving the non-smooth convex optimization problem with the convex inequality and linear equality constraints. Since the objective function and inequality constraints may not be smooth, the Clarke's generalized gradients of the objective function and inequality constraints are employed to describe the dynamics of the proposed neural network. It is proved that the equilibrium point set of the proposed neural network is equivalent to the optimal solution of the original optimization problem by using the Lagrangian saddle-point theorem. Under weak conditions, the proposed neural network is proved to be stable, and the state of the neural network is convergent to one of its equilibrium points. Compared with the existing neural network models for non-smooth optimization problems, the proposed neural network can deal with a larger class of constraints and is not based on the penalty method. Finally, the proposed neural network is used to solve the identification problem of genetic regulatory networks, which can be transformed into a non-smooth convex optimization problem. The simulation results show the satisfactory identification accuracy, which demonstrates the effectiveness and efficiency of the proposed approach.

  18. The time constrained multi-commodity network flow problem and its application to liner shipping network design

    DEFF Research Database (Denmark)

    Karsten, Christian Vad; Pisinger, David; Røpke, Stefan

    2015-01-01

    The multi-commodity network flow problem is an important sub-problem in several heuristics and exact methods for designing route networks for container ships. The sub-problem decides how cargoes should be transported through the network provided by shipping routes. This paper studies the multi......-commodity network flow problem with transit time constraints which puts limits on the duration of the transit of the commodities through the network. It is shown that for the particular application it does not increase the solution time to include the transit time constraints and that including the transit time...... is essential to offer customers a competitive product. © 2015 Elsevier Ltd. All rights reserved....

  19. Predictors of engaging in problem gambling treatment: data from the West Virginia Problem Gamblers Help Network.

    Science.gov (United States)

    Weinstock, Jeremiah; Burton, Steve; Rash, Carla J; Moran, Sheila; Biller, Warren; Krudelbach, Norman; Phoenix, Natalie; Morasco, Benjamin J

    2011-06-01

    Gambling help-lines are an essential access point, or frontline resource, for treatment seeking. This study investigated treatment engagement after calling a gambling help-line. From 2000-2007 over 2,900 unique callers were offered an in-person assessment appointment. Logistic regression analyses assessed predictors of (a) accepting the referral to the in-person assessment appointment and (b) attending the in-person assessment appointment. Over 76% of callers accepted the referral and 55% of all callers attended the in-person assessment appointment. This treatment engagement rate is higher than typically found for other help-lines. Demographic factors and clinical factors such as gender, severity of gambling problems, amount of gambling debt, and coercion by legal and social networks predicted engagement in treatment. Programmatic factors such as offering an appointment within 72 hr also aided treatment engagement. Results suggest gambling help-lines can be a convenient and confidential way for many individuals with gambling problems to access gambling-specific treatment. Alternative services such as telephone counseling may be beneficial for those who do not engage in treatment. (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  20. Visualization of protein interaction networks: problems and solutions.

    Science.gov (United States)

    Agapito, Giuseppe; Guzzi, Pietro Hiram; Cannataro, Mario

    2013-01-01

    Visualization concerns the representation of data visually and is an important task in scientific research. Protein-protein interactions (PPI) are discovered using either wet lab techniques, such mass spectrometry, or in silico predictions tools, resulting in large collections of interactions stored in specialized databases. The set of all interactions of an organism forms a protein-protein interaction network (PIN) and is an important tool for studying the behaviour of the cell machinery. Since graphic representation of PINs may highlight important substructures, e.g. protein complexes, visualization is more and more used to study the underlying graph structure of PINs. Although graphs are well known data structures, there are different open problems regarding PINs visualization: the high number of nodes and connections, the heterogeneity of nodes (proteins) and edges (interactions), the possibility to annotate proteins and interactions with biological information extracted by ontologies (e.g. Gene Ontology) that enriches the PINs with semantic information, but complicates their visualization. In these last years many software tools for the visualization of PINs have been developed. Initially thought for visualization only, some of them have been successively enriched with new functions for PPI data management and PIN analysis. The paper analyzes the main software tools for PINs visualization considering four main criteria: (i) technology, i.e. availability/license of the software and supported OS (Operating System) platforms; (ii) interoperability, i.e. ability to import/export networks in various formats, ability to export data in a graphic format, extensibility of the system, e.g. through plug-ins; (iii) visualization, i.e. supported layout and rendering algorithms and availability of parallel implementation; (iv) analysis, i.e. availability of network analysis functions, such as clustering or mining of the graph, and the possibility to interact with external

  1. Acceleration of solving the dynamic multi-objective network design problem using response surface methods

    NARCIS (Netherlands)

    Wismans, Luc Johannes Josephus; van Berkum, Eric C.; Bliemer, M.C.J.

    2014-01-01

    Optimization of externalities and accessibility using dynamic traffic management measures on a strategic level is a specific example of solving a multi-objective network design problem. Solving this optimization problem is time consuming, because heuristics like evolutionary multi objective

  2. A new neural network model for solving random interval linear programming problems.

    Science.gov (United States)

    Arjmandzadeh, Ziba; Safi, Mohammadreza; Nazemi, Alireza

    2017-05-01

    This paper presents a neural network model for solving random interval linear programming problems. The original problem involving random interval variable coefficients is first transformed into an equivalent convex second order cone programming problem. A neural network model is then constructed for solving the obtained convex second order cone problem. Employing Lyapunov function approach, it is also shown that the proposed neural network model is stable in the sense of Lyapunov and it is globally convergent to an exact satisfactory solution of the original problem. Several illustrative examples are solved in support of this technique. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. A Bi-Projection Neural Network for Solving Constrained Quadratic Optimization Problems.

    Science.gov (United States)

    Xia, Youshen; Wang, Jun

    2016-02-01

    In this paper, a bi-projection neural network for solving a class of constrained quadratic optimization problems is proposed. It is proved that the proposed neural network is globally stable in the sense of Lyapunov, and the output trajectory of the proposed neural network will converge globally to an optimal solution. Compared with existing projection neural networks (PNNs), the proposed neural network has a very small model size owing to its bi-projection structure. Furthermore, an application to data fusion shows that the proposed neural network is very effective. Numerical results demonstrate that the proposed neural network is much faster than the existing PNNs.

  4. Improved probabilistic neural networks with self-adaptive strategies for transformer fault diagnosis problem

    Directory of Open Access Journals (Sweden)

    Jiao-Hong Yi

    2016-01-01

    Full Text Available Probabilistic neural network has successfully solved all kinds of engineering problems in various fields since it is proposed. In probabilistic neural network, Spread has great influence on its performance, and probabilistic neural network will generate bad prediction results if it is improperly selected. It is difficult to select the optimal manually. In this article, a variant of probabilistic neural network with self-adaptive strategy, called self-adaptive probabilistic neural network, is proposed. In self-adaptive probabilistic neural network, Spread can be self-adaptively adjusted and selected and then the best selected Spread is used to guide the self-adaptive probabilistic neural network train and test. In addition, two simplified strategies are incorporated into the proposed self-adaptive probabilistic neural network with the aim of further improving its performance and then two versions of simplified self-adaptive probabilistic neural network (simplified self-adaptive probabilistic neural networks 1 and 2 are proposed. The variants of self-adaptive probabilistic neural networks are further applied to solve the transformer fault diagnosis problem. By comparing them with basic probabilistic neural network, and the traditional back propagation, extreme learning machine, general regression neural network, and self-adaptive extreme learning machine, the results have experimentally proven that self-adaptive probabilistic neural networks have a more accurate prediction and better generalization performance when addressing the transformer fault diagnosis problem.

  5. Exploiting Linkage Information and Problem-Specific Knowledge in Evolutionary Distribution Network Expansion Planning

    NARCIS (Netherlands)

    N.H. Luong (Ngoc Hoang); J.A. La Poutré (Han); P.A.N. Bosman (Peter)

    2015-01-01

    htmlabstractThis paper tackles the Distribution Network Expansion Planning (DNEP) problem that has to be solved by distribution network operators to decide which, where, and/or when enhancements to electricity networks should be introduced to satisfy the future power demands. We compare two

  6. Exploiting linkage information and problem-specific knowledge in evolutionary distribution network expansion planning

    NARCIS (Netherlands)

    N.H. Luong (Ngoc Hoang); J.A. La Poutré (Han); P.A.N. Bosman (Peter)

    2017-01-01

    textabstractThis article tackles the Distribution Network Expansion Planning (DNEP) problem that has to be solved by distribution network operators to decide which, where, and/or when enhancements to electricity networks should be introd uced to satisfy the future power demands. Because of many

  7. Neural networks art: solving problems with multiple solutions and new teaching algorithm.

    Science.gov (United States)

    Dmitrienko, V D; Zakovorotnyi, A Yu; Leonov, S Yu; Khavina, I P

    2014-01-01

    A new discrete neural networks adaptive resonance theory (ART), which allows solving problems with multiple solutions, is developed. New algorithms neural networks teaching ART to prevent degradation and reproduction classes at training noisy input data is developed. Proposed learning algorithms discrete ART networks, allowing obtaining different classification methods of input.

  8. Solving pseudomonotone variational inequalities and pseudoconvex optimization problems using the projection neural network.

    Science.gov (United States)

    Hu, Xiaolin; Wang, Jun

    2006-11-01

    In recent years, a recurrent neural network called projection neural network was proposed for solving monotone variational inequalities and related convex optimization problems. In this paper, we show that the projection neural network can also be used to solve pseudomonotone variational inequalities and related pseudoconvex optimization problems. Under various pseudomonotonicity conditions and other conditions, the projection neural network is proved to be stable in the sense of Lyapunov and globally convergent, globally asymptotically stable, and globally exponentially stable. Since monotonicity is a special case of pseudomononicity, the projection neural network can be applied to solve a broader class of constrained optimization problems related to variational inequalities. Moreover, a new concept, called componentwise pseudomononicity, different from pseudomononicity in general, is introduced. Under this new concept, two stability results of the projection neural network for solving variational inequalities are also obtained. Finally, numerical examples show the effectiveness and performance of the projection neural network.

  9. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  10. Second-order design problem in the Ancona geodetic network

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, P.; Ferrari, G. (Bologna Univ. (Italy). Ist. di Geofisica); Postpischl, D.; Unguendoli, M. (Bologna Univ. (Italy). Ist. di Topografia, Geodesia e Geofisica Mineraria)

    In this note an examination is made of the control network installed in the Ancona area in 1975 for seismotectonic studies. From an analysis of the network there arises the possibility of achieving a considerable improvement in the results by considering a plan of work derived from the a prior analysis of the covariance matrix and improving the atmospheric data fo the correction of electronic distance measurements, by the use of meteorological balloons.

  11. Solving the RWA Problem in WDM Optical Networks Using the BCO Meta-Heuristic

    Directory of Open Access Journals (Sweden)

    V. S. Aćimović-Raspopović

    2010-06-01

    Full Text Available This paper researches the routing and wavelength assignment (RWA problem in wavelength routed optical WDM networks with the wavelength conversion capability at different network nodes. We studied the static case in which all connection requests are known in advance, thus a routing decision can be made based on the complete knowledge of the traffic to be served by the network. The Bee Colony Optimization (BCO metaheuristic is applied to solve the RWA problem. We carried out a comprehensive simulation study of the performance of the proposed BCORWA algorithm for different network topologies and traffic scenarios. The obtained simulation results are analyzed and compared.

  12. Bilevel programming problems theory, algorithms and applications to energy networks

    CERN Document Server

    Dempe, Stephan; Pérez-Valdés, Gerardo A; Kalashnykova, Nataliya; Kalashnikova, Nataliya

    2015-01-01

    This book describes recent theoretical findings relevant to bilevel programming in general, and in mixed-integer bilevel programming in particular. It describes recent applications in energy problems, such as the stochastic bilevel optimization approaches used in the natural gas industry. New algorithms for solving linear and mixed-integer bilevel programming problems are presented and explained.

  13. A matheuristic for the liner shipping network design problem

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard; Desaulniers, Guy; Pisinger, David

    the available fleet of container vessels. The cargo transports make extensive use of transshipments between routes and the number of transshipments of the cargo flow is decisive for network profitability. Computational results are reported for the benchmark suite LINER-LIB 2012 following the industry standard...... of weekly departures on every schedule. The heuristic shows overall good performance and is able to find high quality solutions within competitive execution times. The matheuristic can also be applied as a decision support tool to improve an existing network by optimizing on a designated subset...

  14. Evaluation of Techniques to Detect Significant Network Performance Problems using End-to-End Active Network Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, R.Les; Logg, Connie; Chhaparia, Mahesh; /SLAC; Grigoriev, Maxim; /Fermilab; Haro, Felipe; /Chile U., Catolica; Nazir, Fawad; /NUST, Rawalpindi; Sandford, Mark

    2006-01-25

    End-to-End fault and performance problems detection in wide area production networks is becoming increasingly hard as the complexity of the paths, the diversity of the performance, and dependency on the network increase. Several monitoring infrastructures are built to monitor different network metrics and collect monitoring information from thousands of hosts around the globe. Typically there are hundreds to thousands of time-series plots of network metrics which need to be looked at to identify network performance problems or anomalous variations in the traffic. Furthermore, most commercial products rely on a comparison with user configured static thresholds and often require access to SNMP-MIB information, to which a typical end-user does not usually have access. In our paper we propose new techniques to detect network performance problems proactively in close to realtime and we do not rely on static thresholds and SNMP-MIB information. We describe and compare the use of several different algorithms that we have implemented to detect persistent network problems using anomalous variations analysis in real end-to-end Internet performance measurements. We also provide methods and/or guidance for how to set the user settable parameters. The measurements are based on active probes running on 40 production network paths with bottlenecks varying from 0.5Mbits/s to 1000Mbit/s. For well behaved data (no missed measurements and no very large outliers) with small seasonal changes most algorithms identify similar events. We compare the algorithms' robustness with respect to false positives and missed events especially when there are large seasonal effects in the data. Our proposed techniques cover a wide variety of network paths and traffic patterns. We also discuss the applicability of the algorithms in terms of their intuitiveness, their speed of execution as implemented, and areas of applicability. Our encouraging results compare and evaluate the accuracy of our

  15. A One-Layer Recurrent Neural Network for Pseudoconvex Optimization Problems With Equality and Inequality Constraints.

    Science.gov (United States)

    Qin, Sitian; Yang, Xiudong; Xue, Xiaoping; Song, Jiahui

    2017-10-01

    Pseudoconvex optimization problem, as an important nonconvex optimization problem, plays an important role in scientific and engineering applications. In this paper, a recurrent one-layer neural network is proposed for solving the pseudoconvex optimization problem with equality and inequality constraints. It is proved that from any initial state, the state of the proposed neural network reaches the feasible region in finite time and stays there thereafter. It is also proved that the state of the proposed neural network is convergent to an optimal solution of the related problem. Compared with the related existing recurrent neural networks for the pseudoconvex optimization problems, the proposed neural network in this paper does not need the penalty parameters and has a better convergence. Meanwhile, the proposed neural network is used to solve three nonsmooth optimization problems, and we make some detailed comparisons with the known related conclusions. In the end, some numerical examples are provided to illustrate the effectiveness of the performance of the proposed neural network.

  16. Design and Optimisation Problems in Wireless Sensor Networks

    Indian Academy of Sciences (India)

    Premkumar Karumbu,1.05 ECE,,+91-9448227167

    2010-11-14

    Nov 14, 2010 ... Recent motivation: event detection in wireless sensor networks. The classical model does not account for many practical aspects. Sleep-wake scheduling of sensors (cost for making observations). Optimal detection with sleep-wake scheduling: [Infocom 2008]. Transient change: The event occurs and then ...

  17. Wavelength and fiber assignment problems on avionic networks

    DEFF Research Database (Denmark)

    Zhang, Jiang; An, Yi; Berger, Michael Stübert

    2011-01-01

    system isolation requirements on the networks with shorter span traffics will not greatly increase the wavelength consumption and it will grow faster after the isolation constrains being larger up to certain scale. Regarding the traffics with longer span, the system isolation constrains slowly cause...

  18. Magnetic Flux Leakage Sensing and Artificial Neural Network Pattern Recognition-Based Automated Damage Detection and Quantification for Wire Rope Non-Destructive Evaluation.

    Science.gov (United States)

    Kim, Ju-Won; Park, Seunghee

    2018-01-02

    In this study, a magnetic flux leakage (MFL) method, known to be a suitable non-destructive evaluation (NDE) method for continuum ferromagnetic structures, was used to detect local damage when inspecting steel wire ropes. To demonstrate the proposed damage detection method through experiments, a multi-channel MFL sensor head was fabricated using a Hall sensor array and magnetic yokes to adapt to the wire rope. To prepare the damaged wire-rope specimens, several different amounts of artificial damages were inflicted on wire ropes. The MFL sensor head was used to scan the damaged specimens to measure the magnetic flux signals. After obtaining the signals, a series of signal processing steps, including the enveloping process based on the Hilbert transform (HT), was performed to better recognize the MFL signals by reducing the unexpected noise. The enveloped signals were then analyzed for objective damage detection by comparing them with a threshold that was established based on the generalized extreme value (GEV) distribution. The detected MFL signals that exceed the threshold were analyzed quantitatively by extracting the magnetic features from the MFL signals. To improve the quantitative analysis, damage indexes based on the relationship between the enveloped MFL signal and the threshold value were also utilized, along with a general damage index for the MFL method. The detected MFL signals for each damage type were quantified by using the proposed damage indexes and the general damage indexes for the MFL method. Finally, an artificial neural network (ANN) based multi-stage pattern recognition method using extracted multi-scale damage indexes was implemented to automatically estimate the severity of the damage. To analyze the reliability of the MFL-based automated wire rope NDE method, the accuracy and reliability were evaluated by comparing the repeatedly estimated damage size and the actual damage size.

  19. A recurrent neural network for solving a class of generalized convex optimization problems.

    Science.gov (United States)

    Hosseini, Alireza; Wang, Jun; Hosseini, S Mohammad

    2013-08-01

    In this paper, we propose a penalty-based recurrent neural network for solving a class of constrained optimization problems with generalized convex objective functions. The model has a simple structure described by using a differential inclusion. It is also applicable for any nonsmooth optimization problem with affine equality and convex inequality constraints, provided that the objective function is regular and pseudoconvex on feasible region of the problem. It is proven herein that the state vector of the proposed neural network globally converges to and stays thereafter in the feasible region in finite time, and converges to the optimal solution set of the problem. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Solving the Bi-Objective Maximum-Flow Network-Interdiction Problem

    National Research Council Canada - National Science Library

    Royset, Johannes O; Wood, R. K

    2006-01-01

    ...." In this problem, an "interdictor" seeks to interdict (destroy) a set of arcs in a capacitated network that are Pareto-optimal with respect to two objectives, minimizing total interdiction cost and minimizing maximum flow...

  1. Optimizing Supply Chain Collaboration Based on Agreement Buyer-Supplier Relationship with Network Design Problem

    National Research Council Canada - National Science Library

    Sutopo, Wahyudi; Erliza, Ayu; Heryansyah, Arien

    2016-01-01

    .... The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision...

  2. Optimal locations for a class of nonlinear, single-facility location problems on a network.

    Science.gov (United States)

    Shier, D R; Dearing, P M

    1983-01-01

    This paper investigates a class of single-facility location problems on an arbitrary network. Necessary and sufficient conditions are obtained for characterizing locally optimal locations with respect to a certain nonlinear objective function. This approach produces a number of new results for locating a facility on an arbitrary network, and in addition it unifies several known results for the special case of tree networks. It also suggests algorithmic procedures for obtaining such optimal locations.

  3. On the existence of efficient solutions to vector optimization problem of traffic flow on network

    Directory of Open Access Journals (Sweden)

    T. A. Bozhanova

    2009-09-01

    Full Text Available We studied traffic flow models in vector-valued optimization statement where the flow is controlled at the nodes of network. We considered the case when an objective mapping possesses a weakened property of upper semicontinuity and made no assumptions on the interior of the ordering cone. The sufficient conditions for the existence of efficient controls of the traffic problems are derived. The existence of efficient solutions of vector optimization problem for traffic flow on network are also proved.

  4. On the existence of efficient solutions to vector optimization problem of traffic flow on network

    OpenAIRE

    T. A. Bozhanova

    2009-01-01

    We studied traffic flow models in vector-valued optimization statement where the flow is controlled at the nodes of network. We considered the case when an objective mapping possesses a weakened property of upper semicontinuity and made no assumptions on the interior of the ordering cone. The sufficient conditions for the existence of efficient controls of the traffic problems are derived. The existence of efficient solutions of vector optimization problem for traffic flow on network are also...

  5. A Note on the Art of Network Design Problems | Osagiede | Journal ...

    African Journals Online (AJOL)

    In this study, we describe some Network Design Problems (NDPs) as well as the network flowbased improvement algorithm for neighbourhood search defined by cycles. The main part of the study is structured around the formulation of the expected duration of stay in the educational system as a NDP. The fundamental ...

  6. Performance of a genetic algorithm for solving the multi-objective, multimodel transportation network design problem

    NARCIS (Netherlands)

    Brands, Ties; van Berkum, Eric C.

    2014-01-01

    The optimization of infrastructure planning in a multimodal network is defined as a multi-objective network design problem, with accessibility, use of urban space by parking, operating deficit and climate impact as objectives. Decision variables are the location of park and ride facilities, train

  7. The Problem of Finding the Maximal Multiple Flow in the Divisible Network and its Special Cases

    Directory of Open Access Journals (Sweden)

    A. V. Smirnov

    2015-01-01

    Full Text Available In the article the problem of finding the maximal multiple flow in the network of any natural multiplicity k is studied. There are arcs of three types: ordinary arcs, multiple arcs and multi-arcs. Each multiple and multi-arc is a union of k linked arcs, which are adjusted with each other. The network constructing rules are described. The definitions of a divisible network and some associated subjects are stated. The important property of the divisible network is that every divisible network can be partitioned into k parts, which are adjusted on the linked arcs of each multiple and multi-arc. Each part is the ordinary transportation network. The main results of the article are the following subclasses of the problem of finding the maximal multiple flow in the divisible network. 1. The divisible networks with the multi-arc constraints. Assume that only one vertex is the ending vertex for a multi-arc in k −1 network parts. In this case the problem can be solved in a polynomial time. 2. The divisible networks with the weak multi-arc constraints. Assume that only one vertex is the ending vertex for a multi-arc in s network parts (1 ≤ s < k − 1 and other parts have at least two such vertices. In that case the multiplicity of the multiple flow problem can be decreased to k − s. 3. The divisible network of the parallel structure. Assume that the divisible network component, which consists of all multiple arcs, can be partitioned into subcomponents, each of them containing exactly one vertex-beginning of a multi-arc. Suppose that intersection of each pair of subcomponents is the only vertex-network source x0. If k = 2, the maximal flow problem can be solved in a polynomial time. If k ≥ 3, the problem is NP-complete. The algorithms for each polynomial subclass are suggested. Also, the multiplicity decreasing algorithm for the divisible network with weak multi-arc constraints is formulated.

  8. Adolescent problem behavior in school : the role of peer networks

    NARCIS (Netherlands)

    Geven, S.A.J.

    2016-01-01

    Adolescence is a notable period during which a considerable share of students tends to engage in problem behavior in school. Students for example skip class, fail to do their best in school, or have serious arguments with their teachers. A student’s decision to engage in such behavior is not usually

  9. A Network Centrality Method for the Rating Problem

    Science.gov (United States)

    2015-01-01

    We propose a new method for aggregating the information of multiple users rating multiple items. Our approach is based on the network relations induced between items by the rating activity of the users. Our method correlates better than the simple average with respect to the original rankings of the users, and besides, it is computationally more efficient than other methods proposed in the literature. Moreover, our method is able to discount the information that would be obtained adding to the system additional users with a systematically biased rating activity. PMID:25830502

  10. Neural network for solving Nash equilibrium problem in application of multiuser power control.

    Science.gov (United States)

    He, Xing; Yu, Junzhi; Huang, Tingwen; Li, Chuandong; Li, Chaojie

    2014-09-01

    In this paper, based on an equivalent mixed linear complementarity problem, we propose a neural network to solve multiuser power control optimization problems (MPCOP), which is modeled as the noncooperative Nash game in modern digital subscriber line (DSL). If the channel crosstalk coefficients matrix is positive semidefinite, it is shown that the proposed neural network is stable in the sense of Lyapunov and global convergence to a Nash equilibrium, and the Nash equilibrium is unique if the channel crosstalk coefficients matrix is positive definite. Finally, simulation results on two numerical examples show the effectiveness and performance of the proposed neural network. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. Innovation, imitation, and problem-solving in a networked group.

    Science.gov (United States)

    Wisdom, Thomas N; Goldstone, Robert L

    2011-04-01

    We implemented a problem-solving task in which groups of participants simultaneously played a simple innovation game in a complex problem space, with score feedback provided after each of a number of rounds. Each participant in a group was allowed to view and imitate the guesses of others during the game. The results showed the use of social learning strategies previously studied in other species, and demonstrated benefits of social learning and nonlinear effects of group size on strategy and performance. Rather than simply encouraging conformity, groups provided information to each individual about the distribution of useful innovations in the problem space. Imitation facilitated innovation rather than displacing it, because the former allowed good solutions to be propagated and preserved for further cumulative innovations in the group. Participants generally improved their solutions through the use of fairly conservative strategies, such as changing only a small portion of one's solution at a time, and tending to imitate solutions similar to one's own. Changes in these strategies over time had the effect of making solutions increasingly entrenched, both at individual and group levels. These results showed evidence of nonlinear dynamics in the decentralization of innovation, the emergence of group phenomena from complex interactions of individual efforts, stigmergy in the use of social information, and dynamic tradeoffs between exploration and exploitation of solutions. These results also support the idea that innovation and creativity can be recognized at the group level even when group members are generally cautious and imitative.

  12. A STATISTICAL CORRELATION TECHNIQUE AND A NEURAL-NETWORK FOR THE MOTION CORRESPONDENCE PROBLEM

    NARCIS (Netherlands)

    VANDEEMTER, JH; MASTEBROEK, HAK

    A statistical correlation technique (SCT) and two variants of a neural network are presented to solve the motion correspondence problem. Solutions of the motion correspondence problem aim to maintain the identities of individuated elements as they move. In a preprocessing stage, two snapshots of a

  13. Dynamic Network Design Problem under Demand Uncertainty: An Adjustable Robust Optimization Approach

    Directory of Open Access Journals (Sweden)

    Hua Sun

    2014-01-01

    Full Text Available This paper develops an adjustable robust optimization approach for a network design problem explicitly incorporating traffic dynamics and demand uncertainty. In particular, a cell transmission model based network design problem of linear programming type is considered to describe dynamic traffic flows, and a polyhedral uncertainty set is used to characterize the demand uncertainty. The major contribution of this paper is to formulate such an adjustable robust network design problem as a tractable linear programming model and justify the model which is less conservative by comparing its solution performance with the robust solution from the usual robust model. The numerical results using one network from the literature demonstrate the modeling advantage of the adjustable robust optimization and provided strategic managerial insights for enacting capacity expansion policies under demand uncertainty.

  14. Assessment of network inference methods: how to cope with an underdetermined problem.

    Directory of Open Access Journals (Sweden)

    Caroline Siegenthaler

    Full Text Available The inference of biological networks is an active research area in the field of systems biology. The number of network inference algorithms has grown tremendously in the last decade, underlining the importance of a fair assessment and comparison among these methods. Current assessments of the performance of an inference method typically involve the application of the algorithm to benchmark datasets and the comparison of the network predictions against the gold standard or reference networks. While the network inference problem is often deemed underdetermined, implying that the inference problem does not have a (unique solution, the consequences of such an attribute have not been rigorously taken into consideration. Here, we propose a new procedure for assessing the performance of gene regulatory network (GRN inference methods. The procedure takes into account the underdetermined nature of the inference problem, in which gene regulatory interactions that are inferable or non-inferable are determined based on causal inference. The assessment relies on a new definition of the confusion matrix, which excludes errors associated with non-inferable gene regulations. For demonstration purposes, the proposed assessment procedure is applied to the DREAM 4 In Silico Network Challenge. The results show a marked change in the ranking of participating methods when taking network inferability into account.

  15. A two-layer recurrent neural network for nonsmooth convex optimization problems.

    Science.gov (United States)

    Qin, Sitian; Xue, Xiaoping

    2015-06-01

    In this paper, a two-layer recurrent neural network is proposed to solve the nonsmooth convex optimization problem subject to convex inequality and linear equality constraints. Compared with existing neural network models, the proposed neural network has a low model complexity and avoids penalty parameters. It is proved that from any initial point, the state of the proposed neural network reaches the equality feasible region in finite time and stays there thereafter. Moreover, the state is unique if the initial point lies in the equality feasible region. The equilibrium point set of the proposed neural network is proved to be equivalent to the Karush-Kuhn-Tucker optimality set of the original optimization problem. It is further proved that the equilibrium point of the proposed neural network is stable in the sense of Lyapunov. Moreover, from any initial point, the state is proved to be convergent to an equilibrium point of the proposed neural network. Finally, as applications, the proposed neural network is used to solve nonlinear convex programming with linear constraints and L1 -norm minimization problems.

  16. A service flow model for the liner shipping network design problem

    DEFF Research Database (Denmark)

    Plum, Christian Edinger Munk; Pisinger, David; Sigurd, Mikkel M.

    2014-01-01

    Global liner shipping is a competitive industry, requiring liner carriers to carefully deploy their vessels efficiently to construct a cost competitive network. This paper presents a novel compact formulation of the liner shipping network design problem (LSNDP) based on service flows...... of the network and a penalty for not flowed cargo. The model can be used to design liner shipping networks to utilize a container carrier’s assets efficiently and to investigate possible scenarios of changed market conditions. The model is solved as a Mixed Integer Program. Results are presented for the two...

  17. A network centrality method for the rating problem

    CERN Document Server

    Li, Yongli; Wu, Chong

    2014-01-01

    We propose a new method for aggregating the information of multiple reviewers rating multiple products. Our approach is based on the network relations induced between products by the rating activity of the reviewers. We show that our method is algorithmically implementable even for large numbers of both products and consumers, as is the case for many online sites. Moreover, comparing it with the simple average, which is mostly used in practice, and with other methods previously proposed in the literature, it performs very well under various dimension, proving itself to be an optimal trade--off between computational efficiency, accordance with the reviewers original orderings, and robustness with respect to the inclusion of systematically biased reports.

  18. A Novel Linear Programming Formulation of Maximum Lifetime Routing Problem in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Cetin, Bilge Kartal; Prasad, Neeli R.; Prasad, Ramjee

    2011-01-01

    protocols, and the energy model for transmission. In this paper, we tackle the routing challenge for maximum lifetime of the sensor network. We introduce a novel linear programming approach to the maximum lifetime routing problem. To the best of our knowledge, this is the first mathematical programming...... of the maximum lifetime routing problem that considers the operation modes of the node. Solution of the linear programming gives the upper analytical bound for the network lifetime. In order to illustrate teh application of the optimization model, we solved teh problem for different parameter settings...

  19. A Branch and Cut algorithm for the container shipping network design problem

    DEFF Research Database (Denmark)

    Reinhardt, Line Blander; Pisinger, David

    2012-01-01

    programming model minimizing the overall cost. To better reflect the real-life situation we take into account the cost of transhipment, a heterogeneous fleet, route dependant capacities, and butterfly routes. To the best of our knowledge it is the first time an exact solution method to the problem considers......The network design problem in liner shipping is of increasing importance in a strongly competitive market where potential cost reductions can influence market share and profits significantly. In this paper the network design and fleet assignment problems are combined into a mixed integer linear...

  20. A nonfeasible gradient projection recurrent neural network for equality-constrained optimization problems.

    Science.gov (United States)

    Barbarosou, Maria P; Maratos, Nicholas G

    2008-10-01

    In this paper, a recurrent neural network for both convex and nonconvex equality-constrained optimization problems is proposed, which makes use of a cost gradient projection onto the tangent space of the constraints. The proposed neural network constructs a generically nonfeasible trajectory, satisfying the constraints only as t --> infinity. Local convergence results are given that do not assume convexity of the optimization problem to be solved. Global convergence results are established for convex optimization problems. An exponential convergence rate is shown to hold both for the convex case and the nonconvex case. Numerical results indicate that the proposed method is efficient and accurate.

  1. A Branch and Cut algorithm for the container shipping network design problem

    DEFF Research Database (Denmark)

    Reinhardt, Line Blander; Kallehauge, Brian; Pisinger, David

    The network design problem in liner shipping is of increasing importance in a strongly competitive market where potential cost reductions can influence market share and profits significantly. In this paper the network design and fleet assignment problems are combined into a mixed integer linear...... programming model minimizing the overall cost. To better reflect the real-life situation we take into account the cost of transhipment, a heterogeneous fleet, route dependant capacities, and butterfly routes. To the best of our knowledge it is the first time an exact solution method to the problem considers...

  2. Electronic neural network for solving traveling salesman and similar global optimization problems

    Science.gov (United States)

    Thakoor, Anilkumar P. (Inventor); Moopenn, Alexander W. (Inventor); Duong, Tuan A. (Inventor); Eberhardt, Silvio P. (Inventor)

    1993-01-01

    This invention is a novel high-speed neural network based processor for solving the 'traveling salesman' and other global optimization problems. It comprises a novel hybrid architecture employing a binary synaptic array whose embodiment incorporates the fixed rules of the problem, such as the number of cities to be visited. The array is prompted by analog voltages representing variables such as distances. The processor incorporates two interconnected feedback networks, each of which solves part of the problem independently and simultaneously, yet which exchange information dynamically.

  3. The minimum cost multicommodity flow problem in dynamic networks and an algorithm for its solving

    Directory of Open Access Journals (Sweden)

    Maria A. Fonoberova

    2005-05-01

    Full Text Available The dynamic version of the minimum cost multicommodity flow problem that generalizes the static minimum cost multicommodity flow problem is formulated and studied. This dynamic problem is considered on directed networks with a set of commodities, time-varying capacities, fixed transit times on arcs, and a given time horizon. We assume that cost functions, defined on edges, are nonlinear and depend on time and flow and the demand function also depends on time. The corresponding algorithm, based on reducing the dynamic problem to a static problem on a time-expanded network, to solve the minimum cost dynamic multicommodity flow problem is proposed and some details concerning its complexity are discussed. Mathematics Subject Classification 2000: 90B10, 90C35, 90C27.

  4. On the Integrated Job Scheduling and Constrained Network Routing Problem

    DEFF Research Database (Denmark)

    Gamst, Mette

    This paper examines the NP-hard problem of scheduling a number of jobs on a finite set of machines such that the overall profit of executed jobs is maximized. Each job demands a number of resources, which must be sent to the executing machine via constrained paths. Furthermore, two resource demand...... transmissions cannot use the same edge in the same time period. An exact solution approach based on Dantzig-Wolfe decomposition is proposed along with several heuristics. The methods are computationally evaluated on test instances arising from telecommunications with up to 500 jobs and 500 machines. Results...

  5. Pricing and Capacity Planning Problems in Energy Transmission Networks

    OpenAIRE

    Villumsen, Jonas Christoffer; Clausen, Jens; Pisinger, David

    2011-01-01

    Effektiv brug af energi er et stadig vigtigere emne. Miljø-og klima problemer samt bekymring for forsyningssikkerhed har gjort vedvarende energikilder til et reelt alternativ til traditionelle energikilder. Men den fluktuerende karakter af for eksempel vind- og solenergi nødvendiggør en radikal ændring i den m°ade vi planlægger og driver energisystemer. Et andet paradigmeskift, som begyndte i 1990’erne for el-systemer er markedsderegulering, hvilket har ført til en række forskellige markedsst...

  6. Optimality problem of network topology in stocks market analysis

    Science.gov (United States)

    Djauhari, Maman Abdurachman; Gan, Siew Lee

    2015-02-01

    Since its introduction fifteen years ago, minimal spanning tree has become an indispensible tool in econophysics. It is to filter the important economic information contained in a complex system of financial markets' commodities. Here we show that, in general, that tool is not optimal in terms of topological properties. Consequently, the economic interpretation of the filtered information might be misleading. To overcome that non-optimality problem, a set of criteria and a selection procedure of an optimal minimal spanning tree will be developed. By using New York Stock Exchange data, the advantages of the proposed method will be illustrated in terms of the power-law of degree distribution.

  7. A New Iterated Local Search Algorithm for Solving Broadcast Scheduling Problems in Packet Radio Networks

    Directory of Open Access Journals (Sweden)

    Chih-Chiang Lin

    2010-01-01

    Full Text Available The broadcast scheduling problem (BSP in packet radio networks is a well-known NP-complete combinatorial optimization problem. The broadcast scheduling avoids packet collisions by allowing only one node transmission in each collision domain of a time division multiple access (TDMA network. It also improves the transmission utilization by assigning one transmission time slot to one or more nodes; thus, each node transmits at least once in each time frame. An optimum transmission schedule could minimize the length of a time frame while minimizing the number of idle nodes. In this paper, we propose a new iterated local search (ILS algorithm that consists of two special perturbation and local search operators to solve the BSPs. Computational experiments are applied to benchmark data sets and randomly generated problem instances. The experimental results show that our ILS approach is effective in solving the problems with only a few runtimes, even for very large networks with 2,500 nodes.

  8. Communication to within a fidelity criterion over unknown networks by reduction to reliable communication problems over unknown networks

    CERN Document Server

    Agarwal, Mukul

    2010-01-01

    Consider a scenerio where various users want to communicate with each other over an unknown network to within a fidelity criterion. Thus, there are various users. Each user has a source that it wants to send to another user to within some distortion level. We abstract this problem as that of universal communication of random sources over networks to within a distortion criterion. We compute ta universally reliably achievable region for a set of networks where networks in the set are defined in terms of end to end distortion that they achieve for transmission of independent signals between various nodes assuming that there is common randomness between sender and corresponding receiver. Using this, we provide results for when communication of independent signals to within particular fidelity criteria is possible in terms of when reliable communication is possible. Using this, we show that when the sources at the various nodes are independent of each other, it is sufficient to consider separation architectures: ...

  9. The Coverage Problem in Video-Based Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Luiz Affonso Guedes

    2010-09-01

    Full Text Available Wireless sensor networks typically consist of a great number of tiny low-cost electronic devices with limited sensing and computing capabilities which cooperatively communicate to collect some kind of information from an area of interest. When wireless nodes of such networks are equipped with a low-power camera, visual data can be retrieved, facilitating a new set of novel applications. The nature of video-based wireless sensor networks demands new algorithms and solutions, since traditional wireless sensor networks approaches are not feasible or even efficient for that specialized communication scenario. The coverage problem is a crucial issue of wireless sensor networks, requiring specific solutions when video-based sensors are employed. In this paper, it is surveyed the state of the art of this particular issue, regarding strategies, algorithms and general computational solutions. Open research areas are also discussed, envisaging promising investigation considering coverage in video-based wireless sensor networks.

  10. The coverage problem in video-based wireless sensor networks: a survey.

    Science.gov (United States)

    Costa, Daniel G; Guedes, Luiz Affonso

    2010-01-01

    Wireless sensor networks typically consist of a great number of tiny low-cost electronic devices with limited sensing and computing capabilities which cooperatively communicate to collect some kind of information from an area of interest. When wireless nodes of such networks are equipped with a low-power camera, visual data can be retrieved, facilitating a new set of novel applications. The nature of video-based wireless sensor networks demands new algorithms and solutions, since traditional wireless sensor networks approaches are not feasible or even efficient for that specialized communication scenario. The coverage problem is a crucial issue of wireless sensor networks, requiring specific solutions when video-based sensors are employed. In this paper, it is surveyed the state of the art of this particular issue, regarding strategies, algorithms and general computational solutions. Open research areas are also discussed, envisaging promising investigation considering coverage in video-based wireless sensor networks.

  11. Practical Solutions for Harmonics Problems Produced in the Distribution Networks

    Directory of Open Access Journals (Sweden)

    A. F. Zobaa

    2006-03-01

    Full Text Available Harmonic distortion on the power system is a modern concern due to the technological advances in silicon technology as it presents an increased non-linear loading of the power system. The effects of harmonics are well known: customers could experience major production losses due to the loss of supply as an example, on the other hand, harmonic load currents cause the utility to supply a higher real energy input then the actual real power needed to maintain a plant’s production at a certain level. The utility carries the extra transmission losses due to the harmonic currents. Different solutions will be reviewed as concepts for solving certain types of problems related to power quality. Both theoretical and a case study are presented.

  12. Inference of Vohradsky's models of genetic networks by solving two-dimensional function optimization problems.

    Directory of Open Access Journals (Sweden)

    Shuhei Kimura

    Full Text Available The inference of a genetic network is a problem in which mutual interactions among genes are inferred from time-series of gene expression levels. While a number of models have been proposed to describe genetic networks, this study focuses on a mathematical model proposed by Vohradský. Because of its advantageous features, several researchers have proposed the inference methods based on Vohradský's model. When trying to analyze large-scale networks consisting of dozens of genes, however, these methods must solve high-dimensional non-linear function optimization problems. In order to resolve the difficulty of estimating the parameters of the Vohradský's model, this study proposes a new method that defines the problem as several two-dimensional function optimization problems. Through numerical experiments on artificial genetic network inference problems, we showed that, although the computation time of the proposed method is not the shortest, the method has the ability to estimate parameters of Vohradský's models more effectively with sufficiently short computation times. This study then applied the proposed method to an actual inference problem of the bacterial SOS DNA repair system, and succeeded in finding several reasonable regulations.

  13. Harmony search optimization algorithm for a novel transportation problem in a consolidation network

    Science.gov (United States)

    Davod Hosseini, Seyed; Akbarpour Shirazi, Mohsen; Taghi Fatemi Ghomi, Seyed Mohammad

    2014-11-01

    This article presents a new harmony search optimization algorithm to solve a novel integer programming model developed for a consolidation network. In this network, a set of vehicles is used to transport goods from suppliers to their corresponding customers via two transportation systems: direct shipment and milk run logistics. The objective of this problem is to minimize the total shipping cost in the network, so it tries to reduce the number of required vehicles using an efficient vehicle routing strategy in the solution approach. Solving several numerical examples confirms that the proposed solution approach based on the harmony search algorithm performs much better than CPLEX in reducing both the shipping cost in the network and computational time requirement, especially for realistic size problem instances.

  14. Fault-tolerance of a neural network solving the traveling salesman problem

    Science.gov (United States)

    Protzel, P.; Palumbo, D.; Arras, M.

    1989-01-01

    This study presents the results of a fault-injection experiment that stimulates a neural network solving the Traveling Salesman Problem (TSP). The network is based on a modified version of Hopfield's and Tank's original method. We define a performance characteristic for the TSP that allows an overall assessment of the solution quality for different city-distributions and problem sizes. Five different 10-, 20-, and 30- city cases are sued for the injection of up to 13 simultaneous stuck-at-0 and stuck-at-1 faults. The results of more than 4000 simulation-runs show the extreme fault-tolerance of the network, especially with respect to stuck-at-0 faults. One possible explanation for the overall surprising result is the redundancy of the problem representation.

  15. Average Consensus Problems in Networks of Agents with Fixed and Switching Topology and Unknown Control Direction

    Directory of Open Access Journals (Sweden)

    Caixian Sun

    2014-01-01

    Full Text Available This paper is devoted to the average consensus problems in directed networks of agents with unknown control direction. In this paper, by using Nussbaum function techniques and Laplacian matrix, novel average consensus protocols are designed for multiagent systems with unknown control direction in the cases of directed networks with fixed and switching topology. In the case of switching topology, the disagreement vector is utilized. Finally, simulation is provided to demonstrate the effectiveness of our results.

  16. DOE Network 2025: Network Research Problems and Challenges for DOE Scientists. Workshop Report

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2016-02-01

    The growing investments in large science instruments and supercomputers by the US Department of Energy (DOE) hold enormous promise for accelerating the scientific discovery process. They facilitate unprecedented collaborations of geographically dispersed teams of scientists that use these resources. These collaborations critically depend on the production, sharing, moving, and management of, as well as interactive access to, large, complex data sets at sites dispersed across the country and around the globe. In particular, they call for significant enhancements in network capacities to sustain large data volumes and, equally important, the capabilities to collaboratively access the data across computing, storage, and instrument facilities by science users and automated scripts and systems. Improvements in network backbone capacities of several orders of magnitude are essential to meet these challenges, in particular, to support exascale initiatives. Yet, raw network speed represents only a part of the solution. Indeed, the speed must be matched by network and transport layer protocols and higher layer tools that scale in ways that aggregate, compose, and integrate the disparate subsystems into a complete science ecosystem. Just as important, agile monitoring and management services need to be developed to operate the network at peak performance levels. Finally, these solutions must be made an integral part of the production facilities by using sound approaches to develop, deploy, diagnose, operate, and maintain them over the science infrastructure.

  17. The problem of colliding networks and its relation to cell fusion and cancer.

    Science.gov (United States)

    Koulakov, Alexei A; Lazebnik, Yuri

    2012-11-07

    Cell fusion, a process that merges two or more cells into one, is required for normal development and has been explored as a tool for stem cell therapy. It has also been proposed that cell fusion causes cancer and contributes to its progression. These functions rely on a poorly understood ability of cell fusion to create new cell types. We suggest that this ability can be understood by considering cells as attractor networks whose basic property is to adopt a set of distinct, stable, self-maintaining states called attractors. According to this view, fusion of two cell types is a collision of two networks that have adopted distinct attractors. To learn how these networks reach a consensus, we model cell fusion computationally. To do so, we simulate patterns of gene activities using a formalism developed to simulate patterns of memory in neural networks. We find that the hybrid networks can assume attractors that are unrelated to parental attractors, implying that cell fusion can create new cell types by nearly instantaneously moving cells between attractors. We also show that hybrid networks are prone to assume spurious attractors, which are emergent and sporadic network states. This finding means that cell fusion can produce abnormal cell types, including cancerous types, by placing cells into normally inaccessible spurious states. Finally, we suggest that the problem of colliding networks has general significance in many processes represented by attractor networks, including biological, social, and political phenomena. Copyright © 2012 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  18. Problem-Solving Methods for the Prospective Development of Urban Power Distribution Network

    Directory of Open Access Journals (Sweden)

    A. P. Karpenko

    2014-01-01

    Full Text Available This article succeeds the former A. P. K nko’ and A. I. Kuzmina’ ubl t on titled "A mathematical model of urban distribution electro-network considering its future development" (electronic scientific and technical magazine "Science and education" No. 5, 2014.The article offers a model of urban power distribution network as a set of transformer and distribution substations and cable lines. All elements of the network and new consumers are determined owing to vectors of parameters consistent with them.A problem of the urban power distribution network design, taking into account a prospective development of the city, is presented as a problem of discrete programming. It is in deciding on the optimal option to connect new consumers to the power supply network, on the number and sites to build new substations, and on the option to include them in the power supply network.Two methods, namely a reduction method for a set the nested tasks of global minimization and a decomposition method are offered to solve the problem.In reduction method the problem of prospective development of power supply network breaks into three subtasks of smaller dimension: a subtask to define the number and sites of new transformer and distribution substations, a subtask to define the option to connect new consumers to the power supply network, and a subtask to include new substations in the power supply network. The vector of the varied parameters is broken into three subvectors consistent with the subtasks. Each subtask is solved using an area of admissible vector values of the varied parameters at the fixed components of the subvectors obtained when solving the higher subtasks.In decomposition method the task is presented as a set of three, similar to reduction method, reductions of subtasks and a problem of coordination. The problem of coordination specifies a sequence of the subtasks solution, defines the moment of calculation termination. Coordination is realized by

  19. Reduction of the dimension of neural network models in problems of pattern recognition and forecasting

    Science.gov (United States)

    Nasertdinova, A. D.; Bochkarev, V. V.

    2017-11-01

    Deep neural networks with a large number of parameters are a powerful tool for solving problems of pattern recognition, prediction and classification. Nevertheless, overfitting remains a serious problem in the use of such networks. A method of solving the problem of overfitting is proposed in this article. This method is based on reducing the number of independent parameters of a neural network model using the principal component analysis, and can be implemented using existing libraries of neural computing. The algorithm was tested on the problem of recognition of handwritten symbols from the MNIST database, as well as on the task of predicting time series (rows of the average monthly number of sunspots and series of the Lorentz system were used). It is shown that the application of the principal component analysis enables reducing the number of parameters of the neural network model when the results are good. The average error rate for the recognition of handwritten figures from the MNIST database was 1.12% (which is comparable to the results obtained using the "Deep training" methods), while the number of parameters of the neural network can be reduced to 130 times.

  20. A Matheuristic for the Liner Shipping Network Design Problem with Transit Time Restrictions

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard; Desaulniers, Guy; Karsten, Christian Vad

    2015-01-01

    We present a mathematical model for the liner shipping network design problem with transit time restrictions on the cargo flow. We extend an existing matheuristic for the liner shipping network design problem to consider transit time restrictions. The matheuristic is an improvement heuristic, where...... an integer program is solved iteratively as a move operator in a large-scale neighborhood search. To assess the effects of insertions/removals of port calls, flow and revenue changes are estimated for relevant commodities along with an estimation of the change in the vessel cost. Computational results...

  1. Multi-objective optimization model and evolutional solution of network node matching problem

    Science.gov (United States)

    Yao, Xiangjuan; Gong, Dunwei; Wang, Peipei; Chen, Lina

    2017-10-01

    In reality, many systems can be abstracted as a network. The research results show that there are close relations between different networks. How to find out the corresponding relationship between the nodes of different networks, i.e. the node matching problem, is a topic worthy of further study. The existing network node matching methods often use a single criteria to measure the matching precision of two networks, therefore may obtain inaccurate results. In fact, the matching accuracy of two networks can be measured using different structural information, so as to improve the reliability and accuracy of the matching method. In view of this, this paper establishes a multi-objective optimization model of network node matching problem in which the matching accuracy is measured by multiple criteria. When using evolutionary algorithm to solve the model, the multiple objectives are unified into a fitness function. The experimental results show that this method can obtain better matching accuracy than single-objective method and the random method while using less running time.

  2. Link-prediction to tackle the boundary specification problem in social network surveys

    Science.gov (United States)

    De Wilde, Philippe; Buarque de Lima-Neto, Fernando

    2017-01-01

    Diffusion processes in social networks often cause the emergence of global phenomena from individual behavior within a society. The study of those global phenomena and the simulation of those diffusion processes frequently require a good model of the global network. However, survey data and data from online sources are often restricted to single social groups or features, such as age groups, single schools, companies, or interest groups. Hence, a modeling approach is required that extrapolates the locally restricted data to a global network model. We tackle this Missing Data Problem using Link-Prediction techniques from social network research, network generation techniques from the area of Social Simulation, as well as a combination of both. We found that techniques employing less information may be more adequate to solve this problem, especially when data granularity is an issue. We validated the network models created with our techniques on a number of real-world networks, investigating degree distributions as well as the likelihood of links given the geographical distance between two nodes. PMID:28426826

  3. A hybrid model for multi-objective capacitated facility location network design problem

    Directory of Open Access Journals (Sweden)

    Mohammad saeed JabalAmeli

    2011-01-01

    Full Text Available One of the primary concerns on many traditional capacitated facility location/network problems is to consider transportation and setup facilities in one single objective function. This simple assumption may lead to misleading solutions since the cost of transportation is normally considered for a short period time and, obviously, the higher cost of setting up the facilities may reduce the importance of the transportation cost/network. In this paper, we introduce capacitated facility location/network design problem (CFLNDP with two separate objective functions in forms of multi-objective with limited capacity. The proposed model is solved using a new hybrid algorithm where there are two stages. In the first stage, locations of facilities and design of fundamental network are determined and in the second stage demands are allocated to the facilities. The resulted multi-objective problem is solved using Lexicography method for a well-known example from the literature with 21 node instances. We study the behaviour of the resulted problem under different scenarios in order to gain insight into the behaviour of the model in response to changes in key problem parameters.

  4. Non-destructive testing

    Energy Technology Data Exchange (ETDEWEB)

    Hull, B.; John, V.

    1988-01-01

    This text covers, the underlying principles and some major applications of non-destructive inspection methods. Complete chapters are devoted to each of the following: liquid penetration inspection, magnetic particle inspection, electrical testing, ultrasonic testing and radiography. The concluding chapter introduces the reader to some of the more recent developments in non-destructive inspection.

  5. Using Metaheuristic Algorithms for Solving a Hub Location Problem: Application in Passive Optical Network Planning

    Directory of Open Access Journals (Sweden)

    Masoud Rabbani

    2017-02-01

    Full Text Available Nowadays, fiber-optic due to having greater bandwidth and being more efficient compared with other similar technologies, are counted as one the most important tools for data transfer. In this article, an integrated mathematical model for a three-level fiber-optic distribution network with consideration of simultaneous backbone and local access networks is presented in which the backbone network is a ring and the access networks has a star-star topology. The aim of the model is to determine the location of the central offices and splitters, how connections are made between central offices, and allocation of each demand node to a splitter or central office in a way that the wiring cost of fiber optical and concentrator installation are minimized. Moreover, each user’s desired bandwidth should be provided efficiently. Then, the proposed model is validated by GAMS software in small-sized problems, afterwards the model is solved by two meta-heuristic methods including differential evolution (DE and genetic algorithm (GA in large-scaled problems and the results of two algorithms are compared with respect to computational time and objective function obtained value. Finally, a sensitivity analysis is provided. Keyword: Fiber-optic, telecommunication network, hub-location, passive splitter, three-level network.

  6. Interaction Network Estimation: Predicting Problem-Solving Diversity in Interactive Environments

    Science.gov (United States)

    Eagle, Michael; Hicks, Drew; Barnes, Tiffany

    2015-01-01

    Intelligent tutoring systems and computer aided learning environments aimed at developing problem solving produce large amounts of transactional data which make it a challenge for both researchers and educators to understand how students work within the environment. Researchers have modeled student-tutor interactions using complex networks in…

  7. A Novel Biobjective Risk-Based Model for Stochastic Air Traffic Network Flow Optimization Problem.

    Science.gov (United States)

    Cai, Kaiquan; Jia, Yaoguang; Zhu, Yanbo; Xiao, Mingming

    2015-01-01

    Network-wide air traffic flow management (ATFM) is an effective way to alleviate demand-capacity imbalances globally and thereafter reduce airspace congestion and flight delays. The conventional ATFM models assume the capacities of airports or airspace sectors are all predetermined. However, the capacity uncertainties due to the dynamics of convective weather may make the deterministic ATFM measures impractical. This paper investigates the stochastic air traffic network flow optimization (SATNFO) problem, which is formulated as a weighted biobjective 0-1 integer programming model. In order to evaluate the effect of capacity uncertainties on ATFM, the operational risk is modeled via probabilistic risk assessment and introduced as an extra objective in SATNFO problem. Computation experiments using real-world air traffic network data associated with simulated weather data show that presented model has far less constraints compared to stochastic model with nonanticipative constraints, which means our proposed model reduces the computation complexity.

  8. Solving the Weighted Constraint Satisfaction Problems Via the Neural Network Approach

    Directory of Open Access Journals (Sweden)

    Khalid Haddouch

    2016-09-01

    Full Text Available A wide variety of real world optimization problems can be modelled as Weighted Constraint Satisfaction Problems (WCSPs. In this paper, we model this problem in terms of in original 0-1 quadratic programming subject to leaner constraints. View it performance, we use the continuous Hopfield network to solve the obtained model basing on original energy function. To validate our model, we solve several instance of benchmarking WCSP. In this regard, our approach recognizes the optimal solution of the said instances.

  9. Asymmetric continuous-time neural networks without local traps for solving constraint satisfaction problems.

    Directory of Open Access Journals (Sweden)

    Botond Molnár

    Full Text Available There has been a long history of using neural networks for combinatorial optimization and constraint satisfaction problems. Symmetric Hopfield networks and similar approaches use steepest descent dynamics, and they always converge to the closest local minimum of the energy landscape. For finding global minima additional parameter-sensitive techniques are used, such as classical simulated annealing or the so-called chaotic simulated annealing, which induces chaotic dynamics by addition of extra terms to the energy landscape. Here we show that asymmetric continuous-time neural networks can solve constraint satisfaction problems without getting trapped in non-solution attractors. We concentrate on a model solving Boolean satisfiability (k-SAT, which is a quintessential NP-complete problem. There is a one-to-one correspondence between the stable fixed points of the neural network and the k-SAT solutions and we present numerical evidence that limit cycles may also be avoided by appropriately choosing the parameters of the model. This optimal parameter region is fairly independent of the size and hardness of instances, this way parameters can be chosen independently of the properties of problems and no tuning is required during the dynamical process. The model is similar to cellular neural networks already used in CNN computers. On an analog device solving a SAT problem would take a single operation: the connection weights are determined by the k-SAT instance and starting from any initial condition the system searches until finding a solution. In this new approach transient chaotic behavior appears as a natural consequence of optimization hardness and not as an externally induced effect.

  10. PROACTIVE APPROACH TO THE INCIDENT AND PROBLEM MANAGEMENT IN COMMUNICATION NETWORKS

    Directory of Open Access Journals (Sweden)

    Vjeran Strahonja

    2007-06-01

    Full Text Available Proactive approach to communication network maintenance has the capability of enhancing the integrity and reliability of communication networks, as well as of reducing maintenance costs and overall number of incidents. This paper presents approaches to problem and incident prevention with the help of root-cause analysis, aligning that with the goal to foresee software performance. Implementation of proactive approach requires recognition of enterprise's current level of maintenance better insights into available approaches and tools, as well as their comparison, interoperability, integration and further development. The approach we are proposing and elaborating in this paper lies on the construction of a metamodel of the problem management of information technology, particularly the proactive problem management. The metamodel is derived from the original ITIL specification and presented in an object-oriented fashion by using structure (class diagrams conform to UML notation. Based on current research, appropriate metrics based on the concept of Key Performance Indicators is suggested.

  11. Method of Geometric Connected Disk Cover Problem for UAV realy network deployment

    Directory of Open Access Journals (Sweden)

    Chuang Liu

    2017-01-01

    Full Text Available Aiming at the problem of the effective connectivity of a large number of mobile combat units in the future aeronautic swarm operation, this paper proposes an idea of using UAV(Unmanned Aerial Vehicle to build, and studies the deployment of the network. User coverage and network connectivity are important for a relay network planning which are studied separately in traditional ways. In order to effectively combine these two factors while the network’s survivability is taken into account. Firstly, the concept of node aggregation degree is proposed. Secondly, a performance evaluation parameter for UAV relay network is proposed based on node aggregation degree, then analyzes the lack of deterministic deployment and presents one a PSO (VFA-PSO deployment algorithm based on virtual force. Finally, compared with the existing algorithms, the validity and stability of the algorithm are verified. The experimental results show that the VFA-PSO algorithm can effectively improve the network coverage and the survivability of the network under the premise of ensuring the network connectivity, and has better deployment effect.

  12. Destructiveness in Political Discourse

    Directory of Open Access Journals (Sweden)

    Яна Александровна Волкова

    2016-12-01

    Full Text Available Destructiveness is among the fundamental discourse categories that play a significant role in the organization of communicative interaction and define the pragmatics of discourse; its study helps to understand some mechanisms and principles of communication, identify strategies and tactics used by a destructive communicative personality. The relevance of this study is determined by the increasing aggressiveness in various types of discourse, and, accordingly, by the need to extend the knowledge of destructive behavior of a communicative personality. The study is based on the theory of discourse-analysis and theory of destructiveness (Z. Harris, T. van Dijk, A. Buss, E. Fromm, D. Ponton, K. Hacker, R. Wodak. N. Arutyunova, V. Karasik, M. Makarov, E. Sheigal et al. Developing the theory of destructiveness and relying on Erich Fromm’s research (1973, we specify the concept of “destructiveness” in relation to the political discourse and compare it with the related concept of aggressiveness. The paper analyses the category of destructiveness in modern US political discourse, using excerpts from the speeches of the candidates for presidency of 2016. Particular attention is paid to the dominant destructive intention - to harm the reputation of the opponent and reduce his political chances, as well as to the functions of verbal aggression: on the one hand - to discredit the opponent, bring accusations, on the other hand - to poison the audience mind against him/her and arouse the feeling of danger posed by a political opponent. The analysis of verbal and nonverbal means of destructiveness in the US political discourse is carried out. The article concludes that abusive remarks of politicians do not result from spontaneous emotional outburst, but from an elaborated destructive strategy where the agonistic nature of political discourse stipulates the use of instrumental aggression (Buss, 1971 for the sake of the conquest of power, lowering the

  13. Tight bounds on the size of neural networks for classification problems

    Energy Technology Data Exchange (ETDEWEB)

    Beiu, V. [Los Alamos National Lab., NM (United States); Pauw, T. de [Universite Catholique de Louvain, Louvain-la-Neuve (Belgium). Dept. de Mathematique

    1997-06-01

    This paper relies on the entropy of a data-set (i.e., number-of-bits) to prove tight bounds on the size of neural networks solving a classification problem. First, based on a sequence of geometrical steps, the authors constructively compute an upper bound of O(mn) on the number-of-bits for a given data-set - here m is the number of examples and n is the number of dimensions (i.e., R{sup n}). This result is used further in a nonconstructive way to bound the size of neural networks which correctly classify that data-set.

  14. A note on the consensus finding problem in communication networks with switching topologies

    KAUST Repository

    Haskovec, Jan

    2014-05-07

    In this note, we discuss the problem of consensus finding in communication networks of agents with dynamically switching topologies. In particular, we consider the case of directed networks with unbalanced matrices of communication rates. We formulate sufficient conditions for consensus finding in terms of strong connectivity of the underlying directed graphs and prove that, given these conditions, consensus is found asymptotically. Moreover, we show that this consensus is an emergent property of the system, being encoded in its dynamics and not just an invariant of its initial configuration. © 2014 © 2014 Taylor & Francis.

  15. Preventing resonance problems in speed-controlled blowers. Destruction of the blower-motor unit may result; Resonanzprobleme drehzahlgeregelter Ventilatoren vermeiden. Zerstoerung der Ventilator-Motoreinheit nicht ausgeschlossen

    Energy Technology Data Exchange (ETDEWEB)

    Lexis, J.

    2004-05-01

    The economic efficiency of a ventilation depends not least on the ease with which air volumes can be adapted to changing operating conditions. Speed control is the most common method, but undesired resonance phenomena may occur in certain operating conditions. This must be prevented at all cost as resonances will cause noise problems and may even destroy the blower-motor unit. (orig.) [German] Die Wirtschaftlichkeit einer lufttechnischen Anlage wird entscheidend dadurch bestimmt, wie gut oder wie schlecht sich die Anpassung der Luftmengen an veraenderte Betriebssituationen realisieren laesst. Die am haeufigsten verwendete Methode ist die Drehzahlregelung des Ventilators. Dabei kann es unter bestimmten Betriebsbedingungen zu unerwuenschten Resonanzerscheinungen kommen. Der Betrieb eines Ventilators in diesem Bereich ist aber auf keinen Fall zulaessig, denn Resonanzen koennen zu Geraeuschproblemen und zur Zerstoerung der Ventilator-Motoreinheit fuehren. (orig.)

  16. Peer influences on internalizing and externalizing problems among adolescents: a longitudinal social network analysis.

    Science.gov (United States)

    Fortuin, Janna; van Geel, Mitch; Vedder, Paul

    2015-04-01

    Adolescents who like each other may become more similar to each other with regard to internalizing and externalizing problems, though it is not yet clear which social mechanisms explain these similarities. In this longitudinal study, we analyzed four mechanisms that may explain similarity in adolescent peer networks with regard to externalizing and internalizing problems: selection, socialization, avoidance and withdrawal. At three moments during one school-year, we asked 542 adolescents (8th grade, M-age = 13.3 years, 51 % female) to report who they liked in their classroom, and their own internalizing and externalizing problems. Adolescents tend to prefer peers who have similar externalizing problem scores, but no significant selection effect was found for internalizing problems. Adolescents who share the same group of friends socialize each other and then become more similar with respect to externalizing problems, but not with respect to internalizing problems. We found no significant effects for avoidance or withdrawal. Adolescents may choose to belong to a peer group that is similar to them in terms of externalizing problem behaviors, and through peer group socialization (e.g., enticing, modelling, mimicking, and peer pressure) become more similar to that group over time.

  17. A two-stage approach for a multi-objective component assignment problem for a stochastic-flow network

    Science.gov (United States)

    Lin, Yi-Kuei; Yeh, Cheng-Ta

    2013-03-01

    Many real-life systems, such as computer systems, manufacturing systems and logistics systems, are modelled as stochastic-flow networks (SFNs) to evaluate network reliability. Here, network reliability, defined as the probability that the network successfully transmits d units of data/commodity from an origin to a destination, is a performance indicator of the systems. Network reliability maximization is a particular objective, but is costly for many system supervisors. This article solves the multi-objective problem of reliability maximization and cost minimization by finding the optimal component assignment for SFN, in which a set of multi-state components is ready to be assigned to the network. A two-stage approach integrating Non-dominated Sorting Genetic Algorithm II and simple additive weighting are proposed to solve this problem, where network reliability is evaluated in terms of minimal paths and recursive sum of disjoint products. Several practical examples related to computer networks are utilized to demonstrate the proposed approach.

  18. Acceptability of participatory social network analysis for problem-solving in Australian Aboriginal health service partnerships

    Directory of Open Access Journals (Sweden)

    Fuller Jeffrey

    2012-06-01

    Full Text Available Abstract Background While participatory social network analysis can help health service partnerships to solve problems, little is known about its acceptability in cross-cultural settings. We conducted two case studies of chronic illness service partnerships in 2007 and 2008 to determine whether participatory research incorporating social network analysis is acceptable for problem-solving in Australian Aboriginal health service delivery. Methods Local research groups comprising 13–19 partnership staff, policy officers and community members were established at each of two sites to guide the research and to reflect and act on the findings. Network and work practice surveys were conducted with 42 staff, and the results were fed back to the research groups. At the end of the project, 19 informants at the two sites were interviewed, and the researchers conducted critical reflection. The effectiveness and acceptability of the participatory social network method were determined quantitatively and qualitatively. Results Participants in both local research groups considered that the network survey had accurately described the links between workers related to the exchange of clinical and cultural information, team care relationships, involvement in service management and planning and involvement in policy development. This revealed the function of the teams and the roles of workers in each partnership. Aboriginal workers had a high number of direct links in the exchange of cultural information, illustrating their role as the cultural resource, whereas they had fewer direct links with other network members on clinical information exchange and team care. The problem of their current and future roles was discussed inside and outside the local research groups. According to the interview informants the participatory network analysis had opened the way for problem-solving by “putting issues on the table”. While there were confronting and ethically

  19. Hybrid genetic algorithm in the Hopfield network for maximum 2-satisfiability problem

    Science.gov (United States)

    Kasihmuddin, Mohd Shareduwan Mohd; Sathasivam, Saratha; Mansor, Mohd. Asyraf

    2017-08-01

    Heuristic method was designed for finding optimal solution more quickly compared to classical methods which are too complex to comprehend. In this study, a hybrid approach that utilizes Hopfield network and genetic algorithm in doing maximum 2-Satisfiability problem (MAX-2SAT) was proposed. Hopfield neural network was used to minimize logical inconsistency in interpretations of logic clauses or program. Genetic algorithm (GA) has pioneered the implementation of methods that exploit the idea of combination and reproduce a better solution. The simulation incorporated with and without genetic algorithm will be examined by using Microsoft Visual 2013 C++ Express software. The performance of both searching techniques in doing MAX-2SAT was evaluate based on global minima ratio, ratio of satisfied clause and computation time. The result obtained form the computer simulation demonstrates the effectiveness and acceleration features of genetic algorithm in doing MAX-2SAT in Hopfield network.

  20. EVOLUTIONARY MODELING PROBLEMS IN STRUCTURAL SYNTHESIS OF INFORMATION NETWORKS OF AUTOMATED CONTROL SYSTEMS

    Directory of Open Access Journals (Sweden)

    N.R.Yusupbekov

    2014-07-01

    Full Text Available This paper provides a new approach for solving a problem of modeling and structural syntheses of information networks of automated control systems by applying fuzzy sets theory, fuzzy logic and genetic algorithms. The procedure of formalizing structural syntheses of multi-level dispersed information networks of automated control systems is proposed. Also, the paper proposes a conceptual model of evolutionary syntheses based on genetic algorithms, which do not require additional information about the characteristics and features of target function. Modified genetic operators of crossover, mutation and algorithms of evolutionary syntheses of information networks systems are developed. Finally, the results of computational experiments on researching the influence of probability of the use of crossover and mutation operators, method of choosing parental pairs, and the size of initial population on the speed and precision of final results are provided.

  1. A PSO based Artificial Neural Network approach for short term unit commitment problem

    Directory of Open Access Journals (Sweden)

    AFTAB AHMAD

    2010-10-01

    Full Text Available Unit commitment (UC is a non-linear, large scale, complex, mixed-integer combinatorial constrained optimization problem. This paper proposes, a new hybrid approach for generating unit commitment schedules using swarm intelligence learning rule based neural network. The training data has been generated using dynamic programming for machines without valve point effects and using genetic algorithm for machines with valve point effects. A set of load patterns as inputs and the corresponding unit generation schedules as outputs are used to train the network. The neural network fine tunes the best results to the desired targets. The proposed approach has been validated for three thermal machines with valve point effects and without valve point effects. The results are compared with the approaches available in the literature. The PSO-ANN trained model gives better results which show the promise of the proposed methodology.

  2. Efficient Pricing Technique for Resource Allocation Problem in Downlink OFDM Cognitive Radio Networks

    Science.gov (United States)

    Abdulghafoor, O. B.; Shaat, M. M. R.; Ismail, M.; Nordin, R.; Yuwono, T.; Alwahedy, O. N. A.

    2017-05-01

    In this paper, the problem of resource allocation in OFDM-based downlink cognitive radio (CR) networks has been proposed. The purpose of this research is to decrease the computational complexity of the resource allocation algorithm for downlink CR network while concerning the interference constraint of primary network. The objective has been secured by adopting pricing scheme to develop power allocation algorithm with the following concerns: (i) reducing the complexity of the proposed algorithm and (ii) providing firm power control to the interference introduced to primary users (PUs). The performance of the proposed algorithm is tested for OFDM- CRNs. The simulation results show that the performance of the proposed algorithm approached the performance of the optimal algorithm at a lower computational complexity, i.e., O(NlogN), which makes the proposed algorithm suitable for more practical applications.

  3. The free boundary problem describing information diffusion in online social networks

    Science.gov (United States)

    Lei, Chengxia; Lin, Zhigui; Wang, Haiyan

    In this paper we consider a free boundary problem for a reaction-diffusion logistic equation with a time-dependent growth rate. Such a problem arises in the modeling of information diffusion in online social networks, with the free boundary representing the spreading front of news among users. We present several sharp thresholds for information diffusion that either lasts forever or suspends in finite time. In the former case, we give the asymptotic spreading speed which is determined by a corresponding elliptic equation.

  4. The Technical Problems of Anti-theft Diagnostics in a Traction Network

    Science.gov (United States)

    Mikulski, Jerzy; Młynczak, Jakub

    2012-02-01

    The paper presents an analysis of traction lines theft in the Katowice division of the Railroad Development Company (Zakład Linii Kolejowych - ZLK) as well as the principles for the anti-theft protection system, currently in development. The problem of theft is a very important issue concerning the safety of rail transportation. It is also a significant economic problem, as the cost of recreating a stolen network is very high. Moreover, the Administrator of the infrastructure bears the cost of compensation for any delays in train schedules.

  5. PROBLEM OF INTERNET COMMUNICATION OF UPPER SECONDARY SCHOOL PUPILS IN ELECTRONIC SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Olga E. Konevshchynska

    2017-09-01

    Full Text Available The article deals with the problem of Internet communication of upper secondary school pupils during interpersonal communication in electronic social networks. The actuality is proved, the system analysis of the psychological and pedagogical, educational-methodical literature of the researched problem is carried out. External written Internet speaking is considered as an important factor in the communication culture of the individual. It has been determined that high level of Internet communication of both students and teachers in the process of interpersonal communication in electronic social networks are important aspects of raising the level of media culture, media information competence of the individual. Also, these ones are necessary requirements of the information society to fulfill project-oriented, educational-cognitive and effective innovative activity in educational practice.

  6. The Bilevel Design Problem for Communication Networks on Trains: Model, Algorithm, and Verification

    Directory of Open Access Journals (Sweden)

    Yin Tian

    2014-01-01

    Full Text Available This paper proposes a novel method to solve the problem of train communication network design. Firstly, we put forward a general description of such problem. Then, taking advantage of the bilevel programming theory, we created the cost-reliability-delay model (CRD model that consisted of two parts: the physical topology part aimed at obtaining the networks with the maximum reliability under constrained cost, while the logical topology part focused on the communication paths yielding minimum delay based on the physical topology delivered from upper level. We also suggested a method to solve the CRD model, which combined the genetic algorithm and the Floyd-Warshall algorithm. Finally, we used a practical example to verify the accuracy and the effectiveness of the CRD model and further applied the novel method on a train with six carriages.

  7. A Bayesian network approach to the database search problem in criminal proceedings

    Science.gov (United States)

    2012-01-01

    Background The ‘database search problem’, that is, the strengthening of a case - in terms of probative value - against an individual who is found as a result of a database search, has been approached during the last two decades with substantial mathematical analyses, accompanied by lively debate and centrally opposing conclusions. This represents a challenging obstacle in teaching but also hinders a balanced and coherent discussion of the topic within the wider scientific and legal community. This paper revisits and tracks the associated mathematical analyses in terms of Bayesian networks. Their derivation and discussion for capturing probabilistic arguments that explain the database search problem are outlined in detail. The resulting Bayesian networks offer a distinct view on the main debated issues, along with further clarity. Methods As a general framework for representing and analyzing formal arguments in probabilistic reasoning about uncertain target propositions (that is, whether or not a given individual is the source of a crime stain), this paper relies on graphical probability models, in particular, Bayesian networks. This graphical probability modeling approach is used to capture, within a single model, a series of key variables, such as the number of individuals in a database, the size of the population of potential crime stain sources, and the rarity of the corresponding analytical characteristics in a relevant population. Results This paper demonstrates the feasibility of deriving Bayesian network structures for analyzing, representing, and tracking the database search problem. The output of the proposed models can be shown to agree with existing but exclusively formulaic approaches. Conclusions The proposed Bayesian networks allow one to capture and analyze the currently most well-supported but reputedly counter-intuitive and difficult solution to the database search problem in a way that goes beyond the traditional, purely formulaic expressions

  8. The analysis of split graphs in social networks based on the K-Cardinality assignment problem

    OpenAIRE

    Belik, Ivan

    2014-01-01

    In terms of social networks, split graphs correspond to the variety of interpersonal and intergroup relations. In this paper we analyse the interaction between the cliques (socially strong and trusty groups) and the independent sets (fragmented and non-connected groups of people) as the basic components of any split graph. Based on the Semi-Lagrangean relaxation for the k-cardinality assignment problem, we show the way of minimizing the socially risky interactions between the cliques and the ...

  9. The analysis of split graphs in social networks based on the K-Cardinality assignment problem

    OpenAIRE

    Belik, Ivan

    2014-01-01

    In terms of social networks, split graphs correspond to the variety of interpersonal and intergroup relations. In this paper we analyse the interaction between the cliques (socially strong and trusty groups) and the independent sets (fragmented and non-connected groups of people) as the basic components of any split graph. Based on the Semi-Lagrangean relaxation for the kcardinality assignment problem, we show the way of minimizing the socially risky interactions between the cl...

  10. A Coral Reef Algorithm Based on Learning Automata for the Coverage Control Problem of Heterogeneous Directional Sensor Networks.

    Science.gov (United States)

    Li, Ming; Miao, Chunyan; Leung, Cyril

    2015-12-04

    Coverage control is one of the most fundamental issues in directional sensor networks. In this paper, the coverage optimization problem in a directional sensor network is formulated as a multi-objective optimization problem. It takes into account the coverage rate of the network, the number of working sensor nodes and the connectivity of the network. The coverage problem considered in this paper is characterized by the geographical irregularity of the sensed events and heterogeneity of the sensor nodes in terms of sensing radius, field of angle and communication radius. To solve this multi-objective problem, we introduce a learning automata-based coral reef algorithm for adaptive parameter selection and use a novel Tchebycheff decomposition method to decompose the multi-objective problem into a single-objective problem. Simulation results show the consistent superiority of the proposed algorithm over alternative approaches.

  11. Sensor Location Problem Optimization for Traffic Network with Different Spatial Distributions of Traffic Information.

    Science.gov (United States)

    Bao, Xu; Li, Haijian; Qin, Lingqiao; Xu, Dongwei; Ran, Bin; Rong, Jian

    2016-10-27

    To obtain adequate traffic information, the density of traffic sensors should be sufficiently high to cover the entire transportation network. However, deploying sensors densely over the entire network may not be realistic for practical applications due to the budgetary constraints of traffic management agencies. This paper describes several possible spatial distributions of traffic information credibility and proposes corresponding different sensor information credibility functions to describe these spatial distribution properties. A maximum benefit model and its simplified model are proposed to solve the traffic sensor location problem. The relationships between the benefit and the number of sensors are formulated with different sensor information credibility functions. Next, expanding models and algorithms in analytic results are performed. For each case, the maximum benefit, the optimal number and spacing of sensors are obtained and the analytic formulations of the optimal sensor locations are derived as well. Finally, a numerical example is proposed to verify the validity and availability of the proposed models for solving a network sensor location problem. The results show that the optimal number of sensors of segments with different model parameters in an entire freeway network can be calculated. Besides, it can also be concluded that the optimal sensor spacing is independent of end restrictions but dependent on the values of model parameters that represent the physical conditions of sensors and roads.

  12. An Effective Recommender Algorithm for Cold-Start Problem in Academic Social Networks

    Directory of Open Access Journals (Sweden)

    Vala Ali Rohani

    2014-01-01

    Full Text Available Abundance of information in recent years has become a serious challenge for web users. Recommender systems (RSs have been often utilized to alleviate this issue. RSs prune large information spaces to recommend the most relevant items to users by considering their preferences. Nonetheless, in situations where users or items have few opinions, the recommendations cannot be made properly. This notable shortcoming in practical RSs is called cold-start problem. In the present study, we propose a novel approach to address this problem by incorporating social networking features. Coined as enhanced content-based algorithm using social networking (ECSN, the proposed algorithm considers the submitted ratings of faculty mates and friends besides user’s own preferences. The effectiveness of ECSN algorithm was evaluated by implementing it in MyExpert, a newly designed academic social network (ASN for academics in Malaysia. Real feedbacks from live interactions of MyExpert users with the recommended items are recorded for 12 consecutive weeks in which four different algorithms, namely, random, collaborative, content-based, and ECSN were applied every three weeks. The empirical results show significant performance of ECSN in mitigating the cold-start problem besides improving the prediction accuracy of recommendations when compared with other studied recommender algorithms.

  13. The relevance of network prominence and reciprocity of relationships for alcohol use and alcohol-related problems in a college residence hall network.

    Science.gov (United States)

    Barnett, Nancy P; Ott, Miles Q; Clark, Melissa A

    2014-12-01

    Peer associations are influential for substance use among college students, but relatively few investigations have been conducted on the social network characteristics that are associated with problematic alcohol use in college. This study investigated the association between network characteristics of prestige, expansiveness, and reciprocity and alcohol use variables in a college residence hall network. Undergraduate students in 1 residence hall (N = 129; 51.9% female; 48.1% non-Hispanic White; 84.5% first-year) reported on their alcohol use and alcohol-related problems in the past semester and nominated up to 10 residence hall peers who were important to them. Network autocorrelation modeling evaluated the association between 5 network variables reflecting prestige (indegree and betweenness centrality), expansiveness (outdegree), and relationship agreement (indegree reciprocity and outdegree reciprocity) and 3 indicators of alcohol use (drinks per week, number of heavy drinking days, number of alcohol problems). Moderation by gender of the associations between network characteristics and alcohol variables was also investigated. Models controlled for demographics and network autocorrelation. A higher outdegree and higher betweenness centrality within the residence hall network were significantly related to the number of heavy drinking days and number of alcohol problems, respectively. Higher indegree and higher betweenness centrality were associated with more alcohol problems for women when alcohol use was controlled. Having higher prestige and indicating oneself as having more friends in a college residential network may convey alcohol-related risks, with some risks higher for women.

  14. A Multi-Stage Reverse Logistics Network Problem by Using Hybrid Priority-Based Genetic Algorithm

    Science.gov (United States)

    Lee, Jeong-Eun; Gen, Mitsuo; Rhee, Kyong-Gu

    Today remanufacturing problem is one of the most important problems regarding to the environmental aspects of the recovery of used products and materials. Therefore, the reverse logistics is gaining become power and great potential for winning consumers in a more competitive context in the future. This paper considers the multi-stage reverse Logistics Network Problem (m-rLNP) while minimizing the total cost, which involves reverse logistics shipping cost and fixed cost of opening the disassembly centers and processing centers. In this study, we first formulate the m-rLNP model as a three-stage logistics network model. Following for solving this problem, we propose a Genetic Algorithm pri (GA) with priority-based encoding method consisting of two stages, and introduce a new crossover operator called Weight Mapping Crossover (WMX). Additionally also a heuristic approach is applied in the 3rd stage to ship of materials from processing center to manufacturer. Finally numerical experiments with various scales of the m-rLNP models demonstrate the effectiveness and efficiency of our approach by comparing with the recent researches.

  15. Simultaneous non-destructive determination of two components of combined paracetamol and amantadine hydrochloride in tablets and powder by NIR spectroscopy and artificial neural networks.

    Science.gov (United States)

    Dou, Ying; Sun, Ying; Ren, Yuqiu; Ju, Ping; Ren, Yulin

    2005-03-09

    The two components (paracetamol and amantadine hydrochloride) were simultaneously determined in combined paracetamol and amantadine hydrochloride tablets and powder by using near-infrared (NIR) spectroscopy and artificial neural networks (ANNs). The ANN models of three pretreated spectra (first-derivative, second-derivative and standard normal variate (SNV), respectively) were established. The mathematical corrected models of tablets were compared with those of the powder. In the models, the concentrations of paracetamol and amantadine hydrochloride as the active components were determined simultaneously and compared with the results of their separate determination. The parameters that affected the network were studied and the concentrations of the test set samples were predicted. The degree of approximation, a new evaluation criterion of the network was employed to prove the accuracy of the predicted results.

  16. Investigating Patterns of Participation in an Online Support Group for Problem Drinking: a Social Network Analysis.

    Science.gov (United States)

    Urbanoski, Karen; van Mierlo, Trevor; Cunningham, John

    2016-08-22

    This study contributes to emerging literature on online health networks by modeling communication patterns between members of a moderated online support group for problem drinking. Using social network analysis, we described members' patterns of joint participation in threads, parsing out the role of site moderators, and explored differences in member characteristics by network position. Posts made to the online support group of Alcohol Help Centre during 2013 were structured as a two-mode network of members (n = 205) connected via threads (n = 506). Metrics included degree centrality, clique membership, and tie strength. The network consisted of one component and no cliques of members, although most made few posts and a small number communicated only with the site's moderators. Highly active members were older and tended to have started posting prior to 2013. The distribution of members across threads varied from threads containing posts by one member to others that connected multiple members. Moderators accounted for sizable proportions of the connectivity between both members and threads. After 5 years of operation, the AHC online support group appears to be fairly cohesive and stable, in the sense that there were no isolated subnetworks comprised of specific types of members or devoted to specific topics. Participation and connectedness at the member-level was varied, however, and tended to be low on average. The moderators were among the most central in the network, although there were also members who emerged as central and dedicated contributors to the online discussions across topics. Study findings highlight a number of areas for consideration by online support group developers and managers.

  17. A time-delay neural network for solving time-dependent shortest path problem.

    Science.gov (United States)

    Huang, Wei; Yan, Chunwang; Wang, Jinsong; Wang, Wei

    2017-06-01

    This paper concerns the time-dependent shortest path problem, which is difficult to come up with global optimal solution by means of classical shortest path approaches such as Dijkstra, and pulse-coupled neural network (PCNN). In this study, we propose a time-delay neural network (TDNN) framework that comes with the globally optimal solution when solving the time-dependent shortest path problem. The underlying idea of TDNN comes from the following mechanism: the shortest path depends on the earliest auto-wave (from start node) that arrives at the destination node. In the design of TDNN, each node on a network is considered as a neuron, which comes in the form of two units: time-window unit and auto-wave unit. Time-window unit is used to generate auto-wave in each time window, while auto-wave unit is exploited here to update the state of auto-wave. Whether or not an auto-wave leaves a node (neuron) depends on the state of auto-wave. The evaluation of the performance of the proposed approach was carried out based on online public Cordeau instances and New York Road instances. The proposed TDNN was also compared with the quality of classical approaches such as Dijkstra and PCNN. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Fairness problems at the media access level for high-speed networks

    Science.gov (United States)

    Maly, Kurt J.; Zhang, L.; Game, David

    1990-01-01

    Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.

  19. Multiple Approaches of Solving Allocation Problems on Postal Transportation Network in Conditions of Large Countries

    Directory of Open Access Journals (Sweden)

    Madleňák Radovan

    2016-09-01

    Full Text Available The article deals with the optimizing the postal transportation network with two different optimizing methods. The research adopted in this article uses allocation models within graph theory to obtain results for addressed optimization problem. The article presents and compares two types of these models: p-median and uncapacitated fixed charge facility location model. The aim of p-median model is to find the location of P facilities in network, serving all demands in a way ensuring the average transport cost to be minimal. Fixed charge location model approach the issue of facility location based on minimizing the overall costs of implementation of selected variants. The latter this two models are subsequently applied on the postal network to determine the optimal location of postal facilities. These two models are adopted in the condition of large country with area above 300 000 km2. The Italy was chosen as a typical country that fits this condition. The underlying infrastructure of Italy is represented by simplified model of a postal network, abstracted by a graph G = (V, E, c, w.

  20. Adolescent Peer Relationships and Behavior Problems Predict Young Adults' Communication on Social Networking Websites

    Science.gov (United States)

    Mikami, Amori Yee; Szwedo, David E.; Allen, Joseph P.; Evans, Meredyth A.; Hare, Amanda L.

    2010-01-01

    This study examined online communication on social networking web pages in a longitudinal sample of 92 youths (39 male, 53 female). Participants' social and behavioral adjustment was assessed when they were ages 13–14 years and again at ages 20–22 years. At ages 20–22 years, participants' social networking website use and indicators of friendship quality on their web pages were coded by observers. Results suggested that youths who had been better adjusted at ages 13–14 years were more likely to be using social networking web pages at ages 20–22 years, after statistically controlling for age, gender, ethnicity, and parental income. Overall, youths' patterns of peer relationships, friendship quality, and behavioral adjustment at ages 13–14 years and at ages 20–22 years predicted similar qualities of interaction and problem behavior on their social networking websites at ages 20–22 years. Findings are consistent with developmental theory asserting that youths display cross-situational continuity in their social behaviors and suggest that the conceptualization of continuity may be extended into the online domain. PMID:20053005

  1. GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Rajakumar

    2017-01-01

    Full Text Available Seyedali Mirjalili et al. (2014 introduced a completely unique metaheuristic technique particularly grey wolf optimization (GWO. This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN is localization problem. The objective of this problem is to search out the geographical position of unknown nodes with the help of anchor nodes in WSN. In this work, GWO algorithm is incorporated to spot the correct position of unknown nodes, so as to handle the node localization problem. The proposed work is implemented using MATLAB 8.2 whereas nodes are deployed in a random location within the desired network area. The parameters like computation time, percentage of localized node, and minimum localization error measures are utilized to analyse the potency of GWO rule with other variants of metaheuristics algorithms such as particle swarm optimization (PSO and modified bat algorithm (MBA. The observed results convey that the GWO provides promising results compared to the PSO and MBA in terms of the quick convergence rate and success rate.

  2. Optimizing Supply Chain Collaboration Based on Agreement Buyer-Supplier Relationship with Network Design Problem

    Directory of Open Access Journals (Sweden)

    Wahyudi Sutopo

    2016-12-01

    Full Text Available In recent years, the rising competitive environment with shorter product life cycles and high customization forces industries to increase their flexibility, speed up their response, and enhance concurrent engineering designs. To integrate these prospects, supply chain collaboration becomes a pertinent strategy for industries to strengthen their competitiveness. The network design problem is used to implement supply chain collaboration. In the buying and selling process, sharing information between buyer and supplier are important to obtain a transaction decision. The optimimum supply chain profit can be identified by mathematical model of network design problem. The Mathematical Model takes into consideration the uncertainity in negotiation of supply chain, transportation problems, and locationallocation of products from supplier to buyer in the planning based on the time value of money. The results show that the model can be used to optimize the supply chain profit. The supplier gets a profit because income were received in the initial contract, while the buyer profit comes from lower pay.

  3. GNU Oflox: an academic software for the minimal cost network flow problem

    Directory of Open Access Journals (Sweden)

    Andrés M. Sajo-Castelli

    2013-07-01

    Full Text Available We present an open-source software package written for GNU Octave. The software is an implementation of the Simplex algorithm for the minimal cost network flow problem oriented towards the academic environment. The implementation supports the use of Big-M and Phase I/Phase II methods and it can also start from a given feasible solution. Flexibility of the package's output configuration provides many attractive possibilities. The outputs are plain editable \\LaTeX\\ files that can be modified and orchestrated to fit most academic needs. It can be used in examination materials, homework assignments or even form part of a project. The format used to describe the network is the DIMACS min file format to which a simple extension was added in order to support the description of feasible trees in the file.

  4. INTERCONNECTING NETWORKS WITH DIFFERENT LEVELS OF SECURITY – A PRESENT NATO PROBLEM

    Directory of Open Access Journals (Sweden)

    LIVIU TATOMIR

    2016-07-01

    Full Text Available A situation often met in the Romanian Armed Forces in recent years is the need for interconnecting two networks (domains with different levels of classification. Considering that the Romanian armed troops are involved in numerous missions with NATO partners, solutions, already implemented across the organization, are considered to be applied in domestic systems, also. This paper presents the solutions adopted by NATO in order to solve the problem of cross -domains interconnections. We present the maturity level reached by these solutions and the possibility of implementing these solutions in the Romanian Armed Forces, with or without specific adaptation to our own rules and regulations. The goal is to use a NATO already proved solution to our national classified networks.

  5. Application of Set Covering Location Problem for Organizing the Public Postal Network

    Directory of Open Access Journals (Sweden)

    Dragana Šarac

    2016-08-01

    Full Text Available Most countries of the European Union ensure certain obligations (criteria which universal service providers must meet to ensure the realization of the universal service. These criteria vary from country to country, giving their own choice of an optimal model for the density of the postal network. Such postal network of the operator providing universal postal service must be organized so that post offices are accessible at the optimal distance from the user. This paper presents two different approaches. The first one is based on the population criteria determined in the previous study. The second one is new, a general method created to determine the minimum number of postal unit applications of Set Covering Location Problem. The authors apply both methods on real data collected from the Serbian municipalities and finally, compare the obtained results.

  6. An Integrated Approach for Reliable Facility Location/Network Design Problem with Link Disruption

    Directory of Open Access Journals (Sweden)

    Davood Shishebori

    2015-05-01

    Full Text Available Proposing a robust designed facility location is one of the most effective ways to hedge against unexpected disruptions and failures in a transportation network system. This paper considers the combined facility location/network design problem with regard to transportation link disruptions and develops a mixed integer linear programming formulation to model it. With respect to the probability of link disruptions, the objective function of the model minimizes the total costs, including location costs, link construction costs and also the expected transportation costs. An efficient hybrid algorithm based on LP relaxation and variable neighbourhood search metaheuristic is developed in order to solve the mathematical model. Numerical results demonstrate that the proposed hybrid algorithm has suitable efficiency in terms of duration of solution time and determining excellent solution quality.

  7. Optimization of reactor network design problem using Jumping Gene Adaptation of Differential Evolution

    Science.gov (United States)

    Gujarathi, Ashish M.; Purohit, S.; Srikanth, B.

    2015-06-01

    Detailed working principle of jumping gene adaptation of differential evolution (DE-JGa) is presented. The performance of the DE-JGa algorithm is compared with the performance of differential evolution (DE) and modified DE (MDE) by applying these algorithms on industrial problems. In this study Reactor network design (RND) problem is solved using DE, MDE, and DE-JGa algorithms: These industrial processes are highly nonlinear and complex with reference to optimal operating conditions with many equality and inequality constraints. Extensive computational comparisons have been made for all the chemical engineering problems considered. The results obtained in the present study show that DE-JGa algorithm outperforms the other algorithms (DE and MDE). Several comparisons are made among the algorithms with regard to the number of function evaluations (NFE)/CPU- time required to find the global optimum. The standard deviation and the variance values obtained using DE-JGa, DE and MDE algorithms also show that the DE-JGa algorithm gives consistent set of results for the majority of the test problems and the industrial real world problems.

  8. COLLABORATIVE PROBLEM SOLVING USING PUBLIC SOCIAL NETWORK MEDIA: ANALYZING STUDENT INTERACTION AND ITS IMPACT TO LEARNING PROCESS

    OpenAIRE

    Melvin Ballera; Ismail Ateya Lukandu; Abdalla Radwan

    2013-01-01

    This paper examines the use of social network media at three aspects in African and Libyan perspective. Firstly, to use social network media as an open network learning environment that provide service for interaction necessary for learners to support socialization and collaboration during problem solving. Secondly, to use social media as a tool to support blended learning in e-learning system and encourage non-native English students to express their ideas and fill the gap of communication p...

  9. Effects on Learners' Performance of Using Selected and Open Network Resources in a Problem-Based Learning Activity

    Science.gov (United States)

    Hsu, Ching-Kun; Hwang, Gwo-Jen; Chuang, Chien-Wen; Chang, Chih-Kai

    2012-01-01

    Owing to the popularity of computers and computer networks, fostering the web-based problem-solving ability of students has become an important educational objective in recent years. This study attempted to compare the effects of using selected and open network resources on students' intentions with regard to their information system usage by…

  10. Achieving full connectivity of sites in the multiperiod reserve network design problem

    Science.gov (United States)

    Jafari, Nahid; Nuse, Bryan L.; Moore, Clinton; Dilkina, Bistra; Hepinstall-Cymerman, Jeffrey

    2017-01-01

    The conservation reserve design problem is a challenge to solve because of the spatial and temporal nature of the problem, uncertainties in the decision process, and the possibility of alternative conservation actions for any given land parcel. Conservation agencies tasked with reserve design may benefit from a dynamic decision system that provides tactical guidance for short-term decision opportunities while maintaining focus on a long-term objective of assembling the best set of protected areas possible. To plan cost-effective conservation over time under time-varying action costs and budget, we propose a multi-period mixed integer programming model for the budget-constrained selection of fully connected sites. The objective is to maximize a summed conservation value over all network parcels at the end of the planning horizon. The originality of this work is in achieving full spatial connectivity of the selected sites during the schedule of conservation actions.

  11. A Branch-and-Price Approach to the Feeder Network Design Problem

    DEFF Research Database (Denmark)

    Santini, Alberto; Plum, Christian Edinger Munk; Røpke, Stefan

    2017-01-01

    In this paper we consider the problem of designing a container liner shipping feeder network. The designer has to choose which port to serve during many rotations that start and end at a central hub. Many operational characteristics are considered, such as variable leg-by-leg speeds and cargo tra....... These insights were obtained by means of an analysis where scenarios are generated varying internal and external conditions, such as fuel costs and port demands....... transit times. Realistic instances are generated from the LinerLib benchmark suite. The problem is solved with a branch-and-price algorithm, which can solve most instances to optimality within one hour. The results also provide insights on the cost structure and desirable features of optimal routes...

  12. Sensitivity versus accuracy in multiclass problems using memetic Pareto evolutionary neural networks.

    Science.gov (United States)

    Fernández Caballero, Juan Carlos; Martínez, Francisco José; Hervás, César; Gutiérrez, Pedro Antonio

    2010-05-01

    This paper proposes a multiclassification algorithm using multilayer perceptron neural network models. It tries to boost two conflicting main objectives of multiclassifiers: a high correct classification rate level and a high classification rate for each class. This last objective is not usually optimized in classification, but is considered here given the need to obtain high precision in each class in real problems. To solve this machine learning problem, we use a Pareto-based multiobjective optimization methodology based on a memetic evolutionary algorithm. We consider a memetic Pareto evolutionary approach based on the NSGA2 evolutionary algorithm (MPENSGA2). Once the Pareto front is built, two strategies or automatic individual selection are used: the best model in accuracy and the best model in sensitivity (extremes in the Pareto front). These methodologies are applied to solve 17 classification benchmark problems obtained from the University of California at Irvine (UCI) repository and one complex real classification problem. The models obtained show high accuracy and a high classification rate for each class.

  13. Using Stochastic Spiking Neural Networks on SpiNNaker to Solve Constraint Satisfaction Problems

    Science.gov (United States)

    Fonseca Guerra, Gabriel A.; Furber, Steve B.

    2017-01-01

    Constraint satisfaction problems (CSP) are at the core of numerous scientific and technological applications. However, CSPs belong to the NP-complete complexity class, for which the existence (or not) of efficient algorithms remains a major unsolved question in computational complexity theory. In the face of this fundamental difficulty heuristics and approximation methods are used to approach instances of NP (e.g., decision and hard optimization problems). The human brain efficiently handles CSPs both in perception and behavior using spiking neural networks (SNNs), and recent studies have demonstrated that the noise embedded within an SNN can be used as a computational resource to solve CSPs. Here, we provide a software framework for the implementation of such noisy neural solvers on the SpiNNaker massively parallel neuromorphic hardware, further demonstrating their potential to implement a stochastic search that solves instances of P and NP problems expressed as CSPs. This facilitates the exploration of new optimization strategies and the understanding of the computational abilities of SNNs. We demonstrate the basic principles of the framework by solving difficult instances of the Sudoku puzzle and of the map color problem, and explore its application to spin glasses. The solver works as a stochastic dynamical system, which is attracted by the configuration that solves the CSP. The noise allows an optimal exploration of the space of configurations, looking for the satisfiability of all the constraints; if applied discontinuously, it can also force the system to leap to a new random configuration effectively causing a restart.

  14. Using Stochastic Spiking Neural Networks on SpiNNaker to Solve Constraint Satisfaction Problems

    Directory of Open Access Journals (Sweden)

    Gabriel A. Fonseca Guerra

    2017-12-01

    Full Text Available Constraint satisfaction problems (CSP are at the core of numerous scientific and technological applications. However, CSPs belong to the NP-complete complexity class, for which the existence (or not of efficient algorithms remains a major unsolved question in computational complexity theory. In the face of this fundamental difficulty heuristics and approximation methods are used to approach instances of NP (e.g., decision and hard optimization problems. The human brain efficiently handles CSPs both in perception and behavior using spiking neural networks (SNNs, and recent studies have demonstrated that the noise embedded within an SNN can be used as a computational resource to solve CSPs. Here, we provide a software framework for the implementation of such noisy neural solvers on the SpiNNaker massively parallel neuromorphic hardware, further demonstrating their potential to implement a stochastic search that solves instances of P and NP problems expressed as CSPs. This facilitates the exploration of new optimization strategies and the understanding of the computational abilities of SNNs. We demonstrate the basic principles of the framework by solving difficult instances of the Sudoku puzzle and of the map color problem, and explore its application to spin glasses. The solver works as a stochastic dynamical system, which is attracted by the configuration that solves the CSP. The noise allows an optimal exploration of the space of configurations, looking for the satisfiability of all the constraints; if applied discontinuously, it can also force the system to leap to a new random configuration effectively causing a restart.

  15. Problem of Channel Utilization and Merging Flows in Buffered Optical Burst Switching Networks

    Directory of Open Access Journals (Sweden)

    Milos Kozak

    2013-01-01

    Full Text Available In the paper authors verify two problems of methods of operational research in optical burst switching. The first problem is at edge node, related to the medium access delay. The second problem is at an intermediate node related to buffering delay. A correction coefficient K of transmission speed is obtained from the first analysis. It is used in to provide a full-featured link of nominal data rate. Simulations of the second problem reveal interesting results. It is not viable to prepare routing and wavelength assignment based on end-to-end delay, i.e. link's length or number of hops, as commonly used in other frameworks (OCS, Ethernet, IP, etc. nowadays. Other parameters such as buffering probability must be taken into consideration as well. Based on the buffering probability an estimation of the number of optical/electrical converters can be made. This paper concentrates important traffic constraints of buffered optical burst switching. It allows authors to prepare optimization algorithms for regenerators placement in CAROBS networks using methods of operational research.

  16. On the Transformation Mechanism for Formulating a Multiproduct Two-Layer Supply Chain Network Design Problem as a Network Flow Model

    Directory of Open Access Journals (Sweden)

    Mi Gan

    2014-01-01

    Full Text Available The multiproduct two-layer supply chain is very common in various industries. In this paper, we introduce a possible modeling and algorithms to solve a multiproduct two-layer supply chain network design problem. The decisions involved are the DCs location and capacity design decision and the initial distribution planning decision. First we describe the problem and give a mixed integer programming (MIP model; such problem is NP-hard and it is not easy to reduce the complexity. Inspired by it, we develop a transformation mechanism of relaxing the fixed cost and adding some virtual nodes and arcs to the original network. Thus, a network flow problem (NFP corresponding to the original problem has been formulated. Given that we could solve the NFP as a minimal cost flow problem. The solution procedures and network simplex algorithm (INS are discussed. To verify the effectiveness and efficiency of the model and algorithms, the performance measure experimental has been conducted. The experiments and result showed that comparing with MIP model solved by genetic algorithm (GA and Benders, decomposition algorithm (BD the NFP model and INS are also effective and even more efficient for both small-scale and large-scale problems.

  17. AN EVOLUTIONARY ALGORITHM FOR CHANNEL ASSIGNMENT PROBLEM IN WIRELESS MOBILE NETWORKS

    Directory of Open Access Journals (Sweden)

    Yee Shin Chia

    2012-12-01

    Full Text Available The channel assignment problem in wireless mobile network is the assignment of appropriate frequency spectrum to incoming calls while maintaining a satisfactory level of electromagnetic compatibility (EMC constraints. An effective channel assignment strategy is important due to the limited capacity of frequency spectrum in wireless mobile network. Most of the existing channel assignment strategies are based on deterministic methods. In this paper, an adaptive genetic algorithm (GA based channel assignment strategy is introduced for resource management and to reduce the effect of EMC interferences. The most significant advantage of the proposed optimization method is its capability to handle both the reassignment of channels for existing calls as well as the allocation of channel to a new incoming call in an adaptive process to maximize the utility of the limited resources. It is capable to adapt the population size to the number of eligible channels for a particular cell upon new call arrivals to achieve reasonable convergence speed. The MATLAB simulation on a 49-cells network model for both uniform and nonuniform call traffic distributions showed that the proposed channel optimization method can always achieve a lower average new incoming call blocking probability compared to the deterministic based channel assignment strategy.

  18. Inverse problem and variation method to optimize cascade heat exchange network in central heating system

    Science.gov (United States)

    Zhang, Yin; Wei, Zhiyuan; Zhang, Yinping; Wang, Xin

    2017-12-01

    Urban heating in northern China accounts for 40% of total building energy usage. In central heating systems, heat is often transferred from heat source to users by the heat network where several heat exchangers are installed at heat source, substations and terminals respectively. For given overall heating capacity and heat source temperature, increasing the terminal fluid temperature is an effective way to improve the thermal performance of such cascade heat exchange network for energy saving. In this paper, the mathematical optimization model of the cascade heat exchange network with three-stage heat exchangers in series is established. Aim at maximizing the cold fluid temperature for given hot fluid temperature and overall heating capacity, the optimal heat exchange area distribution and the medium fluids' flow rates are determined through inverse problem and variation method. The preliminary results show that the heat exchange areas should be distributed equally for each heat exchanger. It also indicates that in order to improve the thermal performance of the whole system, more heat exchange areas should be allocated to the heat exchanger where flow rate difference between two fluids is relatively small. This work is important for guiding the optimization design of practical cascade heating systems.

  19. Social networking sites and mental health problems in adolescents: The mediating role of cyberbullying victimization.

    Science.gov (United States)

    Sampasa-Kanyinga, H; Hamilton, H A

    2015-11-01

    Previous research has suggested an association between the use of social networking sites (SNSs) and mental health problems such as psychological distress, suicidal ideation and attempts in adolescents. However, little is known about the factors that might mediate these relationships. The present study examined the link between the use of social networking sites and psychological distress, suicidal ideation and suicide attempts, and tested the mediating role of cyberbullying victimization on these associations in adolescents. The sample consisted of a group of 11-to-20-year-old individuals (n=5126, 48% females; mean±SD age: 15.2±1.9 years) who completed the mental health portion of the Ontario Student Drug Use and Health Survey (OSDUHS) in 2013. Multiple logistic regression analyses were used to test the mediation models. After adjustment for age, sex, ethnicity, subjective socioeconomic status (SES), and parental education, use of SNSs was associated with psychological distress (adjusted odds ratio, 95% confidence interval=2.03, 1.22-3.37), suicidal ideation (3.44, 1.54-7.66) and attempts (5.10, 1.45-17.88). Cyberbullying victimization was found to fully mediate the relationships between the use of SNSs with psychological distress and attempts; whereas, it partially mediated the link between the use of SNSs and suicidal ideation. Findings provide supporting evidence that addressing cyberbullying victimization and the use of SNSs among adolescents may help reduce the risk of mental health problems. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  20. An MPCC Formulation and Its Smooth Solution Algorithm for Continuous Network Design Problem

    Directory of Open Access Journals (Sweden)

    Guangmin Wang

    2017-12-01

    Full Text Available Continuous network design problem (CNDP is searching for a transportation network configuration to minimize the sum of the total system travel time and the investment cost of link capacity expansions by considering that the travellers follow a traditional Wardrop user equilibrium (UE to choose their routes. In this paper, the CNDP model can be formulated as mathematical programs with complementarity constraints (MPCC by describing UE as a non-linear complementarity problem (NCP. To address the difficulty resulting from complementarity constraints in MPCC, they are substituted by the Fischer-Burmeister (FB function, which can be smoothed by the introduction of the smoothing parameter. Therefore, the MPCC can be transformed into a well-behaved non-linear program (NLP by replacing the complementarity constraints with a smooth equation. Consequently, the solver such as LINDOGLOBAL in GAMS can be used to solve the smooth approximate NLP to obtain the solution to MPCC for modelling CNDP. The numerical experiments on the example from the literature demonstrate that the proposed algorithm is feasible.

  1. A novel constructive-optimizer neural network for the traveling salesman problem.

    Science.gov (United States)

    Saadatmand-Tarzjan, Mahdi; Khademi, Morteza; Akbarzadeh-T, Mohammad-R; Moghaddam, Hamid Abrishami

    2007-08-01

    In this paper, a novel constructive-optimizer neural network (CONN) is proposed for the traveling salesman problem (TSP). CONN uses a feedback structure similar to Hopfield-type neural networks and a competitive training algorithm similar to the Kohonen-type self-organizing maps (K-SOMs). Consequently, CONN is composed of a constructive part, which grows the tour and an optimizer part to optimize it. In the training algorithm, an initial tour is created first and introduced to CONN. Then, it is trained in the constructive phase for adding a number of cities to the tour. Next, the training algorithm switches to the optimizer phase for optimizing the current tour by displacing the tour cities. After convergence in this phase, the training algorithm switches to the constructive phase anew and is continued until all cities are added to the tour. Furthermore, we investigate a relationship between the number of TSP cities and the number of cities to be added in each constructive phase. CONN was tested on nine sets of benchmark TSPs from TSPLIB to demonstrate its performance and efficiency. It performed better than several typical Neural networks (NNs), including KNIES_TSP_Local, KNIES_TSP_Global, Budinich's SOM, Co-Adaptive Net, and multivalued Hopfield network as wall as computationally comparable variants of the simulated annealing algorithm, in terms of both CPU time and accuracy. Furthermore, CONN converged considerably faster than expanding SOM and evolved integrated SOM and generated shorter tours compared to KNIES_DECOMPOSE. Although CONN is not yet comparable in terms of accuracy with some sophisticated computationally intensive algorithms, it converges significantly faster than they do. Generally speaking, CONN provides the best compromise between CPU time and accuracy among currently reported NNs for TSP.

  2. A Biobjective and Trilevel Programming Model for Hub Location Problem in Design of a Resilient Power Projection Network

    Directory of Open Access Journals (Sweden)

    Hai-Ling Bi

    2016-01-01

    Full Text Available Hubs disruptions are taken into account in design of a resilient power projection network. The problem is tackled from a multiple criteria decision-making (MCDM perspective. Not only the network cost in normal state is considered, but also the cost in the worst-case situation is taken into account. A biobjective and trilevel integer programming model is proposed using game theory. Moreover, we develop a metaheuristic based on tabu search and shortest path algorithm for the resolution of the complex model. Computational example indicates that making tradeoffs between the performances of the network in different situations is helpful for designing a resilient network.

  3. Destructive Leadership: The Hatfield and McCoy Feud

    Science.gov (United States)

    Sparks, George; Wolf, Patricia; Zurick, Andryce M.

    2015-01-01

    This paper explores the phenomenon of destructive leadership using the historical case study of the feud between the Hatfields and McCoys. The characteristics of destructive leadership as well as the consequences of this leadership style are reviewed, examined and analyzed. Utilizing a case from history to shine light on a contemporary problem,…

  4. Destruction Chemistry of Mustard Simulants

    Science.gov (United States)

    2008-07-04

    organosulfur compounds under both pyrolytic and oxidative conditions. We focus on the destruction of alkyl sulfides that are surrogates for chemical... organosulfur , oxidation, pyrolysis, chemical kinetic mechanism, thermochemistry, reaction, kinetics, flow reactor, GC/MS, FTIR, mustard agent simulant, CWA...destruction chemistry of organosulfur compounds under both pyrolytic and oxidative conditions. We focus on the destruction of alkyl sulfides that are

  5. Cerebellum-inspired neural network solution of the inverse kinematics problem.

    Science.gov (United States)

    Asadi-Eydivand, Mitra; Ebadzadeh, Mohammad Mehdi; Solati-Hashjin, Mehran; Darlot, Christian; Abu Osman, Noor Azuan

    2015-12-01

    The demand today for more complex robots that have manipulators with higher degrees of freedom is increasing because of technological advances. Obtaining the precise movement for a desired trajectory or a sequence of arm and positions requires the computation of the inverse kinematic (IK) function, which is a major problem in robotics. The solution of the IK problem leads robots to the precise position and orientation of their end-effector. We developed a bioinspired solution comparable with the cerebellar anatomy and function to solve the said problem. The proposed model is stable under all conditions merely by parameter determination, in contrast to recursive model-based solutions, which remain stable only under certain conditions. We modified the proposed model for the simple two-segmented arm to prove the feasibility of the model under a basic condition. A fuzzy neural network through its learning method was used to compute the parameters of the system. Simulation results show the practical feasibility and efficiency of the proposed model in robotics. The main advantage of the proposed model is its generalizability and potential use in any robot.

  6. Solving ill-posed inverse problems using iterative deep neural networks

    Science.gov (United States)

    Adler, Jonas; Öktem, Ozan

    2017-12-01

    We propose a partially learned approach for the solution of ill-posed inverse problems with not necessarily linear forward operators. The method builds on ideas from classical regularisation theory and recent advances in deep learning to perform learning while making use of prior information about the inverse problem encoded in the forward operator, noise model and a regularising functional. The method results in a gradient-like iterative scheme, where the ‘gradient’ component is learned using a convolutional network that includes the gradients of the data discrepancy and regulariser as input in each iteration. We present results of such a partially learned gradient scheme on a non-linear tomographic inversion problem with simulated data from both the Sheep-Logan phantom as well as a head CT. The outcome is compared against filtered backprojection and total variation reconstruction and the proposed method provides a 5.4 dB PSNR improvement over the total variation reconstruction while being significantly faster, giving reconstructions of 512 × 512 pixel images in about 0.4 s using a single graphics processing unit (GPU).

  7. A framework to approach problems of forensic anthropology using complex networks

    Science.gov (United States)

    Caridi, Inés; Dorso, Claudio O.; Gallo, Pablo; Somigliana, Carlos

    2011-05-01

    We have developed a method to analyze and interpret emerging structures in a set of data which lacks some information. It has been conceived to be applied to the problem of getting information about people who disappeared in the Argentine state of Tucumán from 1974 to 1981. Even if the military dictatorship formally started in Argentina had begun in 1976 and lasted until 1983, the disappearance and assassination of people began some months earlier. During this period several circuits of Illegal Detention Centres (IDC) were set up in different locations all over the country. In these secret centres, disappeared people were illegally kept without any sort of constitutional guarantees, and later assassinated. Even today, the final destination of most of the disappeared people’s remains is still unknown. The fundamental hypothesis in this work is that a group of people with the same political affiliation whose disappearances were closely related in time and space shared the same place of captivity (the same IDC or circuit of IDCs). This hypothesis makes sense when applied to the systematic method of repression and disappearances which was actually launched in Tucumán, Argentina (2007) [11]. In this work, the missing individuals are identified as nodes on a network and connections are established among them based on the individuals’ attributes while they were alive, by using rules to link them. In order to determine which rules are the most effective in defining the network, we use other kind of knowledge available in this problem: previous results from the anthropological point of view (based on other sources of information, both oral and written, historical and anthropological data, etc.); and information about the place (one or more IDCs) where some people were kept during their captivity. For these best rules, a prediction about these people’s possible destination is assigned (one or more IDCs where they could have been kept), and the success of the

  8. Export dynamics as an optimal growth problem in the network of global economy

    CERN Document Server

    Caraglio, Michele; Stella, Attilio L

    2016-01-01

    We analyze export data aggregated at world global level of 219 classes of products over a period of 39 years. Our main goal is to set up a dynamical model to identify and quantify plausible mechanisms by which the evolutions of the various exports affect each other. This is pursued through a stochastic differential description, partly inspired by approaches used in population dynamics or directed polymers in random media. We outline a complex network of transfer rates which describes how resources are shifted between different product classes, and determines how casual favorable conditions for one export can spread to the other ones. A calibration procedure allows to fit four free model-parameters such that the dynamical evolution becomes consistent with the average growth, the fluctuations, and the ranking of the export values observed in real data. Growth crucially depends on the balance between maintaining and shifting resources to different exports, like in an explore-exploit problem. Remarkably, the cali...

  9. On Application of Least-delay Variation Problem in Ethernet Networks Using SDN Concept

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2016-01-01

    Full Text Available The goal of this paper is to present an application idea of SDN in Smart Grids, particularly, in the area of L2 multicast as defined by IEC 61850-9-2. Authors propose an Integer Linear Formulation (ILP dealing with a Least-Delay-Variation multicast forwarding problem that has a potential to utilize Ethernet networks in a new way. The proposed ILP formulation is numerically evaluated on random graph topologies and results are compared to a shortest path tree approach that is traditionally a product of Spanning Tree Protocols. Results confirm the correctness of the ILP formulation and illustrate dependency of a solution quality on the selected graph models, especially, in a case of scale-free topologies.

  10. ATHENA (Advanced Thermal Hydraulic Energy Network Analyzer) solutions to developmental assessment problems

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, K.E.; Ransom, V.H.; Roth, P.A.

    1987-03-01

    The ATHENA (Advanced Thermal Hydraulic Energy Network Analyzer) code has been developed to perform transient simulation of the thermal hydraulic systems that may be found in fusion reactors, space reactors, and other advanced systems. As an assessment of current capability the code was applied to a number of physical problems, both conceptual and actual experiments. Results indicate that the numerical solution to the basic conservation equations is technically sound, and that generally good agreement can be obtained when modeling relevant hydrodynamic experiments. The assessment also demonstrates basic fusion system modeling capability and verifies compatibility of the code with both CDC and CRAY mainframes. Areas where improvements could be made include constitutive modeling, which describes the interfacial exchange term. 13 refs., 84 figs.

  11. Post-conflict struggles as networks of problems: A network analysis of trauma, daily stressors and psychological distress among Sri Lankan war survivors.

    Science.gov (United States)

    Jayawickreme, Nuwan; Mootoo, Candace; Fountain, Christine; Rasmussen, Andrew; Jayawickreme, Eranda; Bertuccio, Rebecca F

    2017-10-01

    A growing body of literature indicates that the mental distress experienced by survivors of war is a function of both experienced trauma and stressful life events. However, the majority of these studies are limited in that they 1) employ models of psychological distress that emphasize underlying latent constructs and do not allow researchers to examine the unique associations between particular symptoms and various stressors; and 2) use one or more measures that were not developed for that particular context and thus may exclude key traumas, stressful life events and symptoms of psychopathology. The current study addresses both these limitations by 1) using a novel conceptual model, network analysis, which assumes that symptoms covary with each other not because they stem from a latent construct, but rather because they represent meaningful relationships between the symptoms; and 2) employing a locally developed measure of experienced trauma, stressful life problems and symptoms of psychopathology. Over the course of 2009-2011, 337 survivors of the Sri Lankan civil war were administered the Penn-RESIST-Peradeniya War Problems Questionnaire (PRPWPQ). Network analysis revealed that symptoms of psychopathology, problems pertaining to lack of basic needs, and social problems were central to the network relative to experienced trauma and other types of problems. After controlling for shared associations, social problems in particular were the most central, significantly more so than traumatic events and family problems. Several particular traumatic events, stressful life events and symptoms of psychopathology that were central to the network were also identified. Discussion emphasizes the utility of such network models to researchers and practitioners determining how to spend limited resources in the most impactful way possible. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Tabu search methods for multicommodity capcitated fixed charge network design problem

    Energy Technology Data Exchange (ETDEWEB)

    Crainic, T.; Farvolden, J.; Gendreau, M.; Soriano, P.

    1994-12-31

    We address the fixed charge capacitated multicommodity network flow problem with linear costs and no additional side constraints, and present two solution approaches based on the tabu search metaheuristic. In the first case, the search is conducted by exploring the space of the design (integer) variables, while neighbors are evaluated and moves are selected via a capacitated multicommodity minimum cost network flow subproblem. The second approach integrates simplex pivoting rules into a tabu search framework. Here, the search explores the space of flow path variables when all design arcs are open, by using column generation to obtain new variables, and pivoting to determine and evaluate the neighbors of any given solution. Adapting this idea within our tabu search framework represents an interesting challenge, since several of the standard assumptions upon which column generation schemes are based are no longer verified. In particular, the monotonic decrease of the objective function value is no longer ensured, and both variable and fixed costs characterize arcs. On the other hand, the precise definition and generation of the tabu search neighborhoods in a column generation context poses an additional challenge, linked particularly to the description and identification of path variables. We describe the various components, implementation challenges and behaviour of each of the two algorithms, and compare their computational and solution quality performance. Comparisons with known bounding procedures will be presented as well.

  13. Inference of Vohradský's models of genetic networks by solving two-dimensional function optimization problems.

    Science.gov (United States)

    Kimura, Shuhei; Sato, Masanao; Okada-Hatakeyama, Mariko

    2013-01-01

    The inference of a genetic network is a problem in which mutual interactions among genes are inferred from time-series of gene expression levels. While a number of models have been proposed to describe genetic networks, this study focuses on a mathematical model proposed by Vohradský. Because of its advantageous features, several researchers have proposed the inference methods based on Vohradský's model. When trying to analyze large-scale networks consisting of dozens of genes, however, these methods must solve high-dimensional non-linear function optimization problems. In order to resolve the difficulty of estimating the parameters of the Vohradský's model, this study proposes a new method that defines the problem as several two-dimensional function optimization problems. Through numerical experiments on artificial genetic network inference problems, we showed that, although the computation time of the proposed method is not the shortest, the method has the ability to estimate parameters of Vohradský's models more effectively with sufficiently short computation times. This study then applied the proposed method to an actual inference problem of the bacterial SOS DNA repair system, and succeeded in finding several reasonable regulations.

  14. Social Networks and the Diffusion of Adolescent Problem Behavior: Reliable Estimates of Selection and Influence from Sixth Through Ninth Grades.

    Science.gov (United States)

    Osgood, D Wayne; Feinberg, Mark E; Ragan, Daniel T

    2015-08-01

    Seeking to reduce problematic peer influence is a prominent theme of programs to prevent adolescent problem behavior. To support the refinement of this aspect of prevention programming, we examined peer influence and selection processes for three problem behaviors (delinquency, alcohol use, and smoking). We assessed not only the overall strengths of these peer processes, but also their consistency versus variability across settings. We used dynamic stochastic actor-based models to analyze five waves of friendship network data across sixth through ninth grades for a large sample of U.S. adolescents. Our sample included two successive grade cohorts of youth in 26 school districts participating in the PROSPER study, yielding 51 longitudinal social networks based on respondents' friendship nominations. For all three self-reported antisocial behaviors, we found evidence of both peer influence and selection processes tied to antisocial behavior. There was little reliable variance in these processes across the networks, suggesting that the statistical imprecision of the peer influence and selection estimates in previous studies likely accounts for inconsistencies in results. Adolescent friendship networks play a strong role in shaping problem behavior, but problem behaviors also inform friendship choices. In addition to preferring friends with similar levels of problem behavior, adolescents tend to choose friends who engage in problem behaviors, thus creating broader diffusion.

  15. How do people with long-term mental health problems negotiate relationships with network members at times of crisis?

    Science.gov (United States)

    Walker, Sandra; Kennedy, Anne; Vassilev, Ivaylo; Rogers, Anne

    2017-10-10

    Social network processes impact on the genesis and management of mental health problems. There is currently less understanding of the way people negotiate networked relationships in times of crisis compared to how they manage at other times. This paper explores the patterns and nature of personal network involvement at times of crises and how these may differ from day-to-day networks of recovery and maintenance. Semi-structured interviews with 25 participants with a diagnosis of long-term mental health (MH) problems drawn from recovery settings in the south of England. Interviews centred on personal network mapping of members and resources providing support. The mapping interviews explored the work of network members and changes in times of crisis. Interviews were recorded, transcribed and analysed using a framework analysis. Three key themes were identified: the fluidity of network relationality between crisis and recovery; isolation as a means of crises management; leaning towards peer support. Personal network input retreated at times of crisis often as result of "ejection" from the network by participants who used self-isolation as a personal management strategy in an attempt to deal with crises. Peer support is considered useful during a crisis, whilst the role of services was viewed with some ambiguity. Social networks membership, and type and depth of involvement, is subject to change between times of crisis and everyday support. This has implications for managing mental health in terms of engaging with network support differently in times of crises versus recovery and everyday living. © 2017 The Authors Health Expectations Published by John Wiley & Sons Ltd.

  16. Traveling salesman problems with PageRank Distance on complex networks reveal community structure

    Science.gov (United States)

    Jiang, Zhongzhou; Liu, Jing; Wang, Shuai

    2016-12-01

    In this paper, we propose a new algorithm for community detection problems (CDPs) based on traveling salesman problems (TSPs), labeled as TSP-CDA. Since TSPs need to find a tour with minimum cost, cities close to each other are usually clustered in the tour. This inspired us to model CDPs as TSPs by taking each vertex as a city. Then, in the final tour, the vertices in the same community tend to cluster together, and the community structure can be obtained by cutting the tour into a couple of paths. There are two challenges. The first is to define a suitable distance between each pair of vertices which can reflect the probability that they belong to the same community. The second is to design a suitable strategy to cut the final tour into paths which can form communities. In TSP-CDA, we deal with these two challenges by defining a PageRank Distance and an automatic threshold-based cutting strategy. The PageRank Distance is designed with the intrinsic properties of CDPs in mind, and can be calculated efficiently. In the experiments, benchmark networks with 1000-10,000 nodes and varying structures are used to test the performance of TSP-CDA. A comparison is also made between TSP-CDA and two well-established community detection algorithms. The results show that TSP-CDA can find accurate community structure efficiently and outperforms the two existing algorithms.

  17. The Application of Abstract Algebra and Computers to the Solution of Path Problems in Oriented Networks

    Directory of Open Access Journals (Sweden)

    M.A. Murray–Lasso.

    2010-01-01

    Full Text Available The connection matrix of oriented graphs and a generalization introduced by Gondran and Minoux to solve a great variety of path problems, including various optimization problems (maximize or minimize lengths, minimum capacity, probability, etc., ennumeration of paths, path counting, and connection. To achieve this the matrix components are treated as elements of an algebraic structure called semiring or diod (an extension of a monoid. The possibilities of using MATLAB for handling the matrices are explored and listings of educational programs (not for production runs are provided. The purpose is to rescue a topic which has not become very popular due, in the authors opinion, to the fact that the originators Gondran and Minoux (Ref. 3 have treated the topic in a very abstract manner, oriented to mathematicians and difficult to grasp by engineers. In this article the topics are treated informally and illustrative examples are given (something that Ref. 3 does not provide in great detail as well as listings in the MATLAB language. The topic is ammenable to extensions and it is possible to design educational computerized projects for learning important network topics with very wide applications.

  18. applying reinforcement learning to the weapon assignment problem

    African Journals Online (AJOL)

    ismith

    World, General Rupert Smith concludes that modern warfare will call for information .... making entity will attempt to destruct or decompose a problem until the sub- ..... 2009. 10 Paradis, S, Benaskeur, A, Oxenham, M & Cutler, P. “Threat evaluation and weapons allocation in network-centric warfare”. In: 2005 7th International.

  19. Applying Distributed Constraint Optimization Approach to the User Association Problem in Heterogeneous Networks.

    Science.gov (United States)

    Duan, Peibo; Zhang, Changsheng; Mao, Guoqiang; Zhang, Bin

    2017-09-22

    User association has emerged as a distributed resource allocation problem in the heterogeneous networks (HetNets). Although an approximate solution is obtainable using the approaches like combinatorial optimization and game theory-based schemes, these techniques can be easily trapped in local optima. Furthermore, the lack of exploring the relation between the quality of the solution and the parameters in the HetNet [e.g., the number of users and base stations (BSs)], at what levels, impairs the practicability of deploying these approaches in a real world environment. To address these issues, this paper investigates how to model the problem as a distributed constraint optimization problem (DCOP) from the point of the view of the multiagent system. More specifically, we develop two models named each connection as variable (ECAV) and each BS and user as variable (EBUAV). Hereinafter, we propose a DCOP solver which not only sets up the model in a distributed way but also enables us to efficiently obtain the solution by means of a complete DCOP algorithm based on distributed message-passing. Naturally, both theoretical analysis and simulation show that different qualitative solutions can be obtained in terms of an introduced parameter η which has a close relation with the parameters in the HetNet. It is also apparent that there is 6% improvement on the throughput by the DCOP solver comparing with other counterparts when η=3. Particularly, it demonstrates up to 18% increase in the ability to make BSs service more users when the number of users is above 200 while the available resource blocks (RBs) are limited. In addition, it appears that the distribution of RBs allocated to users by BSs is better with the variation of the volume of RBs at the macro BS.

  20. The multi-objective network design problem using minimizing externalities as objectives: comparison of a genetic algorithm and simulated annealing framework.

    NARCIS (Netherlands)

    Possel, B.; Wismans, Luc Johannes Josephus; van Berkum, Eric C.; Bliemer, M.C.J.

    2016-01-01

    Incorporation of externalities in the Multi-Objective Network Design Problem (MO NDP) as objectives is an important step in designing sustainable networks. In this research the problem is defined as a bi-level optimization problem in which minimizing externalities are the objectives and link types

  1. Destruction of Interstellar Dust in Evolving Supernova Remnant Shock Waves

    Science.gov (United States)

    Slavin, Jonathan D.; Dwek, Eli; Jones, Anthony P.

    2015-01-01

    Supernova generated shock waves are responsible for most of the destruction of dust grains in the interstellar medium (ISM). Calculations of the dust destruction timescale have so far been carried out using plane parallel steady shocks, however that approximation breaks down when the destruction timescale becomes longer than that for the evolution of the supernova remnant (SNR) shock. In this paper we present new calculations of grain destruction in evolving, radiative SNRs. To facilitate comparison with the previous study by Jones et al. (1996), we adopt the same dust properties as in that paper. We find that the efficiencies of grain destruction are most divergent from those for a steady shock when the thermal history of a shocked gas parcel in the SNR differs significantly from that behind a steady shock. This occurs in shocks with velocities 200 km s(exp -1) for which the remnant is just beginning to go radiative. Assuming SNRs evolve in a warm phase dominated ISM, we find dust destruction timescales are increased by a factor of approximately 2 compared to those of Jones et al. (1996), who assumed a hot gas dominated ISM. Recent estimates of supernova rates and ISM mass lead to another factor of approximately 3 increase in the destruction timescales, resulting in a silicate grain destruction timescale of approximately 2-3 Gyr. These increases, while not able resolve the problem of the discrepant timescales for silicate grain destruction and creation, are an important step towards understanding the origin, and evolution of dust in the ISM.

  2. Multiple Linear Regression for Reconstruction of Gene Regulatory Networks in Solving Cascade Error Problems

    Science.gov (United States)

    Zainudin, Suhaila; Arif, Shereena M.

    2017-01-01

    Gene regulatory network (GRN) reconstruction is the process of identifying regulatory gene interactions from experimental data through computational analysis. One of the main reasons for the reduced performance of previous GRN methods had been inaccurate prediction of cascade motifs. Cascade error is defined as the wrong prediction of cascade motifs, where an indirect interaction is misinterpreted as a direct interaction. Despite the active research on various GRN prediction methods, the discussion on specific methods to solve problems related to cascade errors is still lacking. In fact, the experiments conducted by the past studies were not specifically geared towards proving the ability of GRN prediction methods in avoiding the occurrences of cascade errors. Hence, this research aims to propose Multiple Linear Regression (MLR) to infer GRN from gene expression data and to avoid wrongly inferring of an indirect interaction (A → B → C) as a direct interaction (A → C). Since the number of observations of the real experiment datasets was far less than the number of predictors, some predictors were eliminated by extracting the random subnetworks from global interaction networks via an established extraction method. In addition, the experiment was extended to assess the effectiveness of MLR in dealing with cascade error by using a novel experimental procedure that had been proposed in this work. The experiment revealed that the number of cascade errors had been very minimal. Apart from that, the Belsley collinearity test proved that multicollinearity did affect the datasets used in this experiment greatly. All the tested subnetworks obtained satisfactory results, with AUROC values above 0.5. PMID:28250767

  3. Multiple Linear Regression for Reconstruction of Gene Regulatory Networks in Solving Cascade Error Problems.

    Science.gov (United States)

    Salleh, Faridah Hani Mohamed; Zainudin, Suhaila; Arif, Shereena M

    2017-01-01

    Gene regulatory network (GRN) reconstruction is the process of identifying regulatory gene interactions from experimental data through computational analysis. One of the main reasons for the reduced performance of previous GRN methods had been inaccurate prediction of cascade motifs. Cascade error is defined as the wrong prediction of cascade motifs, where an indirect interaction is misinterpreted as a direct interaction. Despite the active research on various GRN prediction methods, the discussion on specific methods to solve problems related to cascade errors is still lacking. In fact, the experiments conducted by the past studies were not specifically geared towards proving the ability of GRN prediction methods in avoiding the occurrences of cascade errors. Hence, this research aims to propose Multiple Linear Regression (MLR) to infer GRN from gene expression data and to avoid wrongly inferring of an indirect interaction (A → B → C) as a direct interaction (A → C). Since the number of observations of the real experiment datasets was far less than the number of predictors, some predictors were eliminated by extracting the random subnetworks from global interaction networks via an established extraction method. In addition, the experiment was extended to assess the effectiveness of MLR in dealing with cascade error by using a novel experimental procedure that had been proposed in this work. The experiment revealed that the number of cascade errors had been very minimal. Apart from that, the Belsley collinearity test proved that multicollinearity did affect the datasets used in this experiment greatly. All the tested subnetworks obtained satisfactory results, with AUROC values above 0.5.

  4. Multiple Linear Regression for Reconstruction of Gene Regulatory Networks in Solving Cascade Error Problems

    Directory of Open Access Journals (Sweden)

    Faridah Hani Mohamed Salleh

    2017-01-01

    Full Text Available Gene regulatory network (GRN reconstruction is the process of identifying regulatory gene interactions from experimental data through computational analysis. One of the main reasons for the reduced performance of previous GRN methods had been inaccurate prediction of cascade motifs. Cascade error is defined as the wrong prediction of cascade motifs, where an indirect interaction is misinterpreted as a direct interaction. Despite the active research on various GRN prediction methods, the discussion on specific methods to solve problems related to cascade errors is still lacking. In fact, the experiments conducted by the past studies were not specifically geared towards proving the ability of GRN prediction methods in avoiding the occurrences of cascade errors. Hence, this research aims to propose Multiple Linear Regression (MLR to infer GRN from gene expression data and to avoid wrongly inferring of an indirect interaction (A → B → C as a direct interaction (A → C. Since the number of observations of the real experiment datasets was far less than the number of predictors, some predictors were eliminated by extracting the random subnetworks from global interaction networks via an established extraction method. In addition, the experiment was extended to assess the effectiveness of MLR in dealing with cascade error by using a novel experimental procedure that had been proposed in this work. The experiment revealed that the number of cascade errors had been very minimal. Apart from that, the Belsley collinearity test proved that multicollinearity did affect the datasets used in this experiment greatly. All the tested subnetworks obtained satisfactory results, with AUROC values above 0.5.

  5. A self-organizing neural network for the traveling salesman problem that is competitive with simulated annealing.

    Science.gov (United States)

    Budinich, M

    1996-02-15

    Unsupervised learning applied to an unstructured neural network can give approximate solutions to the traveling salesman problem. For 50 cities in the plane this algorithm performs like the elastic net of Durbin and Willshaw (1987) and it improves when increasing the number of cities to get better than simulated annealing for problems with more than 500 cities. In all the tests this algorithm requires a fraction of the time taken by simulated annealing.

  6. Empirical analysis of the types of destructiveness of law enforcement officers

    Directory of Open Access Journals (Sweden)

    Zlokazov K.V.

    2014-12-01

    Full Text Available The variety of existing scientific concepts of the problem of personality destructiveness is shown. The character of such general conclusions does not facilitate the cognition and prediction of destructive phenomena. The author proves the necessity to develop psychological theory of destructiveness which methodologically unites well-known but separate phenomena of psychological life of an individual. The fundamental propositions of this theory are argued: destructiveness is an active behaviour; it is aimed at perceived goal and formed on the basis of need perceived by an individual. The following features of destructiveness are distinguished: individual typological, regulatory, value characteristics of personality; peculiarities of person’s attitude to significant aspects of life – to the self, society and professional activity. The author proposes his own method of destructiveness diagnostics aimed at describing destructive and constructive components of social and professional activity of a person. Diagnostics indicators are the following: typological preconditions of destructiveness; features of regulation of activity and relations; value characteristics of individuals related to destructiveness. Indicators, describing the level of personal disadaptation, are provided. Personality destructiveness indicators of 211 law enforcement officers (93 % – males, mean age – 34 were analyzed, which allowed to group and describe psychological characteristics of 4 types of destructiveness. They are: socially alienated – 31 % of respondents, socially destructive – 29 %, asocially destructive – 23 %, asocially alienated – 17 %. This typology allows to generalize psychological preconditions of destructive and constructive behaviour of law enforcement officers. The author proposes further analyzing the provisions of conception of personality destructiveness.

  7. Evaluation of an Interactive Case-based Online Network (ICON) in a problem based learning environment.

    Science.gov (United States)

    Nathoo, Arif N; Goldhoff, Patricia; Quattrochi, James J

    2005-08-01

    This study sought to assess the introduction of a web-based innovation in medical education that complements traditional problem-based learning curricula. Utilizing the case method as its fundamental educational approach, the Interactive Case-based Online Network (ICON) allows students to interact with each other, faculty and a virtual patient in difficult neurological cases. Given the paucity of available metrics to benchmark online systems, we complement user perceptions with data on system utilization. We describe a case study of distinct, small group tutorials over 2 years as part of the Human Nervous System and Behavior (HNSB) course at the Harvard Medical School. Participating students and faculty were interviewed following completion of the course and their utilization of the system was recorded and examined. Students each spent 3.2+/-1.3 h (mean+/-SD) through 8.6+/-2.8 accessions per week using ICON outside of required tutorial time. Faculty each spent 4.8+/-3.4 h through 16.6+/-8.9 accessions per week on ICON. Students identified real-time engagement, stronger relationships with faculty, increased accountability to the tutorial group and self-selected pace as the most beneficial characteristics of the ICON-based tutorial in comparison to traditional problem based learning (PBL) tutorials. Faculty identified enhanced collaboration with students and more realistic student experiences as the most beneficial characteristics. Both students and faculty reported that limitations of ICON included increased time investment for faculty and increased reliance on good faculty mentorship. This is the first study of the ICON learning system in undergraduate medical education, a platform designed to facilitate collaboration outside of the classroom. Data on user perceptions and system utilization suggest that both faculty and students chose to adopt this online learning system as a means for collaboration. The study also outlines future avenues for research in assessing

  8. Network models for solving the problem of multicriterial adaptive optimization of investment projects control with several acceptable technologies

    Science.gov (United States)

    Shorikov, A. F.; Butsenko, E. V.

    2017-10-01

    This paper discusses the problem of multicriterial adaptive optimization the control of investment projects in the presence of several technologies. On the basis of network modeling proposed a new economic and mathematical model and a method for solving the problem of multicriterial adaptive optimization the control of investment projects in the presence of several technologies. Network economic and mathematical modeling allows you to determine the optimal time and calendar schedule for the implementation of the investment project and serves as an instrument to increase the economic potential and competitiveness of the enterprise. On a meaningful practical example, the processes of forming network models are shown, including the definition of the sequence of actions of a particular investment projecting process, the network-based work schedules are constructed. The calculation of the parameters of network models is carried out. Optimal (critical) paths have been formed and the optimal time for implementing the chosen technologies of the investment project has been calculated. It also shows the selection of the optimal technology from a set of possible technologies for project implementation, taking into account the time and cost of the work. The proposed model and method for solving the problem of managing investment projects can serve as a basis for the development, creation and application of appropriate computer information systems to support the adoption of managerial decisions by business people.

  9. A path based model for a green liner shipping network design problem

    DEFF Research Database (Denmark)

    Jepsen, Mads Kehlet; Brouer, Berit Dangaard; Plum, Christian Edinger Munk

    2011-01-01

    Liner shipping networks are the backbone of international trade providing low transportation cost, which is a major driver of globalization. These networks are under constant pressure to deliver capacity, cost effectiveness and environmentally conscious transport solutions. This article proposes...

  10. Cloud Model-Based Artificial Immune Network for Complex Optimization Problem

    Science.gov (United States)

    Wang, Mingan; Li, Jianming; Guo, Dongliang

    2017-01-01

    This paper proposes an artificial immune network based on cloud model (AINet-CM) for complex function optimization problems. Three key immune operators—cloning, mutation, and suppression—are redesigned with the help of the cloud model. To be specific, an increasing half cloud-based cloning operator is used to adjust the dynamic clone multipliers of antibodies, an asymmetrical cloud-based mutation operator is used to control the adaptive evolution of antibodies, and a normal similarity cloud-based suppressor is used to keep the diversity of the antibody population. To quicken the searching convergence, a dynamic searching step length strategy is adopted. For comparative study, a series of numerical simulations are arranged between AINet-CM and the other three artificial immune systems, that is, opt-aiNet, IA-AIS, and AAIS-2S. Furthermore, two industrial applications—finite impulse response (FIR) filter design and proportional-integral-differential (PID) controller tuning—are investigated and the results demonstrate the potential searching capability and practical value of the proposed AINet-CM algorithm. PMID:28630620

  11. PRIMARY IMMUNODEFICIENCY: STATUS OF A PROBLEM TODAY. RUSSIAN NETWORK OF JMF-CENTERS

    Directory of Open Access Journals (Sweden)

    E. A. Latysheva

    2013-01-01

    Full Text Available The problems of primary immunodeficiency in Russia and the ways of solving of them are discussed in the article. Primary immunodeficiency is a group of rare diseases, so awareness of this pathology in the medical community and among patients is very low. This leads to late diagnosis and inadequate treatment of patients with such conditions. The result of the late beginning of treatment is early development of disability, and the high mortality rate of patients, as well as the high costs of the treatment of complications of primary immunodeficiency and sick-leave certificates for the government. Today in time and adequate therapy allows patients not only to reach adulthood without signs of disability, and to lead an active way of life, but to have healthy children. Given the high cost of therapy in many countries, the issue of providing patients with life-saving drugs remains unresolved. The global practice is to involve social organizations and funds. One of the foundations supporting educational programs, development of laboratories and research in the field of primary immunodeficiency is the Foundation of the Jeffrey Modell. A network of centres for primary immunodeficiency supported by the Jeffrey Modell Foundation (JMF-centers has started its functioning over the territory of the Russian Federation since 2011 in order to improve diagnostics and treatment of patients with primary immunodeficiency. A brief description of activity of these centers is presented in the article.

  12. Inverse and direct problems of optics: usage of artificial neural networks

    Science.gov (United States)

    Abrukov, Victor S.; Pavlov, Roman I.; Malinin, Gennadiy I.

    2004-08-01

    We describe an application of artificial neural networks (ANN) for solving of inverse and direct problems of optics. Using the ANN we calculate local and integral characteristics of object by means of incomplete set of data that characterize optical images. Possibilities of usage the only one value of a function of signal intensity distributionn in a plane of a registration for full determination of distribution of local characteristics in an object are shown. It is very important for optical fiber sensors, smart sensors and MEMS. Examples of ANN usage for a case of object with a cylindrical symmetry in a field of interferometry are presented. Results obtained show that determination of object local and integral characteristics can be perform very much simpler than by means of standard procedures and numerical approaches for signal processing, reduction and analysis. The ANN can allow also to solve number of tasks that could not be solved by means of usual approaches. In prospects, this method can be used for creation of automated systems for diagnostics, testing and control in various fields of scientific and applied research as well as in industry.

  13. Cloud Model-Based Artificial Immune Network for Complex Optimization Problem

    Directory of Open Access Journals (Sweden)

    Mingan Wang

    2017-01-01

    Full Text Available This paper proposes an artificial immune network based on cloud model (AINet-CM for complex function optimization problems. Three key immune operators—cloning, mutation, and suppression—are redesigned with the help of the cloud model. To be specific, an increasing half cloud-based cloning operator is used to adjust the dynamic clone multipliers of antibodies, an asymmetrical cloud-based mutation operator is used to control the adaptive evolution of antibodies, and a normal similarity cloud-based suppressor is used to keep the diversity of the antibody population. To quicken the searching convergence, a dynamic searching step length strategy is adopted. For comparative study, a series of numerical simulations are arranged between AINet-CM and the other three artificial immune systems, that is, opt-aiNet, IA-AIS, and AAIS-2S. Furthermore, two industrial applications—finite impulse response (FIR filter design and proportional-integral-differential (PID controller tuning—are investigated and the results demonstrate the potential searching capability and practical value of the proposed AINet-CM algorithm.

  14. Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem.

    Science.gov (United States)

    Al-Saggaf, Yeslam; Islam, Md Zahidul

    2015-08-01

    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites (SNS) users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (SysFor) to the context of SNS, which does not only build a decision tree but rather a forest allowing the exploration of more logic rules from a dataset. One logic rule that SysFor built in this study, for example, revealed that anyone having a profile picture showing just the face or a picture showing a family is less likely to be lonely. Another contribution of this article is the discussion of the implications of the data mining problem for governments, businesses, developers and the SNS users themselves.

  15. Cloud Model-Based Artificial Immune Network for Complex Optimization Problem.

    Science.gov (United States)

    Wang, Mingan; Feng, Shuo; Li, Jianming; Li, Zhonghua; Xue, Yu; Guo, Dongliang

    2017-01-01

    This paper proposes an artificial immune network based on cloud model (AINet-CM) for complex function optimization problems. Three key immune operators-cloning, mutation, and suppression-are redesigned with the help of the cloud model. To be specific, an increasing half cloud-based cloning operator is used to adjust the dynamic clone multipliers of antibodies, an asymmetrical cloud-based mutation operator is used to control the adaptive evolution of antibodies, and a normal similarity cloud-based suppressor is used to keep the diversity of the antibody population. To quicken the searching convergence, a dynamic searching step length strategy is adopted. For comparative study, a series of numerical simulations are arranged between AINet-CM and the other three artificial immune systems, that is, opt-aiNet, IA-AIS, and AAIS-2S. Furthermore, two industrial applications-finite impulse response (FIR) filter design and proportional-integral-differential (PID) controller tuning-are investigated and the results demonstrate the potential searching capability and practical value of the proposed AINet-CM algorithm.

  16. The Inverse Contagion Problem (ICP) vs.. Predicting site contagion in real time, when network links are not observable

    Science.gov (United States)

    Mushkin, I.; Solomon, S.

    2017-10-01

    We study the inverse contagion problem (ICP). As opposed to the direct contagion problem, in which the network structure is known and the question is when each node will be contaminated, in the inverse problem the links of the network are unknown but a sequence of contagion histories (the times when each node was contaminated) is observed. We consider two versions of the ICP: The strong problem (SICP), which is the reconstruction of the network and has been studied before, and the weak problem (WICP), which requires "only" the prediction (at each time step) of the nodes that will be contaminated at the next time step (this is often the real life situation in which a contagion is observed and predictions are made in real time). Moreover, our focus is on analyzing the increasing accuracy of the solution, as a function of the number of contagion histories already observed. For simplicity, we discuss the simplest (deterministic and synchronous) contagion dynamics and the simplest solution algorithm, which we have applied to different network types. The main result of this paper is that the complex problem of the convergence of the ICP for a network can be reduced to an individual property of pairs of nodes: the "false link difficulty". By definition, given a pair of unlinked nodes i and j, the difficulty of the false link (i,j) is the probability that in a random contagion history, the nodes i and j are not contaminated at the same time step (or at consecutive time steps). In other words, the "false link difficulty" of a non-existing network link is the probability that the observations during a random contagion history would not rule out that link. This probability is relatively straightforward to calculate, and in most instances relies only on the relative positions of the two nodes (i,j) and not on the entire network structure. We have observed the distribution of false link difficulty for various network types, estimated it theoretically and confronted it

  17. Innovation in Non Destructive Testing

    NARCIS (Netherlands)

    Wassink, C.H.P.

    2012-01-01

    In many established companies the pace of innovation is low. The Non-Destructive Testing sector is an example of a sector where the pace of innovation is very slow. Non-Destructive Testing (NDT) refers to the set of non-invasive activities used to determine the condition of objects or installations

  18. Genetic Algorithm for Solving Location Problem in a Supply Chain Network with Inbound and Outbound Product Flows

    Directory of Open Access Journals (Sweden)

    Suprayogi Suprayogi

    2016-12-01

    Full Text Available This paper considers a location problem in a supply chain network. The problem addressed in this paper is motivated by an initiative to develop an efficient supply chain network for supporting the agricultural activities. The supply chain network consists of regions, warehouses, distribution centers, plants, and markets. The products include a set of inbound products and a set of outbound products. In this paper, definitions of the inbound and outbound products are seen from the region’s point of view.  The inbound product is the product demanded by regions and produced by plants which flows on a sequence of the following entities: plants, distribution centers, warehouses, and regions. The outbound product is the product demanded by markets and produced by regions and it flows on a sequence of the following entities: regions, warehouses, and markets. The problem deals with determining locations of the warehouses and the distribution centers to be opened and shipment quantities associated with all links on the network that minimizes the total cost. The problem can be considered as a strategic supply chain network problem. A solution approach based on genetic algorithm (GA is proposed. The proposed GA is examined using hypothetical instances and its results are compared to the solution obtained by solving the mixed integer linear programming (MILP model. The comparison shows that there is a small gap (0.23%, on average between the proposed GA and MILP model in terms of the total cost. The proposed GA consistently provides solutions with least total cost. In terms of total cost, based on the experiment, it is demonstrated that coefficients of variation are closed to 0.

  19. NETWORK MODEL AND ALGORITHM FOR SOLVING PROBLEM PERTAINING TO OPTIMUM DISTRIBUTION OF CAPITAL INVESTMENT WHILE MODERNIZING ENTERPRISES OF HEATING SYSTEMS

    Directory of Open Access Journals (Sweden)

    V. A. Sednin

    2009-01-01

    Full Text Available The paper presents a problem statement, a developed mathematical model and proposed algorithm for  solving  optimization of capital  investments in modernization  (introduction of  automatic  controlsystems of thermal processes of large systems of centralized heat supply which are based on application of network model.The formulated problem refers to the problems of combinatory (discrete optimization. Methods of «branches and boundaries» or dynamic programming are applied nowadays for solving problems of this type. These methods are not considered as universal ones because they greatly depend on description  of  solution feasible area. As a result of it it is not possible to develop a universal software for solving any assignments which can be formulated as problems of combinatory optimization.The presented network model of the investigated problem does not have above-mentioned disadvantages and an algorithm is proposed for solving this problem which admits a simple programming realization. 

  20. Optimizing decentralized production-distribution planning problem in a multi-period supply chain network under uncertainty

    Science.gov (United States)

    Nourifar, Raheleh; Mahdavi, Iraj; Mahdavi-Amiri, Nezam; Paydar, Mohammad Mahdi

    2017-09-01

    Decentralized supply chain management is found to be significantly relevant in today's competitive markets. Production and distribution planning is posed as an important optimization problem in supply chain networks. Here, we propose a multi-period decentralized supply chain network model with uncertainty. The imprecision related to uncertain parameters like demand and price of the final product is appropriated with stochastic and fuzzy numbers. We provide mathematical formulation of the problem as a bi-level mixed integer linear programming model. Due to problem's convolution, a structure to solve is developed that incorporates a novel heuristic algorithm based on Kth-best algorithm, fuzzy approach and chance constraint approach. Ultimately, a numerical example is constructed and worked through to demonstrate applicability of the optimization model. A sensitivity analysis is also made.

  1. Destructive lesions of the brain

    Energy Technology Data Exchange (ETDEWEB)

    Raybaud, C.

    1983-08-01

    The destructive lesions of the brain include a wide variety of congenital and postnatally acquired lesions, variably designated porencephaly, schizencephaly, multicystic encephalomalacia and micrencephaly. The term ''porencephaly'' has been a source of confusion since it was first coined by Heschl in 1859. At first, ''porencephaly'' was used to describe a defect which extended through the full thickness of the cerebral mantle. The ventricular lumen then communicated with the subarachnoid space through the ''porus''. Later ''porencephaly'' was used indiscriminately to describe any cavity of the brain parenchyma, whatever its etiology, pathogenesis, or time of development. This problem in nomenclature was compounded by inability to determine whether the cavities observed represented ''true'' malformations or acquired encephaloclastic lesions. In 1946, Yakovlev and Wadsworth published two papers entitled ''Schizencephalies; study of the congenital clefts in the cerebral mantle''. In these works, they stressed the peculiar morphology of the congenital porencephalies, and suggested that these lesions were sufficiently distinctive to be isolated from the other defects of the brain. Without addressing the precise origin or developmental course of these lesions, they pointed out that the morphologic changes indicated partial agenesis of the cerebral mantle at an early stage of development.

  2. Problems in employing fibre optics in the Gigabit Ethernet network; Les problemes d'utiliser la fibre optique avec un reseau Gigabit Ethernet

    Energy Technology Data Exchange (ETDEWEB)

    Harvey, D.

    2000-10-01

    In developing the standards for the fibre optics Gigabit Ethernet network, the IEEE Committee 802.3z discovered certain problems involved with the 62.5 microns multi-mode fibres when employed at a wave-length of 850 nanometers. When looking for an explanation, it was discovered that equipment which conform to the Gigabit Ethernet standards utilize a laser for generating the light required for conveying information over the fibre optics network. The design of the 62.5 micron fibre contains certain impurities about the core of the fibre which reduces the light transmission. The result is no light , no information transmission through the core, and considerably reduced signal transmission towards the periphery of the fibre. Corning Corporation and other manufacturers of fibre optics came to the rescue by developing fibres specifically for the Gigabit Ethernet network. Corning, for example, manufactures four different varieties of optical fibres which are either 50 microns or 62.5 microns thick and operate optimally at a wavelength of 850 nanometers but at different distances ranging from 300 m to 600 m. The advantage of the different varieties of optical fibres is a matter of cost; since not all equipment requires the highest transmission distance to function properly, the ability to choose optical fibres that are optimal at a given level reduces the cost of the network. 1 tab., 1 fig.

  3. "Cold combustion" as a new method of toxic waste destruction

    Directory of Open Access Journals (Sweden)

    Екатерина Юрьевна Ткаченко

    2015-05-01

    Full Text Available This article describes a promising new method for the destruction of toxic industrial waste, obsolete pesticides and military poisons and explosives. The proposed method can be used to create mobile modular units that will produce the destruction of the "field", to clean the soil and water containing low concentrations of a pollutant, to solve the problem of disposal of explosives, which is often accompanied by the destruction of uncontrolled detonation. The proposed method is environmentally friendly, using ice as the working body

  4. The application of deep confidence network in the problem of image recognition

    Directory of Open Access Journals (Sweden)

    Chumachenko О.І.

    2016-12-01

    Full Text Available In order to study the concept of deep learning, in particular the substitution of multilayer perceptron on the corresponding network of deep confidence, computer simulations of the learning process to test voters was carried out. Multi-layer perceptron has been replaced by a network of deep confidence, consisting of successive limited Boltzmann machines. After training of a network of deep confidence algorithm of layer-wise training it was found that the use of networks of deep confidence greatly improves the accuracy of multilayer perceptron training by method of reverse distribution errors.

  5. Algorithm for complete enumeration based on a stroke graph to solve the supply network configuration and operations scheduling problem

    Directory of Open Access Journals (Sweden)

    Julien Maheut

    2013-07-01

    Full Text Available Purpose: The purpose of this paper is to present an algorithm that solves the supply network configuration and operations scheduling problem in a mass customization company that faces alternative operations for one specific tool machine order in a multiplant context. Design/methodology/approach: To achieve this objective, the supply chain network configuration and operations scheduling problem is presented. A model based on stroke graphs allows the design of an algorithm that enumerates all the feasible solutions. The algorithm considers the arrival of a new customized order proposal which has to be inserted into a scheduled program. A selection function is then used to choose the solutions to be simulated in a specific simulation tool implemented in a Decision Support System. Findings and Originality/value: The algorithm itself proves efficient to find all feasible solutions when alternative operations must be considered. The stroke structure is successfully used to schedule operations when considering more than one manufacturing and supply option in each step. Research limitations/implications: This paper includes only the algorithm structure for a one-by-one, sequenced introduction of new products into the list of units to be manufactured. Therefore, the lotsizing process is done on a lot-per-lot basis. Moreover, the validation analysis is done through a case study and no generalization can be done without risk. Practical implications: The result of this research would help stakeholders to determine all the feasible and practical solutions for their problem. It would also allow to assessing the total costs and delivery times of each solution. Moreover, the Decision Support System proves useful to assess alternative solutions. Originality/value: This research offers a simple algorithm that helps solve the supply network configuration problem and, simultaneously, the scheduling problem by considering alternative operations. The proposed system

  6. The anatomy of urban social networks and its implications in the searchability problem

    Science.gov (United States)

    Herrera-Yagüe, C.; Schneider, C. M.; Couronné, T.; Smoreda, Z.; Benito, R. M.; Zufiria, P. J.; González, M. C.

    2015-01-01

    The appearance of large geolocated communication datasets has recently increased our understanding of how social networks relate to their physical space. However, many recurrently reported properties, such as the spatial clustering of network communities, have not yet been systematically tested at different scales. In this work we analyze the social network structure of over 25 million phone users from three countries at three different scales: country, provinces and cities. We consistently find that this last urban scenario presents significant differences to common knowledge about social networks. First, the emergence of a giant component in the network seems to be controlled by whether or not the network spans over the entire urban border, almost independently of the population or geographic extension of the city. Second, urban communities are much less geographically clustered than expected. These two findings shed new light on the widely-studied searchability in self-organized networks. By exhaustive simulation of decentralized search strategies we conclude that urban networks are searchable not through geographical proximity as their country-wide counterparts, but through an homophily-driven community structure. PMID:26035529

  7. Research on Intellectual Property Right Problems of Peer-to-Peer Networks.

    Science.gov (United States)

    Dong, Ying; Li, Mingshu; Chen, Meizhang; Zheng, Shengli

    2002-01-01

    Discusses digital intellectual property rights relating to peer-to-peer networks, using Napster as an example. Suggests anti-piracy solutions to prevent litigation and considers how libraries can develop potential service models using peer-to-peer networks, including the development of personal libraries on the Internet, interlibrary loan,…

  8. A State-of-the-Art Review of the Sensor Location, Flow Observability, Estimation, and Prediction Problems in Traffic Networks

    Directory of Open Access Journals (Sweden)

    Enrique Castillo

    2015-01-01

    Full Text Available A state-of-the-art review of flow observability, estimation, and prediction problems in traffic networks is performed. Since mathematical optimization provides a general framework for all of them, an integrated approach is used to perform the analysis of these problems and consider them as different optimization problems whose data, variables, constraints, and objective functions are the main elements that characterize the problems proposed by different authors. For example, counted, scanned or “a priori” data are the most common data sources; conservation laws, flow nonnegativity, link capacity, flow definition, observation, flow propagation, and specific model requirements form the most common constraints; and least squares, likelihood, possible relative error, mean absolute relative error, and so forth constitute the bases for the objective functions or metrics. The high number of possible combinations of these elements justifies the existence of a wide collection of methods for analyzing static and dynamic situations.

  9. Application for pinch design of heat exchanger networks by use of a computer code employing an improved problem algorithm table

    Energy Technology Data Exchange (ETDEWEB)

    Ozkan, Semra; Dincer, Salih [Department of Chemical Engineering, Chemical-Metallurgical Faculty, Yildiz Technical University, Davutpasa Kampusu, No 127, 34210 Esenler, Istanbul (Turkey)

    2001-12-01

    In this work, the methods used in pinch design were applied to a heat exchanger network with the aid of an improved problem algorithm table. This table enables one to compose composite and grand composite curves in a simplified way. A user friendly computer code entitled DarboTEK, compiled by using Visual Basic 3.0, was developed for the design of integrated heat exchanger networks and estimation of related capital costs. Based on the data obtained from the TUPRAS petroleum refinery at Izmit, a retrofit design of heat exchanger networks was accomplished using DarboTEK. An investment of 3,576,627 dollars is needed which will be paid back in 1.69 years simply by energy conservation due to heat integration. (Author)

  10. Reversible Destruction of Dynamical Localization

    OpenAIRE

    Lignier, Hans; Chabé, Julien; Delande, Dominique; Garreau, Jean Claude; Szriftgiser, Pascal

    2005-01-01

    4 pages, 2 eps figures (color); Dynamical localization is a localization phenomenon taking place, for example, in the quantum periodically-driven kicked rotor. It is due to subtle quantum destructive interferences and is thus of intrinsic quantum origin. It has been shown that deviation from strict periodicity in the driving rapidly destroys dynamical localization. We report experimental results showing that this destruction is partially reversible when the deterministic perturbation that des...

  11. Data-Intensive Cloud Service Provision for Research Institutes: the Network Connectivity Problem

    CERN Document Server

    Cass, Tony; CERN. Geneva. IT Department

    2016-01-01

    Much effort (and money) has been invested in recent years to ensure that academic and research sites are well interconnected with high-capacity networks that, in most cases, span national and continental boundaries. However, these dedicated research and education networks, whether national (NRENs) or trans-continental (RENs), frequently have Acceptable Use Policies (AUPs) that restrict their use by commercial entities, notably Cloud Service Providers (CSPs). After a brief summary of the issues involved, we describe three approaches to removing the network connectivity barrier that threatens to limit the ability of academic and research institutions to profit effectively from services offered by CSPs.

  12. Parallelization of learning problems by artificial neural networks. Application in external radiotherapy; Parallelisation de problemes d'apprentissage par des reseaux neuronaux artificiels. Application en radiotherapie externe

    Energy Technology Data Exchange (ETDEWEB)

    Sauget, M

    2007-12-15

    This research is about the application of neural networks used in the external radiotherapy domain. The goal is to elaborate a new evaluating system for the radiation dose distributions in heterogeneous environments. The al objective of this work is to build a complete tool kit to evaluate the optimal treatment planning. My st research point is about the conception of an incremental learning algorithm. The interest of my work is to combine different optimizations specialized in the function interpolation and to propose a new algorithm allowing to change the neural network architecture during the learning phase. This algorithm allows to minimise the al size of the neural network while keeping a good accuracy. The second part of my research is to parallelize the previous incremental learning algorithm. The goal of that work is to increase the speed of the learning step as well as the size of the learned dataset needed in a clinical case. For that, our incremental learning algorithm presents an original data decomposition with overlapping, together with a fault tolerance mechanism. My last research point is about a fast and accurate algorithm computing the radiation dose deposit in any heterogeneous environment. At the present time, the existing solutions used are not optimal. The fast solution are not accurate and do not give an optimal treatment planning. On the other hand, the accurate solutions are far too slow to be used in a clinical context. Our algorithm answers to this problem by bringing rapidity and accuracy. The concept is to use a neural network adequately learned together with a mechanism taking into account the environment changes. The advantages of this algorithm is to avoid the use of a complex physical code while keeping a good accuracy and reasonable computation times. (author)

  13. Libraries and Networks in Transition: Problems and Prospects for the 1980's.

    Science.gov (United States)

    De Gennaro, Richard

    1981-01-01

    Discusses the possible effects of library automation and networking on standards of catalog accuracy, catalog maintenance, circulation control, and other processes, and describes the mission of the Research Libraries Group (RLG), a consortium of 25 research libraries. (FM)

  14. The destructive index and early lung destruction in smokers.

    Science.gov (United States)

    Eidelman, D H; Ghezzo, H; Kim, W D; Cosio, M G

    1991-07-01

    The destructive index (DI), a measure of alveolar septal damage and emphysema, has been proposed as a sensitive index of lung destruction that closely reflects functional abnormalities, especially loss of elastic recoil. To better understand the progression of lung destruction in smokers, we studied the contribution of its principal components: breaks in the alveolar septa (DIb) and the presence of emphysematous spaces (DIe), and compared them to the mean linear intercept (Lm) and DI as originally described. To do this we employed lungs obtained at autopsy from non-smokers and smokers. Lungs were selected by emphysema score (ES) so that all cases were emphysema free (nonsmokers and seven smokers) or had minimal emphysema (nine smokers; ES = 5). Of these indices, only DIb was significantly increased in the lungs of smokers: 17.8 +/- 1.2 versus 12.4 +/- 1.6, p less than 0.05. We also investigated the regional distribution of destruction by comparing results in upper and lower lobes. DIe, but not DIb, was significantly increased in upper lobes of smokers. These data support the notion that increases in DI in the lungs of smokers that occur before increases in Lm or ES reflect the presence of alveolar septal breaks and highlight the importance of alveolar septal destruction as a precursor to the development of airspace enlargement in the lungs of cigarette smokers.

  15. Solving Problems in Software Applications through Data Synchronization in Case of Absence of the Network

    OpenAIRE

    Isak Shabani; Betim Cico; Agni Dika

    2012-01-01

    In this paper, we have presented an algorithm for data synchronization based on Web Services (WS), which allows software applications to work well on both configurations Online and "Offline", in the absence of the network. For this purpose is in use Electronic Student Management System (ESMS) at University of Prishtina (UP) with the appropriate module. Since the use of ESMS, because of a uncertain supply of electricity, disconnecting the network and for other reasons which are not under the c...

  16. Craton destruction and related resources

    Science.gov (United States)

    Zhu, Rixiang; Zhang, Hongfu; Zhu, Guang; Meng, Qingren; Fan, Hongrui; Yang, Jinhui; Wu, Fuyuan; Zhang, Zhiyong; Zheng, Tianyu

    2017-10-01

    Craton destruction is a dynamic event that plays an important role in Earth's evolution. Based on comprehensive observations of many studies on the North China Craton (NCC) and correlations with the evolution histories of other cratons around the world, craton destruction has be defined as a geological process that results in the total loss of craton stability due to changes in the physical and chemical properties of the involved craton. The mechanisms responsible for craton destruction would be as the follows: (1) oceanic plate subduction; (2) rollback and retreat of a subducting oceanic plate; (3) stagnation and dehydration of a subducting plate in the mantle transition zone; (4) melting of the mantle above the mantle transition zone caused by dehydration of a stagnant slab; (5) non-steady flow in the upper mantle induced by melting, and/or (6) changes in the nature of the lithospheric mantle and consequent craton destruction caused by non-steady flow. Oceanic plate subduction itself does not result in craton destruction. For the NCC, it is documented that westward subduction of the paleo-Pacific plate should have initiated at the transition from the Middle-to-Late Jurassic, and resulted in the change of tectonic regime of eastern China. We propose that subduction, rollback and retreat of oceanic plates and dehydration of stagnant slabs are the main dynamic factors responsible for both craton destruction and concentration of mineral deposits, such as gold, in the overriding continental plate. Based on global distribution of gold deposits, we suggest that convergent plate margins are the most important setting for large gold concentrations. Therefore, decratonic gold deposits appear to occur preferentially in regions with oceanic subduction and overlying continental lithospheric destruction/modification/growth.

  17. Childhood Physical and Sexual Abuse and Social Network Patterns on Social Media: Associations With Alcohol Use and Problems Among Young Adult Women.

    Science.gov (United States)

    Oshri, Assaf; Himelboim, Itai; Kwon, Josephine A; Sutton, Tara E; Mackillop, James

    2015-11-01

    The aim of the present study was to examine the links between severities of child abuse (physical vs. sexual), and alcohol use versus problems via social media (Facebook) peer connection structures. A total of 318 undergraduate female students at a public university in the United States reported severity of child abuse experiences and current alcohol use and problems. Social network data were obtained directly from the individuals' Facebook network. Severity of childhood physical abuse was positively linked to alcohol use and problems via eigenvector centrality, whereas severity of childhood sexual abuse was negatively linked to alcohol use and problems via clustering coefficient. Childhood physical and sexual abuse were linked positively and negatively, respectively, to online social network patterns associated with alcohol use and problems. The study suggests the potential utility of these online network patterns as risk indices and ultimately using social media as a platform for targeted preventive interventions.

  18. Dynamically weighted evolutionary ordinal neural network for solving an imbalanced liver transplantation problem.

    Science.gov (United States)

    Dorado-Moreno, Manuel; Pérez-Ortiz, María; Gutiérrez, Pedro A; Ciria, Rubén; Briceño, Javier; Hervás-Martínez, César

    2017-03-01

    Create an efficient decision-support model to assist medical experts in the process of organ allocation in liver transplantation. The mathematical model proposed here uses different sources of information to predict the probability of organ survival at different thresholds for each donor-recipient pair considered. Currently, this decision is mainly based on the Model for End-stage Liver Disease, which depends only on the severity of the recipient and obviates donor-recipient compatibility. We therefore propose to use information concerning the donor, the recipient and the surgery, with the objective of allocating the organ correctly. The database consists of information concerning transplants conducted in 7 different Spanish hospitals and the King's College Hospital (United Kingdom). The state of the patients is followed up for 12 months. We propose to treat the problem as an ordinal classification one, where we predict the organ survival at different thresholds: less than 15 days, between 15 and 90 days, between 90 and 365 days and more than 365 days. This discretization is intended to produce finer-grain survival information (compared with the common binary approach). However, it results in a highly imbalanced dataset in which more than 85% of cases belong to the last class. To solve this, we combine two approaches, a cost-sensitive evolutionary ordinal artificial neural network (ANN) (in which we propose to incorporate dynamic weights to make more emphasis on the worst classified classes) and an ordinal over-sampling technique (which adds virtual patterns to the minority classes and thus alleviates the imbalanced nature of the dataset). The results obtained by our proposal are promising and satisfactory, considering the overall accuracy, the ordering of the classes and the sensitivity of minority classes. In this sense, both the dynamic costs and the over-sampling technique improve the base results of the considered ANN-based method. Comparing our model with

  19. [A proposal for the prevention of ethical problems related to drug promotion: a national network for drug information].

    Science.gov (United States)

    Civaner, Murat

    2008-01-01

    The promotional activities of pharmaceutical companies are becoming an increasingly hot topic among healthcare workers and the general public. There are many studies in the literature claiming that drug promotion may lead to ethical problems, irrational use of medication, and increased costs, as well as negative effects on the patient-physician relationship and the medical profession. When considering that healthcare workers generally acquire their knowledge from the pharmaceutical industry, the problems mentioned, which are indeed of paramount importance, and the need for effective and sustainable interventions are clearly revealed. Many kinds of interventions have been recommended by various authorities and studies in order to prevent the kinds of problems mentioned above, including training healthcare workers, publishing professional codes to serve as guidelines about which professional values should be protected and how to cope with different situations in relationship to the pharmaceutical industry, or applying the business ethics codes of the pharmaceutical companies. Studies that assessed the effectiveness of different interventions, however, revealed that educating healthcare workers about marketing methods and state regulations are the only effective interventions. In this article, after defining the problem, a proposed national network for drug information is to decrease the negative effects of drug promotion and to promote the rational choice of medicines is described. According to the World Health Organization, rational use of medicine is the most effective, safe, applicable/suitable, and, lastly, the most cost effective option. A national network that will gather drug information by compiling evidence-based knowledge and taking rational use of medicine measures into account should be established. It should transmit information to all healthcare workers in a fast, equal, up to date, easily accessible, and free way. The network should also support

  20. Design of a Generic and Flexible Data Structure for Efficient Formulation of Large Scale Network Problems

    DEFF Research Database (Denmark)

    Quaglia, Alberto; Sarup, Bent; Sin, Gürkan

    2013-01-01

    structure for efficient formulation of enterprise-wide optimization problems is presented. Through the integration of the described data structure in our synthesis and design framework, the problem formulation workflow is automated in a software tool, reducing time and resources needed to formulate large...

  1. Exact and heuristic solution approaches for the Integrated Job Scheduling and Constrained Network Routing Problem

    DEFF Research Database (Denmark)

    Gamst, M.

    2014-01-01

    arrived at the machine. Furthermore, two resource demand transmissions cannot use the same edge in the same time period. The problem has application in grid computing, where a number of geographically distributed machines work together for solving large problems. The machines are connected through...

  2. Problems associated with the use of social networks--a pilot study.

    Science.gov (United States)

    Szczegielniak, Anna; Pałka, Karol; Krysta, Krzysztof

    2013-09-01

    The definition of addiction is that it is an acquired, strong need to perform a specific activity or continued use of mood alerting substances. Increasing discussion about the development of Internet addiction, which like other addictions, have their roots in depression, impaired assessment esteem and social anxiety shows that it affects all users of the global network, regardless of gender or age. The aim of the study was to assess the impact of social networking on the ongoing behavior of respondents- the first step of a study on the possibility of dependence on social networks. The study was based on an authors questionnaire placed on popular polish websites on February 2013. Questions related to the types and frequency of specific activities undertaken by the private profiles of users. The study involved 221 respondents, 193 questionnaires were filled in completely and correctly, without missing any questions. 83.24% admitted to using social networking sites, 16.76% indicated that they never had their own profile. An overwhelming number of respondents are a member of Facebook (79.17%), specialized portals related to their profession or work were used by only 13.89%, Our-class (6.25%) and Twitter was a primary portal for one person only. Nobody marked a participation in dating services. There is a big difference between the addiction to the Internet and addictions existing within the Internet; the same pattern applies to social networking. There is a need to recognize the "social networking" for a particular activity, irrespective of Facebook, Twitter and Nasza-Klasa, which are commercial products.

  3. Optimization strategies with resource scarcity: From immunization of networks to the traveling salesman problem

    Science.gov (United States)

    Bellingeri, Michele; Agliari, Elena; Cassi, Davide

    2015-10-01

    The best strategy to immunize a complex network is usually evaluated in terms of the percolation threshold, i.e. the number of vaccine doses which make the largest connected cluster (LCC) vanish. The strategy inducing the minimum percolation threshold represents the optimal way to immunize the network. Here we show that the efficacy of the immunization strategies can change during the immunization process. This means that, if the number of doses is limited, the best strategy is not necessarily the one leading to the smallest percolation threshold. This outcome should warn about the adoption of global measures in order to evaluate the best immunization strategy.

  4. A greedy construction heuristic for the liner service network design problem

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard

    is challenging due to the size of a global liner shipping operation and due to the hub-and-spoke network design, where a high percentage of the total cargo is transshipped. We present the first construction heuristic for large scale instances of the LSN-DP. The heuristic is able to find a solution for a real...

  5. The binding problem in population neurodynamics: a network model for stimulus-specific coherent oscillations.

    Science.gov (United States)

    Pavlásek, J

    1998-12-01

    A hypothesis is presented that coherent oscillatory discharges of spatially distributed neuronal groups (the supposed binding mechanism) are the result of the convergence of stimulus-dependent activity in modality-specific afferent pathways with oscillatory activity generated in unspecific sensory systems. This view is supported by simulation experiments on model networks.

  6. The destruction of organic matter

    CERN Document Server

    Gorsuch, T T

    1970-01-01

    International Series of Monographs in Analytical Chemistry, Volume 39: The Destruction of Organic Matter focuses on the identification of trace elements in organic compounds. The monograph first offers information on the processes involved in the determination of trace elements in organic matters, as well as the methods not involving complete destruction of these elements. The text surveys the sources of errors in the processes responsible in pinpointing elements in organic compounds. These processes include sampling, disruption of the samples, manipulation, and measurements. The book

  7. The Average Network Flow Problem: Shortest Path and Minimum Cost Flow Formulations, Algorithms, Heuristics, and Complexity

    Science.gov (United States)

    2012-09-13

    supplier selection problem. 3.1 Introduction Multi-objective decision analysis (MODA) and multi-criteria decision making ( MCDM ) are very popular decision...xiv I. Introduction ...52 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 3.2 Decision

  8. Applying Ant Colony Optimization to the Problem of Cell Planning in Mobile Telephone System Radio Network

    Directory of Open Access Journals (Sweden)

    Osmar Viera Carcache

    2017-03-01

    Full Text Available This paper presents a computational proposal for the solution of the Cell Planning Problem. The importance of this problem in the area of Telecommunications imposes it as a reference in the search for new methods of optimization. Due to the complexity of the problem, this work uses a discrete relaxation and proposes a mathematical model for the application of the Meta-heuristic Ant Colony Optimization (ACO. For the analysis of the results, 5 instances of the problem of different sizes were selected and the Ants System (AS algorithm was applied. The results show that the proposal efficiently explores the search space, finding the optimal solution for each instance with a relatively low computational cost. These results are compared with 3 evolutionary alternatives of international reference that have been applied to the same study instances, showing a significant improvement by our proposal.

  9. A Robust Intelligent Framework for Multiple Response Statistical Optimization Problems Based on Artificial Neural Network and Taguchi Method

    Directory of Open Access Journals (Sweden)

    Ali Salmasnia

    2012-01-01

    Full Text Available An important problem encountered in product or process design is the setting of process variables to meet a required specification of quality characteristics (response variables, called a multiple response optimization (MRO problem. Common optimization approaches often begin with estimating the relationship between the response variable with the process variables. Among these methods, response surface methodology (RSM, due to simplicity, has attracted most attention in recent years. However, in many manufacturing cases, on one hand, the relationship between the response variables with respect to the process variables is far too complex to be efficiently estimated; on the other hand, solving such an optimization problem with accurate techniques is associated with problem. Alternative approach presented in this paper is to use artificial neural network to estimate response functions and meet heuristic algorithms in process optimization. In addition, the proposed approach uses the Taguchi robust parameter design to overcome the common limitation of the existing multiple response approaches, which typically ignore the dispersion effect of the responses. The paper presents a case study to illustrate the effectiveness of the proposed intelligent framework for tackling multiple response optimization problems.

  10. Solving the Dynamic Correlation Problem of the Susceptible-Infected-Susceptible Model on Networks

    CERN Document Server

    Cai, Chao-Ran; Chen, Michael Z Q; Holme, Petter; Guan, Jian-Yue

    2016-01-01

    The Susceptible-Infected-Susceptible model is a canonical model for emerging disease outbreaks. Such outbreaks are naturally modeled as taking place on networks. A theoretical challenge in network epidemiology is the dynamic correlations coming from that if one node is occupied, or infected (for disease spreading models), then its neighbors are likely to be occupied. By combining two theoretical approaches---the heterogeneous mean-field theory and the effective degree method---we are able to include these correlations in an analytical solution of the SIS model. We derive accurate expressions for the average prevalence (fraction of infected) and epidemic threshold. We also discuss how to generalize the approach to a larger class of stochastic population models.

  11. Reliable Path Selection Problem in Uncertain Traffic Network after Natural Disaster

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2013-01-01

    Full Text Available After natural disaster, especially for large-scale disasters and affected areas, vast relief materials are often needed. In the meantime, the traffic networks are always of uncertainty because of the disaster. In this paper, we assume that the edges in the network are either connected or blocked, and the connection probability of each edge is known. In order to ensure the arrival of these supplies at the affected areas, it is important to select a reliable path. A reliable path selection model is formulated, and two algorithms for solving this model are presented. Then, adjustable reliable path selection model is proposed when the edge of the selected reliable path is broken. And the corresponding algorithms are shown to be efficient both theoretically and numerically.

  12. [IT safety in medical networks--current problems and approach to solutions].

    Science.gov (United States)

    Pommerening, K

    2000-01-01

    Designers and users of medical networks have to face strong requirements for data protection and security. Professional discretion and data protection laws allow the transfer of or access to patient data only in a therapeutic context. These data should also be protected from the network provider. Patients should be safe from any harm by faulty data or buggy procedures. On the other hand the security of the most used software products gets worse and worse. The use of the internet endangers more and more the integrity of the user's computer. The security requirements can be met only through strict care in planning, building, and configuring the infrastructure. Some concrete recommendations and guiding principles can immediately be realized. If these recommendations are followed, the internet can be of immense value for health care.

  13. User Matching with Relation to the Stable Marriage Problem in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2017-03-20

    We consider a network comprised of multiple primary users (PUs) and multiple secondary users (SUs), where the SUs seek access to a set of orthogonal channels each occupied by one PU. Only one SU is allowed to coexist with a given PU. We propose a distributed matching algorithm to pair the network users, where a Stackelberg game model is assumed for the interaction between the paired PU and SU. The selected secondary is given access in exchange for monetary compensation to the primary. The PU optimizes the interference price it charges to a given SU and the power allocation to maintain communication. The SU optimizes its power demand so as to maximize its utility. Our algorithm provides a unique stable matching. Numerical results indicate the advantage of the proposed algorithm over other reference schemes.

  14. Animal Spirits Meets Creative Destruction

    NARCIS (Netherlands)

    Francois, P.; Lloyd-Ellis, H.

    2001-01-01

    We show how a Schumpeterian process of creative destruction can induce coordination in the timing of entrepreneurial activities across diverse sectors of the economy.Consequently, a multi-sector economy, in which sector-specific, productivity improvements are made by independent, profit-seeking

  15. Dynamic Scoring Through Creative Destruction

    NARCIS (Netherlands)

    van Oudheusden, P.

    2012-01-01

    Abstract: We examine the dynamic feedback effects of fiscal policies on the government budget and economy activity in a calibrated general equilibrium framework featuring endogenous growth through creative destruction. For several European countries, we find that making tax incentives with respect

  16. Weapons of mass destruction: radiation.

    Science.gov (United States)

    Neal, Chris J; Moores, Leon E

    2002-03-15

    The purpose of this review is to present a concise overview of the types of radiation, methods of dispersal, injury patterns, and treatment considerations in a scenario involving radiation-based weapons of mass destruction. Radiation-related casualties, although uncommon, are a potential threat because more nations and organizations are developing the technology for producing radioactive substances capable of being used as weapons.

  17. Leveraging socially networked mobile ICT platforms for the last-mile delivery problem.

    Science.gov (United States)

    Suh, Kyo; Smith, Timothy; Linhoff, Michelle

    2012-09-04

    Increasing numbers of people are managing their social networks on mobile information and communication technology (ICT) platforms. This study materializes these social relationships by leveraging spatial and networked information for sharing excess capacity to reduce the environmental impacts associated with "last-mile" package delivery systems from online purchases, particularly in low population density settings. Alternative package pickup location systems (PLS), such as a kiosk on a public transit platform or in a grocery store, have been suggested as effective strategies for reducing package travel miles and greenhouse gas emissions, compared to current door-to-door delivery models (CDS). However, our results suggest that a pickup location delivery system operating in a suburban setting may actually increase travel miles and emissions. Only once a social network is employed to assist in package pickup (SPLS) are significant reductions in the last-mile delivery distance and carbon emissions observed across both urban and suburban settings. Implications for logistics management's decades-long focus on improving efficiencies of dedicated distribution systems through specialization, as well as for public policy targeting carbon emissions of the transport sector are discussed.

  18. Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Lin Liu

    2010-01-01

    Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.

  19. A neural-network-based approach to the double traveling salesman problem.

    Science.gov (United States)

    Plebe, Alessio; Anile, Angelo Marcello

    2002-02-01

    The double traveling salesman problem is a variation of the basic traveling salesman problem where targets can be reached by two salespersons operating in parallel. The real problem addressed by this work concerns the optimization of the harvest sequence for the two independent arms of a fruit-harvesting robot. This application poses further constraints, like a collision-avoidance function. The proposed solution is based on a self-organizing map structure, initialized with as many artificial neurons as the number of targets to be reached. One of the key components of the process is the combination of competitive relaxation with a mechanism for deleting and creating artificial neurons. Moreover, in the competitive relaxation process, information about the trajectory connecting the neurons is combined with the distance of neurons from the target. This strategy prevents tangles in the trajectory and collisions between the two tours. Results of tests indicate that the proposed approach is efficient and reliable for harvest sequence planning. Moreover, the enhancements added to the pure self-organizing map concept are of wider importance, as proved by a traveling salesman problem version of the program, simplified from the double version for comparison.

  20. Systematic network synthesis and design: Problem formulation, superstructure generation, data management and solution

    DEFF Research Database (Denmark)

    Quaglia, Alberto; Gargalo, Carina L.; Chairakwongsa, Siwanat

    2015-01-01

    The developments obtained in recent years in the field of mathematical programming considerably reduced the computational time and resources needed to solve large and complex Mixed Integer Non Linear Programming (MINLP) problems. Nevertheless, the application of these methods in industrial practi...

  1. ACTUAL PROBLEMS ABOUT IMPROVEMENT CAR FLEETS TO ABROAD THROUGH THE UKRAINIAN NETWORKS

    Directory of Open Access Journals (Sweden)

    Yu. M. Hermaniuk

    2010-12-01

    Full Text Available The article describes the basic problems of organization of international transit transportations. A statistical analysis of wagon delays at border stations has been done. Also some conclusions on the necessity of developing a mathematical model of pushing on the transit streams of wagons on the railway system in Ukraine have been done using the method of simulative modeling.

  2. Social networks, mental health problems, and mental health service utilization in OEF/OIF National Guard veterans.

    Science.gov (United States)

    Sripada, Rebecca K; Bohnert, Amy S B; Teo, Alan R; Levine, Debra S; Pfeiffer, Paul N; Bowersox, Nicholas W; Mizruchi, Mark S; Chermack, Stephen T; Ganoczy, Dara; Walters, Heather; Valenstein, Marcia

    2015-09-01

    Low social support and small social network size have been associated with a variety of negative mental health outcomes, while their impact on mental health services use is less clear. To date, few studies have examined these associations in National Guard service members, where frequency of mental health problems is high, social support may come from military as well as other sources, and services use may be suboptimal. Surveys were administered to 1448 recently returned National Guard members. Multivariable regression models assessed the associations between social support characteristics, probable mental health conditions, and service utilization. In bivariate analyses, large social network size, high social network diversity, high perceived social support, and high military unit support were each associated with lower likelihood of having a probable mental health condition (p social support (OR .90, CI .88-.92) and high unit support (OR .96, CI .94-.97) continued to be significantly associated with lower likelihood of mental health conditions. Two social support measures were associated with lower likelihood of receiving mental health services in bivariate analyses, but were not significant in adjusted models. General social support and military-specific support were robustly associated with reduced mental health symptoms in National Guard members. Policy makers, military leaders, and clinicians should attend to service members' level of support from both the community and their units and continue efforts to bolster these supports. Other strategies, such as focused outreach, may be needed to bring National Guard members with need into mental health care.

  3. Responding to Destructive Interpersonal Interactions: A way forward ...

    African Journals Online (AJOL)

    This viewpoint paper focusses on the interpersonal problems that result in an unhealthy/unsafe school environment. Within the Southern African Development Community (SADC) region, the prevalence of domestic violence, child abuse, sexism, cultural intolerance and other destructive interpersonal interactions and ...

  4. Optimizing the Treatment of Acute Duct-Destructive Pancreatitis

    Science.gov (United States)

    Zhakiev, Bazylbek S.; Karsakbayev, Uteugali G.; Kelimberdiev, Mersaid S.; ?uhamedgalieva, Bodagoz M.; K?nonenko, Aleksander F.

    2016-01-01

    The search for new methods for treating duct-destructive pancreatitis is a relevant problem. Endogenous intoxication and oxidative stress that accompany acute pancreatitis often progress even after surgery, which forces one to search for additional possibilities of preventing these severe consequences. This research studied the effect of small…

  5. The Woman Writer and the Element of Destruction

    Science.gov (United States)

    Killoh, Ellen Peck

    1972-01-01

    Using Anais Nin as an example, the author describes the problem of the female writer as an agent of destruction. She is angered over the fact that women writers misdirected so much of their creative energy through fear of adopting any but the submissive, passive, feminine role. (Author/NL)

  6. Supply chain network design problem for a new market opportunity in an agile manufacturing system

    Science.gov (United States)

    Babazadeh, Reza; Razmi, Jafar; Ghodsi, Reza

    2012-08-01

    The characteristics of today's competitive environment, such as the speed with which products are designed, manufactured, and distributed, and the need for higher responsiveness and lower operational cost, are forcing companies to search for innovative ways to do business. The concept of agile manufacturing has been proposed in response to these challenges for companies. This paper copes with the strategic and tactical level decisions in agile supply chain network design. An efficient mixed-integer linear programming model that is able to consider the key characteristics of agile supply chain such as direct shipments, outsourcing, different transportation modes, discount, alliance (process and information integration) between opened facilities, and maximum waiting time of customers for deliveries is developed. In addition, in the proposed model, the capacity of facilities is determined as decision variables, which are often assumed to be fixed. Computational results illustrate that the proposed model can be applied as a power tool in agile supply chain network design as well as in the integration of strategic decisions with tactical decisions.

  7. PROBLEM OF ECOLOGICAL NETWORK DEVELOPMENT IN BIG CITIES, USING MOSCOW AS AN EXAMPLE

    Directory of Open Access Journals (Sweden)

    Boyko Valeriya Mikhaylovna

    2014-09-01

    Full Text Available Creating stable system of protected areas in the city is practically impossible. The optimal way out of this situation is, to our mind, connected with such ecosystem management strategy that ensures spontaneous development of preserved natural ecosystems with simultaneous effective urban planting. It should be noted that the problems of the recreational ecosystem exploitation, despite many years of research, are not fully solved, and, considering recreation in urban protected areas, especially in the city, get a new trend. It seems reasonable nowadays to try to shuffle off the burden of active recreation from forest ecosystems on buffer zones. These zones should be specially created or restored because of carrying out projects on ecological rehabilitation, planted areas or natural planted areas. For the staff of the protected area system it creates additional opportunities for shifting of forces in the solution of other problems on maintaining and restoring biodiversity.

  8. SET COVER PROBLEM OF COVERAGE PLANNING IN LTE-ADVANCED RELAY NETWORKS

    OpenAIRE

    Fan-Hsun Tseng; Li-Der Chou; Han-Chieh Chao; Wei-Jen Yu

    2014-01-01

    Various mobile devices are developing rapidly in contemporary society, such as smart phones and tablet PCs. Users are able to acquire different multimedia services through wireless communication anytime and anywhere. However, the increased demand also gives rise to a problem of insufficient bandwidth. Therefore, a fourth generation mobile telecommunications (4G) technology was proposed and widely investigated. One of the popular technologies is Long Term Evolution Advanced (LTE-Advanced), whi...

  9. Million city traveling salesman problem solution by divide and conquer clustering with adaptive resonance neural networks.

    Science.gov (United States)

    Mulder, Samuel A; Wunsch, Donald C

    2003-01-01

    The Traveling Salesman Problem (TSP) is a very hard optimization problem in the field of operations research. It has been shown to be NP-complete, and is an often-used benchmark for new optimization techniques. One of the main challenges with this problem is that standard, non-AI heuristic approaches such as the Lin-Kernighan algorithm (LK) and the chained LK variant are currently very effective and in wide use for the common fully connected, Euclidean variant that is considered here. This paper presents an algorithm that uses adaptive resonance theory (ART) in combination with a variation of the Lin-Kernighan local optimization algorithm to solve very large instances of the TSP. The primary advantage of this algorithm over traditional LK and chained-LK approaches is the increased scalability and parallelism allowed by the divide-and-conquer clustering paradigm. Tours obtained by the algorithm are lower quality, but scaling is much better and there is a high potential for increasing performance using parallel hardware.

  10. Evolutionary algorithm for the problem of oil products distributions on oil pipeline network; Algoritmo evolucionario para distribuicao de produtos de petroleo por redes de polidutos

    Energy Technology Data Exchange (ETDEWEB)

    Marcondes, Eduardo; Goldbarg, Elizabeth; Goldbarg, Marco; Cunha, Thatiana [Universidade Federal do Rio Grande do Norte (UFRN), Natal, RN (Brazil)

    2008-07-01

    A major problem about the planning of production in refinery is the determination of what should be done in each stage of production as a horizon of time. Among such problems, distribution of oil products through networks of pipelines is a very significant problem because of its economic importance. In this work, a problem of distribution of oil through a network of pipelines is modeled. The network studied is a simplification of a real network. There are several restrictions to be met, such as limits of storage, transmission or receipt of limits and limitations of transport. The model is adopted bi-goal where you want to minimize the fragmentation and the time of transmission, given the restrictions of demand and storage capacity. Whereas the occupancy rate of networks is increasingly high, is of great importance optimize its use. In this work, the technique of optimization by Cloud of particles is applied to the problem of distribution of oil products by networks of pipelines. (author)

  11. Destructive lesions of the brain.

    Science.gov (United States)

    Raybaud, C

    1983-01-01

    The congenital destructive lesions of the brain include focal lesions (porencephaly) and diffuse lesions (micrencephaly, hydranencephaly). According to the time the injury occurred and following the assumption of Yakovlev and Wadworth (1946), they are classified as agenetic porencephalies, either - bilateral (schizencephaly) or unilateral, when the injury occurs early enough in gestation (before 6 months) to disturb the growth of the cerebral mantle: abnormal sulcal pattern and heterotopic gray matter are then observed. They are classified as encephaloclastic when the destruction affects an otherwise normal cerebrum (last trimester). The porencephalies should be differenciated from post natal lesions (multicystic encephalomalacia, focal cavitations). By showing the fluid cavity and the cortical distortion, neuroradiology permits precise diagnosis of the defect itself and the associated cortical disorder, as well as an evaluation when they occurred.

  12. Creative Destruction and Productive Preemption

    OpenAIRE

    Norbäck, Pehr-Johan; Persson, Lars; Svensson, Roger

    2009-01-01

    We develop a theory of innovation for entry and sale into oligopoly, and show that inventions of higher quality are more likely to be sold (or licensed) to an incumbent due to strategic product market effects on the sales price. Such preemptive acquisitions by incumbents are shown to stimulate the process of creative destruction by increasing the entrepreneurial effort allocated to high-quality invention projects. Using data on patents granted to small firms and individuals, we find evidence ...

  13. Taxi pooling in New York City: a network-based approach to social sharing problems

    CERN Document Server

    Santi, Paolo; Szell, Michael; Sobolevsky, Stanislav; Strogatz, Steven; Ratti, Carlo

    2013-01-01

    Taxi services are a vital part of urban transportation, and a major contributor to traffic congestion and air pollution causing substantial adverse effects on human health. Sharing taxi trips is a possible way of reducing the negative impact of taxi services on cities, but this comes at the expense of passenger discomfort in terms of a longer travel time. Due to computational challenges, taxi sharing has traditionally been approached on small scales, such as within airport perimeters, or with dynamical ad-hoc heuristics. However, a mathematical framework for the systematic understanding of the tradeoff between collective benefits of sharing and individual passenger discomfort is lacking. Here we introduce the notion of shareability network which allows us to model the collective benefits of sharing as a function of passenger inconvenience, and to efficiently compute optimal sharing strategies on massive datasets. We apply this framework to a dataset of millions of taxi trips taken in New York City, showing th...

  14. A hybrid model using decision tree and neural network for credit scoring problem

    Directory of Open Access Journals (Sweden)

    Amir Arzy Soltan

    2012-08-01

    Full Text Available Nowadays credit scoring is an important issue for financial and monetary organizations that has substantial impact on reduction of customer attraction risks. Identification of high risk customer can reduce finished cost. An accurate classification of customer and low type 1 and type 2 errors have been investigated in many studies. The primary objective of this paper is to develop a new method, which chooses the best neural network architecture based on one column hidden layer MLP, multiple columns hidden layers MLP, RBFN and decision trees and ensembling them with voting methods. The proposed method of this paper is run on an Australian credit data and a private bank in Iran called Export Development Bank of Iran and the results are used for making solution in low customer attraction risks.

  15. Simply Coded Evolutionary Artificial Neural Networks on a Mobile Robot Control Problem

    Science.gov (United States)

    Katada, Yoshiaki; Hidaka, Takuya

    One of the advantages of evolutionary robotics over other approaches in embodied cognitive science would be its parallel population search. Due to the population search, it takes a long time to evaluate all robot in a real environment. Thus, such techniques as to shorten the time are required for real robots to evolve in a real environment. This paper proposes to use simply coded evolutionary artificial neural networks for mobile robot control to make genetic search space as small as possible and investigates the performance of them using simulated and real robots. Two types of genetic algorithm (GA) are employed, one is the standard GA and the other is an extended GA, to achieve higher final fitnesses. The results suggest the benefits of the proposed method.

  16. Chondrule destruction in nebular shocks

    Energy Technology Data Exchange (ETDEWEB)

    Jacquet, Emmanuel; Thompson, Christopher, E-mail: ejacquet@mnhn.fr [Canadian Institute for Theoretical Astrophysics, University of Toronto, 60 St George Street, Toronto, ON M5S 3H8 (Canada)

    2014-12-10

    Chondrules are millimeter-sized silicate spherules ubiquitous in primitive meteorites, but whose origin remains mysterious. One of the main proposed mechanisms for producing them is melting of solids in shock waves in the gaseous protoplanetary disk. However, evidence is mounting that chondrule-forming regions were enriched in solids well above solar abundances. Given the high velocities involved in shock models, destructive collisions would be expected between differently sized grains after passage of the shock front as a result of differential drag. We investigate the probability and outcome of collisions of particles behind a one-dimensional shock using analytic methods as well as a full integration of the coupled mass, momentum, energy, and radiation equations. Destruction of protochondrules seems unavoidable for solid/gas ratios ε ≳ 0.1, and possibly even for solar abundances because of 'sandblasting' by finer dust. A flow with ε ≳ 10 requires much smaller shock velocities (∼2 versus 8 km s{sup –1}) in order to achieve chondrule-melting temperatures, and radiation trapping allows slow cooling of the shocked fragments. Initial destruction would still be extensive; although re-assembly of millimeter-sized particles would naturally occur by grain sticking afterward, the compositional heterogeneity of chondrules may be difficult to reproduce. We finally note that solids passing through small-scale bow shocks around few kilometer-sized planetesimals might experience partial melting and yet escape fragmentation.

  17. Inefficient Job Destructions and Training with Hold-up

    DEFF Research Database (Denmark)

    Chéron, Arnaud; Rouland, Benedicte

    2011-01-01

    This paper develops an equilibrium search model with endogenous job destructions and where firms decide at the time of job entry how much to invest in match-specific human capital. We first show that job destruction and training investment decisions are strongly complementary. It is possible that...... that there are no firings at equilibrium. Further, training investments are confronted to a hold-up problem making the decentralized equilibrium always inefficient. We show therefore that both training subsidies and firing taxes must be implemented to bring back efficiency....

  18. Dental problems and Familismo: social network discussion of oral health issues among adults of Mexican origin living in the Midwest United States.

    Science.gov (United States)

    Maupome, G; McConnell, W R; Perry, B L

    2016-12-01

    To examine the influence of collectivist orientation (often called familismo when applied to the Latino sub-group in the United States) in oral health discussion networks. Through respondent-driven sampling and face-to-face interviews, we identified respondents' (egos) personal social network members (alters). Egos stated whom they talked with about oral health, and how often they discussed dental problems in the preceding 12 months. An urban community of adult Mexican-American immigrants in the Midwest United States. We interviewed 332 egos (90% born in Mexico); egos named an average of 3.9 alters in their networks, 1,299 in total. We applied egocentric network methods to examine the ego, alter, and network variables that characterize health discussion networks. Kin were most often leveraged when dental problems arose; egos relied on individuals whom they perceive to have better knowledge about dental matters. However, reliance on knowledgeable alters decreased among egos with greater behavioral acculturation. This paper developed a network-based conceptualization of familismo. We describe the structure of oral health networks, including kin, fictive kin, peers, and health professionals, and examine how networks and acculturation help shape oral health among these Mexican-Americans.

  19. A Non-Cooperative Approach to the Joint Subcarrier and Power Allocation Problem in Multi-Service SCFDMA Networks

    Directory of Open Access Journals (Sweden)

    E. E. Tsiropoulou

    2016-06-01

    Full Text Available In this paper a joint resource allocation problem is studied in a multi-service Single Carrier FDMA (SC-FDMA wireless network. Mobile users request various services with different Quality of Service (QoS characteristics and they determine in a distributed and non-cooperative manner a joint subcarrier and power allocation towards fulfilling their QoS prerequisites. Initially, a well-designed utility function is formulated to appropriately represent users’ diverse QoS prerequisites with respect to their requested service. The subcarriers allocation problem is solved based on a multilateral bargaining model, where users are able to select different discount factors to enter the bargaining game, thus better expressing their different needs in system resources with respect to their requested service. The subcarriers mapping is realized based either on the localized SC-FDMA method where the subcarriers are sequentially allocated to the users or the distributed SC-FDMA via considering the maximum channel gain policy, where each subcarrier is allocated to the user with the maximum channel gain. Given the subcarriers assignment, an optimization problem with respect to users’ uplink transmission power is formulated and solved, in order to determine the optimal power allocation per subcarrier assigned to each user. Finally, the performance of the proposed framework is evaluated via modeling and simulation and extensive numerical results are presented.

  20. The manual of strategic economic decision making using Bayesian belief networks to solve complex problems

    CERN Document Server

    Grover, Jeff

    2016-01-01

    This book is an extension of the author’s first book and serves as a guide and manual on how to specify and compute 2-, 3-, & 4-Event Bayesian Belief Networks (BBN). It walks the learner through the steps of fitting and solving fifty BBN numerically, using mathematical proof. The author wrote this book primarily for naïve learners and professionals, with a proof-based academic rigor. The author's first book on this topic, a primer introducing learners to the basic complexities and nuances associated with learning Bayes’ theory and inverse probability for the first time, was meant for non-statisticians unfamiliar with the theorem - as is this book. This new book expands upon that approach and is meant to be a prescriptive guide for building BBN and executive decision-making for students and professionals; intended so that decision-makers can invest their time and start using this inductive reasoning principle in their decision-making processes. It highlights the utility of an algorithm that served as ...

  1. Cooperation enhanced by habitat destruction in Prisoner's Dilemma Games

    Science.gov (United States)

    Yang, Xiqing; Wang, Wanxiong; Zhang, Feng; Qiao, Hongqiang

    2017-11-01

    The emergence and maintenance of cooperation is a fundamental problem within groups of selfish individuals, whereby we introduce a model of replicator equations based on the Prisoner's Dilemma game. In the present work, the effect of habitat destruction on the evolution of cooperation will be taken into account. Our results show that cooperators can receive the biggest boost for a moderate value of habitat destruction, and more serious habitat destruction will lead to lower levels of cooperation until zero. Moreover, we also reach the conclusion that the cooperation level decreases monotonously with the increasing of the ratio of cooperative cost to benefit but increases monotonously with the increasing of the encounter probability. Our findings can help to further understand the evolution of cooperation under the harsh external environment.

  2. A Nonlinear Multiobjective Bilevel Model for Minimum Cost Network Flow Problem in a Large-Scale Construction Project

    Directory of Open Access Journals (Sweden)

    Jiuping Xu

    2012-01-01

    Full Text Available The aim of this study is to deal with a minimum cost network flow problem (MCNFP in a large-scale construction project using a nonlinear multiobjective bilevel model with birandom variables. The main target of the upper level is to minimize both direct and transportation time costs. The target of the lower level is to minimize transportation costs. After an analysis of the birandom variables, an expectation multiobjective bilevel programming model with chance constraints is formulated to incorporate decision makers’ preferences. To solve the identified special conditions, an equivalent crisp model is proposed with an additional multiobjective bilevel particle swarm optimization (MOBLPSO developed to solve the model. The Shuibuya Hydropower Project is used as a real-world example to verify the proposed approach. Results and analysis are presented to highlight the performances of the MOBLPSO, which is very effective and efficient compared to a genetic algorithm and a simulated annealing algorithm.

  3. Social Network Analysis and Mining to Monitor and Identify Problems with Large-Scale Information and Communication Technology Interventions.

    Science.gov (United States)

    da Silva, Aleksandra do Socorro; de Brito, Silvana Rossy; Vijaykumar, Nandamudi Lankalapalli; da Rocha, Cláudio Alex Jorge; Monteiro, Maurílio de Abreu; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    The published literature reveals several arguments concerning the strategic importance of information and communication technology (ICT) interventions for developing countries where the digital divide is a challenge. Large-scale ICT interventions can be an option for countries whose regions, both urban and rural, present a high number of digitally excluded people. Our goal was to monitor and identify problems in interventions aimed at certification for a large number of participants in different geographical regions. Our case study is the training at the Telecentros.BR, a program created in Brazil to install telecenters and certify individuals to use ICT resources. We propose an approach that applies social network analysis and mining techniques to data collected from Telecentros.BR dataset and from the socioeconomics and telecommunications infrastructure indicators of the participants' municipalities. We found that (i) the analysis of interactions in different time periods reflects the objectives of each phase of training, highlighting the increased density in the phase in which participants develop and disseminate their projects; (ii) analysis according to the roles of participants (i.e., tutors or community members) reveals that the interactions were influenced by the center (or region) to which the participant belongs (that is, a community contained mainly members of the same region and always with the presence of tutors, contradicting expectations of the training project, which aimed for intense collaboration of the participants, regardless of the geographic region); (iii) the social network of participants influences the success of the training: that is, given evidence that the degree of the community member is in the highest range, the probability of this individual concluding the training is 0.689; (iv) the North region presented the lowest probability of participant certification, whereas the Northeast, which served municipalities with similar

  4. Social Network Analysis and Mining to Monitor and Identify Problems with Large-Scale Information and Communication Technology Interventions.

    Directory of Open Access Journals (Sweden)

    Aleksandra do Socorro da Silva

    Full Text Available The published literature reveals several arguments concerning the strategic importance of information and communication technology (ICT interventions for developing countries where the digital divide is a challenge. Large-scale ICT interventions can be an option for countries whose regions, both urban and rural, present a high number of digitally excluded people. Our goal was to monitor and identify problems in interventions aimed at certification for a large number of participants in different geographical regions. Our case study is the training at the Telecentros.BR, a program created in Brazil to install telecenters and certify individuals to use ICT resources. We propose an approach that applies social network analysis and mining techniques to data collected from Telecentros.BR dataset and from the socioeconomics and telecommunications infrastructure indicators of the participants' municipalities. We found that (i the analysis of interactions in different time periods reflects the objectives of each phase of training, highlighting the increased density in the phase in which participants develop and disseminate their projects; (ii analysis according to the roles of participants (i.e., tutors or community members reveals that the interactions were influenced by the center (or region to which the participant belongs (that is, a community contained mainly members of the same region and always with the presence of tutors, contradicting expectations of the training project, which aimed for intense collaboration of the participants, regardless of the geographic region; (iii the social network of participants influences the success of the training: that is, given evidence that the degree of the community member is in the highest range, the probability of this individual concluding the training is 0.689; (iv the North region presented the lowest probability of participant certification, whereas the Northeast, which served municipalities with similar

  5. Do friends share similar body image and eating problems? The role of social networks and peer influences in early adolescence.

    Science.gov (United States)

    Hutchinson, Delyse M; Rapee, Ronald M

    2007-07-01

    This study examined the role of friendship networks and peer influences in body image concern, dietary restraint, extreme weight loss behaviours (EWLBs) and binge eating in a large community sample of young adolescent females. Based on girls' self-reported friendship groups, social network analysis was used to identify 173 friendship cliques. Results indicated that clique members shared similar scores on measures of dieting, EWLB and binge eating, but not body image concern. Average clique scores for dieting, EWLB and binge eating, were also correlated significantly with clique averages on measures of perceived peer influence, body mass index and psychological variables. Multiple regression analyses indicated that perceived peer influences in weight-related attitudes and behaviours were predictive of individual girls' level of body image concern, dieting, EWLB use and binge eating. Notably, an individual girl's dieting and EWLB use could be predicted from her friends' respective dieting and EWLB scores. Findings highlight the significance of the peer environment in body image and eating problems during early adolescence.

  6. A SOLUTION TO THE DOUBLE DUMMY CONTRACT BRIDGE PROBLEM INFLUENCED BY SUPERVISED LEARNING MODULE ADAPTED BY ARTIFICIAL NEURAL NETWORK

    Directory of Open Access Journals (Sweden)

    M. Dharmalingam

    2014-10-01

    Full Text Available Contract Bridge is an intellectual game which motivates multiple skills and application of prior experience and knowledge, as no player knows accurately what moves other players are capable of making. The Bridge is a game played in the presence of imperfect information, yet its strategies must be well formulated, since the outcome at any intermediate stage is solely based on the choices made during the immediately preceding phase. In this paper, we train an Artificial Neural Network architecture using sample deals and use it to estimate the number of tricks to be taken by one pair of bridge players, which is the main challenge in the Double Dummy Bridge Problem. We focus on Back Propagation Neural Network Architecture with Back Propagation Algorithm with Sigmoidal transfer functions. We used two approaches namely, High – Card Point Count System and Distribution Point Method during the bidding phase of Contract Bridge. We experimented with two sigmoidal transfer functions namely, Log Sigmoid transfer function and the Hyperbolic Tangent Sigmoid function. Results reveal that the later performs better giving lower mean squared error on the output.

  7. Nilotinib-Associated Destructive Thyroiditis

    Directory of Open Access Journals (Sweden)

    Suhalia Bakerywala

    2015-01-01

    Full Text Available Protein tyrosine kinase inhibitors are currently an important drug class in the treatment of leukemia. They represent targeted cancer therapy and have become the treatment of choice in chronic myeloid leukemia. Tyrosine kinases are enzymes expressed in multiple tissues and are involved in several signaling pathways influencing cellular growth. Below we describe a patient who developed an unusual complication of tyrosine kinase inhibitor therapy: thyrotoxicosis due to destructive thyroiditis. We review the pathophysiology of tyrosine kinase inhibitor-induced thyroid dysfunction particularly with regard to new second-generation tyrosine kinase inhibitors.

  8. Creative destruction and export patterns

    DEFF Research Database (Denmark)

    Hansen, Jørgen Drud; Kvedaras, Virmantas; Nielsen, Jørgen Ulff-Møller

    2014-01-01

    varieties obsolete. For a given technology (variety) production costs decrease after an infant period due to learning. While all firms are assumed to be symmetric in a life-cycle perspective, at a given point in time firms of different ages differ in productivity, firm size, product quality, and export...... behavior. The model highlights a process of creative destruction, which allows firms to produce in a finite span of periods determined by the intensity of product and process innovations. The model predicts a wide range of export behavior of the individual firm during its life cycle depending...

  9. Problem-Solving Skills Among Precollege Students in Clinical Immunology and Microbiology: Classifying Strategies with a Rubric and Artificial Neural Network Technology

    Science.gov (United States)

    KANOWITH-KLEIN, SUSAN; STAVE, MEL; STEVENS, RON; CASILLAS, ADRIAN M.

    2001-01-01

    Educators emphasize the importance of problem solving that enables students to apply current knowledge and understanding in new ways to previously unencountered situations. Yet few methods are available to visualize and then assess such skills in a rapid and efficient way. Using a software system that can generate a picture (i.e., map) of students’ strategies in solving problems, we investigated methods to classify problem-solving strategies of high school students who were studying infectious and noninfectious diseases. Using maps that indicated items students accessed to solve a software simulation as well as the sequence in which items were accessed, we developed a rubric to score the quality of the student performances and also applied artificial neural network technology to cluster student performances into groups of related strategies. Furthermore, we established that a relationship existed between the rubric and neural network results, suggesting that the quality of a problem-solving strategy could be predicted from the cluster of performances in which it was assigned by the network. Using artificial neural networks to assess students’ problem-solving strategies has the potential to permit the investigation of the problem-solving performances of hundreds of students at a time and provide teachers with a valuable intervention tool capable of identifying content areas in which students have specific misunderstandings, gaps in learning, or misconceptions. PMID:23653541

  10. An Analysis of the Network Selection Problem for Heterogeneous Environments with User-Operator Joint Satisfaction and Multi-RAT Transmission

    Directory of Open Access Journals (Sweden)

    J. J. Escudero-Garzás

    2017-01-01

    Full Text Available The trend in wireless networks is that several wireless radio access technologies (RATs coexist in the same area, forming heterogeneous networks in which the users may connect to any of the available RATs. The problem of associating a user to the most suitable RAT, known as network selection problem (NSP, is of capital importance for the satisfaction of the users in these emerging environments. However, also the satisfaction of the operator is important in this scenario. In this work, we propose that a connection may be served by more than one RAT by using multi-RAT terminals. We formulate the NSP with multiple RAT association based on utility functions that take into consideration both user’s satisfaction and provider’s satisfaction. As users are characterized according to their expected quality of service, our results exhaustively analyze the influence of the user’s profile, along with the network topology and the type of applications served.

  11. Gender differentiation in indirect self-destructiveness and suicide attempt methods (gender, indirect self-destructiveness, and suicide attempts).

    Science.gov (United States)

    Tsirigotis, Konstantinos; Gruszczyński, Wojciech; Tsirigotis-Maniecka, Marta

    2014-06-01

    The objective of this study is to examine the gender (sex) differentiation of indirect self-destructiveness and its manifestations as well as its relationships with suicide attempt methods in females and males. The study was conducted among 147 persons (114 females, 33 males) who attempted suicide. The research instrument was the polish version of the Chronic Self-Destructiveness Scale including Transgression and Risk, Poor Health Maintenance, Personal and Social Neglects, Lack of Planfulness, and Helplessness and Passiveness in the face of problems. Differences testing and correlation analyses were applied. Females scored higher on poor health maintenance and males scored significantly higher on personal and social neglects, lack of planfulness, and helplessness. Noteworthy is that the intensity of indirect self-destructiveness in females reached the same magnitude as in males. A number of statistically significant correlations were found between indirect self-destructiveness, or its manifestations, and the methods of suicide attempt in the two groups. Among these categories, the highest contribution was of helplessness and passiveness (both of groups), poor health maintenance (males), and personal and social neglects (females). Results of this study can be useful in the therapeutic efforts and prevention of not only indirectly self-destructive behaviours but also possible suicide attempts. Both preventive and therapeutic activities can take into account the specificity of those phenomena resulting from one's sex/gender. It is important to adapt preventive and therapeutic measures to psychological (personal) features that arise from an individual's sex/gender.

  12. A Path-Based Gradient Projection Algorithm for the Cost-Based System Optimum Problem in Networks with Continuously Distributed Value of Time

    Directory of Open Access Journals (Sweden)

    Wen-Xiang Wu

    2014-01-01

    Full Text Available The cost-based system optimum problem in networks with continuously distributed value of time is formulated as a path-based form, which cannot be solved by the Frank-Wolfe algorithm. In light of magnitude improvement in the availability of computer memory in recent years, path-based algorithms have been regarded as a viable approach for traffic assignment problems with reasonably large network sizes. We develop a path-based gradient projection algorithm for solving the cost-based system optimum model, based on Goldstein-Levitin-Polyak method which has been successfully applied to solve standard user equilibrium and system optimum problems. The Sioux Falls network tested is used to verify the effectiveness of the algorithm.

  13. Self-Destructing Dark Matter

    Energy Technology Data Exchange (ETDEWEB)

    Grossman, Yuval [Cornell U., LEPP; Harnik, Roni [Fermilab; Telem, Ofri [Cornell U., LEPP; Zhang, Yue [Northwestern U.

    2017-12-01

    We present Self-Destructing Dark Matter (SDDM), a new class of dark matter models which are detectable in large neutrino detectors. In this class of models, a component of dark matter can transition from a long-lived state to a short-lived one by scattering off of a nucleus or an electron in the Earth. The short-lived state then decays to Standard Model particles, generating a dark matter signal with a visible energy of order the dark matter mass rather than just its recoil. This leads to striking signals in large detectors with high energy thresholds. We present a few examples of models which exhibit self destruction, all inspired by bound state dynamics in the Standard Model. The models under consideration exhibit a rich phenomenology, possibly featuring events with one, two, or even three lepton pairs, each with a fixed invariant mass and a fixed energy, as well as non-trivial directional distributions. This motivates dedicated searches for dark matter in large underground detectors such as Super-K, Borexino, SNO+, and DUNE.

  14. Destruction of noise in biotelemetry.

    Science.gov (United States)

    Fraden, J

    1979-01-01

    The difference in statistical characteristics between physiological signals and noise creates the possibility of designing a selective circuit to separate signals from noise. Analysis shows that by an extremely low signal-to-noise ratio before the pulse conditioner in a biotelemetry system, the mixture of normal and spurious pulses are present at the demodulator input. The system of noise destruction analyzes the sequential distances between two following pulses and blanks all spurious pulses using the criteria of high autocorrelation of physiological signals in short intervals. Evaluation of the circuit demonstrates a dramatic increase in accuracy in the presence of strong interference because the system of noise destruction performs a linear extrapolation of free-of-noise parts of pulse flow into destroyed spaces. The equations to calculate selective thresholds and output errors are delineated. The noise destructor is especially useful in long-term monitoring and automatic data analysis because it prevents a formation of sharp noisy spikes at the biotelemetry system's output.

  15. Evaluation of nitrate destruction methods

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, P.A. [Oak Ridge National Lab., TN (United States); Kurath, D.E.; Guenther, R. [Pacific Northwest Lab., Richland, WA (United States)

    1993-03-30

    A wide variety of high nitrate-concentration aqueous mixed [radioactive and Resource Conservation and Recovery Act (RCRA) hazardous] wastes are stored at various US Department of Energy (DOE) facilities. These wastes will ultimately be solidified for final disposal, although the waste acceptance criteria for the final waste form is still being determined. Because the nitrates in the wastes will normally increase the volume or reduce the integrity of all of the waste forms under consideration for final disposal, nitrate destruction before solidification of the waste will generally be beneficial. This report describes and evaluates various technologies that could be used to destroy the nitrates in the stored wastes. This work was funded by the Department of Energy`s Office of Technology Development, through the Chemical/Physical Technology Support Group of the Mixed Waste Integrated Program. All the nitrate destruction technologies will require further development work before a facility could be designed and built to treat the majority of the stored wastes. Several of the technologies have particularly attractive features: the nitrate to ammonia and ceramic (NAC) process produces an insoluble waste form with a significant volume reduction, electrochemical reduction destroys nitrates without any chemical addition, and the hydrothermal process can simultaneously treat nitrates and organics in both acidic and alkaline wastes. These three technologies have been tested using lab-scale equipment and surrogate solutions. At their current state of development, it is not possible to predict which process will be the most beneficial for a particular waste stream.

  16. SOLUTION METHOD OF DYNAMIC ROUTING AND WAVE LENGTH ASSIGNMENT PROBLEM FOR WDM NETWORKS WITH TAKING INTO ACCOUNT FOUR-WAVE MIXING EFFECT

    Directory of Open Access Journals (Sweden)

    D. V. Ageyev

    2016-05-01

    Full Text Available The problem of dynamic route selection and wavelengths assignment in WDM networks is solved. This problem is important in WDM network management when requests are serviced for short-term connection installation and excess traffic is transferred. The proposed solution method is heuristic and is an improvement of the previously known method by taking into account the influence of four-wave mixing and using the new metric for finding the routes prospective for application. This makes it possible to reduce the probability of blocking calls during the connections at the average of 13% and the value of Q factor at 0.812.

  17. Indirect Self-Destructiveness and Emotional Intelligence.

    Science.gov (United States)

    Tsirigotis, Konstantinos

    2016-06-01

    While emotional intelligence may have a favourable influence on the life and psychological and social functioning of the individual, indirect self-destructiveness exerts a rather negative influence. The aim of this study has been to explore possible relations between indirect self-destructiveness and emotional intelligence. A population of 260 individuals (130 females and 130 males) aged 20-30 (mean age of 24.5) was studied by using the Polish version of the chronic self-destructiveness scale and INTE, i.e., the Polish version of the assessing emotions scale. Indirect self-destructiveness has significant correlations with all variables of INTE (overall score, factor I, factor II), and these correlations are negative. The intensity of indirect self-destructiveness differentiates significantly the height of the emotional intelligence and vice versa: the height of the emotional intelligence differentiates significantly the intensity of indirect self-destructiveness. Indirect self-destructiveness has negative correlations with emotional intelligence as well as its components: the ability to recognize emotions and the ability to utilize emotions. The height of emotional intelligence differentiates the intensity of indirect self-destructiveness, and vice versa: the intensity of indirect self-destructiveness differentiates the height of emotional intelligence. It seems advisable to use emotional intelligence in the prophylactic and therapeutic work with persons with various types of disorders, especially with the syndrome of indirect self-destructiveness.

  18. The Effect of Localized Damage on the Electrical Conductivity of Bare Carbon Fiber Tow and its Use as a Non-Destructive Evaluation Tool for Composite Overwrapped Pressure Vessels

    Science.gov (United States)

    Wentzel, Daniel

    2015-01-01

    Composite materials are beneficial because of their high specific strength and low weight. Safety, Destructive testing and destructive testing, Non-Destructive Testing (NDT) and Non-Destructive Evaluation (NDE). Problem: Neither NDT nor NDE can provide sufficient data to determine life expectancy or quantify the damage state of a composite material.

  19. Indirect Self-Destructiveness and Emotional Intelligence

    OpenAIRE

    Tsirigotis, Konstantinos

    2015-01-01

    While emotional intelligence may have a favourable influence on the life and psychological and social functioning of the individual, indirect self-destructiveness exerts a rather negative influence. The aim of this study has been to explore possible relations between indirect self-destructiveness and emotional intelligence. A population of 260 individuals (130 females and 130 males) aged 20?30 (mean age of 24.5) was studied by using the Polish version of the chronic self-destructiveness scale...

  20. European Non Destructive Examination Forum (ENDEF)

    Energy Technology Data Exchange (ETDEWEB)

    Deffrennes, M. [EC, DG XVII, Nuclear Energy, Brussels (Belgium); Engl, G. [Siemens AG Energieerzeugung KWU, Erlangen (Germany); Estorff, U. von [EC, JRC/IAM, Petten (Netherlands)

    1998-11-01

    ENDEF, an initiative of the European Commission, DG XVII (Energy) was well supported by the European industrial institutions working in assistance with nuclear industrial organisations in the CEEC`s (Central and Eastern European Countries) and NIS`s (New Independent States). This Forum provides effectively a platform for open discussion between representatives of industrial actors active in the NDE (Non Destructive Examination)/ISI (In Service Inspection) field with the purpose to establish a co-operation pattern between qualified representatives of the EU (European Union) industry to offer a better co-ordinated and well defined assistance to the CEEC`s and NIS in the field of NDE/ISI, and to lay the ground for further industrial co-operation. ENDEF developed a strategy to follow for the establishment of co-operation projects. This strategy is now used to understand the extent of past or present assistance projects and to identify the areas where more co-operation is needed. ENDEF encourages the creation in the NIS`s and CEEC`s of similar forums in order to increase the co-operation and co-ordination. ENDEF is also working in perfect agreement with the European Network ENIQ, piloted by the European plant operators. This identity of views lead to the leadership by the ENDEF co-ordinator of the ENIQ Task 3 involving Applications of the European Methodology for ISI qualification in the CEEC`s and NIS`s and presently fully integrated in ENDEF. (orig.)

  1. Assessment and treatment of pica and destruction of holiday decorations.

    Science.gov (United States)

    Mitteer, Daniel R; Romani, Patrick W; Greer, Brian D; Fisher, Wayne W

    2015-12-01

    Problem behavior exhibited by individuals with autism can be disruptive to family traditions, such as decorating for the holidays. We present data for a 6-year-old girl who engaged in automatically reinforced pica and destruction of holiday decorations. Treatment was evaluated within an ABCDCD reversal design. During baseline (Phases A and B), we observed elevated rates of problem behavior. We implemented differential reinforcement of alternative behavior in Phase C to teach a response to compete with problem behavior. Little change in toy play or problem behavior occurred. In Phase D, we added a facial screen to the differential reinforcement procedures, which resulted in increases in toy play and decreases in problem behavior. Findings are discussed in terms of how interventions for problem behavior can promote alternative behavior while they facilitate household activities and traditions. © Society for the Experimental Analysis of Behavior.

  2. A Branch and Bound Algorithm for the Exact Solution of the Problem of EMU Circulation Scheduling in Railway Network

    Directory of Open Access Journals (Sweden)

    Chao Lu

    2016-01-01

    Full Text Available This paper is concerned with the scheduling of Electrical Multiple Units (EMUs under the condition of their utilization on one sector or within several interacting sectors. Based on the introduction of the train connection graph which describes the possible connection relationship between trains, the integer programming model of EMU circulation planning is constructed. In order to analyzing the resolution of the model, a heuristic which shares the characteristics with the existing methods is introduced first. This method consists of two stages: one is a greedy strategy to construct a feasible circulation plan fragment, and another is to apply a stochastic disturbance to it to generate a whole feasible solution or get a new feasible solution. Then, an exact branch and bound method which is based on graph designing is proposed. Due to the complexity, the lower bound is computed through a polynomial approximation algorithm which is a modification from the one solving the degree constraint minimum 1-tree problem. Then, a branching strategy is designed to cope with the maintenance constraints. Finally, we report extensive computational results on a railway corridor in which the sectors possess the basic feature of railway networks.

  3. Can the complex networks help us in the resolution of the problem of power outages (blackouts) in Brazil?

    Energy Technology Data Exchange (ETDEWEB)

    Castro, Paulo Alexandre de; Souza, Thaianne Lopes de [Universidade Federal de Goias (UFG), Catalao, GO (Brazil)

    2011-07-01

    Full text. What the Brazilian soccer championship, Hollywood actors, the network of the Internet, the spread of viruses and electric distribution network have in common? Until less than two decade ago, the answer would be 'nothing' or 'almost nothing'. However, the answer today to this same question is 'all' or 'almost all'. The answer to these questions and more can be found through a sub-area of statistical physics | called science of complex networks that has been used to approach and study the most diverse natural and non-natural systems, such as systems/social networks, information, technological or biological. In this work we study the distribution network of electric power in Brazil (DEEB), from a perspective of complex networks, where we associate stations and/or substations with a network of vertices and the links between the vertices we associate with the transmission lines. We are doing too a comparative study with the best-known models of complex networks, such as Erdoes-Renyi, Configuration Model and Barabasi-Albert, and then we compare with results obtained in real electrical distribution networks. Based on this information, we do a comparative analysis using the following variables: connectivity distribution, diameter, clustering coefficient, which are frequently used in studies of complex networks. We emphasize that the main objective of this study is to analyze the robustness of the network DEEB, and then propose alternatives for network connectivity, which may contribute to the increase of robustness in maintenance projects and/or expansion of the network, in other words our goal is to make the network to proof the blackouts or improve the endurance the network against the blackouts. For this purpose, we use information from the structural properties of networks, computer modeling and simulation. (author)

  4. A Secure Ciphertext Self-Destruction Scheme with Attribute-Based Encryption

    Directory of Open Access Journals (Sweden)

    Tonghao Yang

    2015-01-01

    Full Text Available The secure destruction of expired data is one of the important contents in the research of cloud storage security. Applying the attribute-based encryption (ABE and the distributed hash table (DHT technology to the process of data destruction, we propose a secure ciphertext self-destruction scheme with attribute-based encryption called SCSD. In SCSD scheme, the sensitive data is first encrypted under an access key and then the ciphertext shares are stored in the DHT network along with the attribute shares. Meanwhile, the rest of the sensitive data ciphertext and the shares of access key ciphertext constitute the encapsulated self-destruction object (EDO, which is stored in the cloud. When the sensitive data is expired, the nodes in DHT networks can automatically discard the ciphertext shares and the attribute shares, which can make the ciphertext and the access key unrecoverable. Thus, we realize secure ciphertext self-destruction. Compared with the current schemes, our SCSD scheme not only can support efficient data encryption and fine-grained access control in lifetime and secure self-destruction after expiry, but also can resist the traditional cryptanalysis attack as well as the Sybil attack in the DHT network.

  5. Weapons of mass destruction, WMD.

    Science.gov (United States)

    Vogel, H

    2007-08-01

    Since the invasion into Iraq in 2003, weapons of mass destruction (WMD), have come to general notice; they include today chemical, biological, and atomic/nuclear weapons, (CW, BW, and AW). Radiological findings shall be described. X-ray findings of victims of WMD are described. From CW, own observations are reported. Examples of (possible) X-ray findings of victims of BW are described. AW may induce radiation disease. Exposure to sulfur-lost induces severe bronchitis; if the radiograph shows pulmonary infiltrations, the prognosis is bad; a late consequence maybe bronchiectasis. BW can be based on bacteria, virus or toxins. An approach of the X-ray findings for BW victims is based on the assumption that the disease induced by BW has the same (or a similar) clinic and radiology as that induced by the original microorganism or by the unchanged toxism. This approximation may have its limits, if the germ or toxin has been modified. In survivors of AW, the radiology is probably that of victims of thermal radiation and blast. WMD seem to be a real or a possible threat. They can be used in war, in terrorist attacks, in crime, and in action of secret services. In case that WMD are employed, X-ray diagnostic will be used to evaluate the prognosis (triage) and the risk of infection.

  6. Explosive destruction of 26Al

    Science.gov (United States)

    Kahl, D.; Yamaguchi, H.; Shimizu, H.; Abe, K.; Beliuskina, O.; Cha, S. M.; Chae, K. Y.; Ge, Z.; Hayakawa, S.; Kwag, M. S.; Kim, D. H.; Moon, J. Y.; Park, S. Y.; Yang, L.

    2017-09-01

    The γ -ray emission associated with the radioactive decay of 26Al is one of the key pieces of observational evidence indicating stellar nucleosynthesis is an ongoing process in our Galaxy, and it was the first such radioactivity to be detected. Despite numerous efforts in stellar modeling, observation, nuclear theory, and nuclear experiment over the past four decades, the precise sites and origin of Galactic ^{26} Al remain elusive. We explore the present experimental knowledge concerning the destruction of ^{26} Al in massive stars. The precise stellar rates of neutron-induced reactions on ^{26} Al, such as (n,p) and (n, α , have among the largest impacts on the total ^{26} Al yield. Meanwhile, reactions involving the short-lived isomeric state of ^{26} Al such as radiative proton capture are highly-uncertain at present. Although we presented on-going experimental work from n_TOF at CERN with an ^{26} Al target, the present proceeding focuses only on the ^{26} Al isomeric radioactive beam production aspect and the first experimental results at CRIB.

  7. 9 CFR 51.6 - Destruction of animals; time limit for destruction of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Destruction of animals; time limit for destruction of animals. 51.6 Section 51.6 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION... ANIMALS DESTROYED BECAUSE OF BRUCELLOSIS Indemnity for Cattle, Bison, and Swine § 51.6 Destruction of...

  8. Modelling of fiberglass pipe destruction process

    Directory of Open Access Journals (Sweden)

    А. К. Николаев

    2017-03-01

    Full Text Available The article deals with important current issue of oil and gas industry of using tubes made of high-strength composite corrosion resistant materials. In order to improve operational safety of industrial pipes it is feasible to use composite fiberglass tubes. More than half of the accidents at oil and gas sites happen at oil gathering systems due to high corrosiveness of pumped fluid. To reduce number of accidents and improve environmental protection we need to solve the issue of industrial pipes durability. This problem could be solved by using composite materials from fiberglass, which have required physical and mechanical properties for oil pipes. The durability and strength can be monitored by a fiberglass winding method, number of layers in composite material and high corrosion-resistance properties of fiberglass. Usage of high-strength composite materials in oil production is economically feasible; fiberglass pipes production is cheaper than steel pipes. Fiberglass has small volume weight, which simplifies pipe transportation and installation. In order to identify the efficiency of using high-strength composite materials at oil production sites we conducted a research of their physical-mechanical properties and modelled fiber pipe destruction process.

  9. Soil erosion and sediment yield, a double barrel problem in South Africa's only large river network without a dam

    Science.gov (United States)

    Le Roux, Jay

    2016-04-01

    Soil erosion not only involves the loss of fertile topsoil but is also coupled with sedimentation of dams, a double barrel problem in semi-arid regions where water scarcity is frequent. Due to increasing water requirements in South Africa, the Department of Water and Sanitation is planning water resource development in the Mzimvubu River Catchment, which is the only large river network in the country without a dam. Two dams are planned including a large irrigation dam and a hydropower dam. However, previous soil erosion studies indicate that large parts of the catchment is severely eroded. Previous studies, nonetheless, used mapping and modelling techniques that represent only a selection of erosion processes and provide insufficient information about the sediment yield. This study maps and models the sediment yield comprehensively by means of two approaches over a five-year timeframe between 2007 and 2012. Sediment yield contribution from sheet-rill erosion was modelled with ArcSWAT (a graphical user interface for SWAT in a GIS), whereas gully erosion contributions were estimated using time-series mapping with SPOT 5 imagery followed by gully-derived sediment yield modelling in a GIS. Integration of the sheet-rill and gully results produced a total sediment yield map, with an average of 5 300 t km-2 y-1. Importantly, the annual average sediment yield of the areas where the irrigation dam and hydropower dam will be built is around 20 000 t km-2 y-1. Without catchment rehabilitation, the life expectancy of the irrigation dam and hydropower dam could be 50 and 40 years respectively.

  10. The moderating role of social networks in the relationship between alcohol consumption and treatment utilization for alcohol-related problems

    Science.gov (United States)

    Mowbray, Orion

    2014-01-01

    Many individuals wait until alcohol use becomes severe before treatment is sought. However, social networks, or the number of social groups an individual belongs to, may play a moderating role in this relationship. Logistic regression examined the interaction of alcohol consumption and social networks as a predictor of treatment utilization while adjusting for sociodemographic and clinical variables among 1,433 lifetime alcohol-dependent respondents from wave 2 of the National Epidemiologic Survey on Alcohol Related Conditions (NESARC). Results showed that social networks moderate the relationship between alcohol consumption and treatment utilization such that for individuals with few network ties, the relationship between alcohol consumption and treatment utilization was diminished, compared to the relationship between alcohol consumption and treatment utilization for individuals with many network ties. Findings offer insight into how social networks, at times, can influence individuals to pursue treatment, while at other times, influence individuals to stay out of treatment, or seek treatment substitutes. PMID:24462223

  11. PEROXIDE DESTRUCTION TESTING FOR THE 200 AREA EFFLUENT TREATMENT FACILITY

    Energy Technology Data Exchange (ETDEWEB)

    HALGREN DL

    2010-03-12

    The hydrogen peroxide decomposer columns at the 200 Area Effluent Treatment Facility (ETF) have been taken out of service due to ongoing problems with particulate fines and poor destruction performance from the granular activated carbon (GAC) used in the columns. An alternative search was initiated and led to bench scale testing and then pilot scale testing. Based on the bench scale testing three manganese dioxide based catalysts were evaluated in the peroxide destruction pilot column installed at the 300 Area Treated Effluent Disposal Facility. The ten inch diameter, nine foot tall, clear polyvinyl chloride (PVC) column allowed for the same six foot catalyst bed depth as is in the existing ETF system. The flow rate to the column was controlled to evaluate the performance at the same superficial velocity (gpm/ft{sup 2}) as the full scale design flow and normal process flow. Each catalyst was evaluated on peroxide destruction performance and particulate fines capacity and carryover. Peroxide destruction was measured by hydrogen peroxide concentration analysis of samples taken before and after the column. The presence of fines in the column headspace and the discharge from carryover was generally assessed by visual observation. All three catalysts met the peroxide destruction criteria by achieving hydrogen peroxide discharge concentrations of less than 0.5 mg/L at the design flow with inlet peroxide concentrations greater than 100 mg/L. The Sud-Chemie T-2525 catalyst was markedly better in the minimization of fines and particle carryover. It is anticipated the T-2525 can be installed as a direct replacement for the GAC in the peroxide decomposer columns. Based on the results of the peroxide method development work the recommendation is to purchase the T-2525 catalyst and initially load one of the ETF decomposer columns for full scale testing.

  12. Photolytic AND Catalytic Destruction of Organic Waste Water Pollutants

    Science.gov (United States)

    Torosyan, V. F.; Torosyan, E. S.; Kryuchkova, S. O.; Gromov, V. E.

    2017-01-01

    The system: water supply source - potable and industrial water - wastewater - sewage treatment - water supply source is necessary for water supply and efficient utilization of water resources. Up-to-date technologies of waste water biological treatment require for special microorganisms, which are technologically complex and expensive but unable to solve all the problems. Application of photolytic and catalytically-oxidizing destruction is quite promising. However, the most reagents are strong oxidizers in catalytic oxidation of organic substances and can initiate toxic substance generation. Methodic and scientific approaches to assess bread making industry influence on the environment have been developed in this paper in order to support forecasting and taking technological decisions concerning reduction of this influence. Destructive methods have been tested: ultra violet irradiation and catalytic oxidation for extraction of organic compounds from waste water by natural reagents.

  13. Non-destructive evaluation of timber structures in a historical building of Tiradentes , MG

    OpenAIRE

    Luciana Barbosa de Abreu; José Tarcísio Lima; Giovanni Francisco Rabelo; Francisco Carlos Gomes; Paulo Fernando Trugilho; Felipe de Souza Eloy

    2013-01-01

    Problems related to the durability of wood are commonly found in historical buildings structures. Preservation and conservation resolutions must be adopted, in order to avoid losses and substitutions, which mischaracterize buildings. Non-destructive methods for detecting deterioration should be used in order to substantiate decisions and increase the longevity of historical heritage. This work was carried out in order to perform non-destructive essays to infer about the integrity of a beam an...

  14. Efficient Monte Carlo sampling of inverse problems using a neural network-based forward—applied to GPR crosshole traveltime inversion

    Science.gov (United States)

    Hansen, T. M.; Cordua, K. S.

    2017-12-01

    Probabilistically formulated inverse problems can be solved using Monte Carlo-based sampling methods. In principle, both advanced prior information, based on for example, complex geostatistical models and non-linear forward models can be considered using such methods. However, Monte Carlo methods may be associated with huge computational costs that, in practice, limit their application. This is not least due to the computational requirements related to solving the forward problem, where the physical forward response of some earth model has to be evaluated. Here, it is suggested to replace a numerical complex evaluation of the forward problem, with a trained neural network that can be evaluated very fast. This will introduce a modeling error that is quantified probabilistically such that it can be accounted for during inversion. This allows a very fast and efficient Monte Carlo sampling of the solution to an inverse problem. We demonstrate the methodology for first arrival traveltime inversion of crosshole ground penetrating radar data. An accurate forward model, based on 2-D full-waveform modeling followed by automatic traveltime picking, is replaced by a fast neural network. This provides a sampling algorithm three orders of magnitude faster than using the accurate and computationally expensive forward model, and also considerably faster and more accurate (i.e. with better resolution), than commonly used approximate forward models. The methodology has the potential to dramatically change the complexity of non-linear and non-Gaussian inverse problems that have to be solved using Monte Carlo sampling techniques.

  15. Post-destructive eye surgery, associated depression at Sekuru Kaguvi Hospital Eye Unit, Zimbabwe: Pilot Study

    Directory of Open Access Journals (Sweden)

    M. M. Kawome

    2013-12-01

    Full Text Available Destructive eye surgery is associated with more complications than just loss of visual functions of the eye and aesthetics. Currently there is very little published literature on post-destructive eye surgery associated depression. Zimbabwe has been experiencing a surge in the rate of destructive eye surgery done at the National Tertiary Eye Unit. This situation could be churning out lots of unrecognized depressed clients into the community who require assistance in one form or another.Objectives: To determine the prevalence of post-destructive eye surgery associated depression among patients attending Sekuru Kaguvi Hospital Eye Unit and assess if the current management protocol of patients undergoing destructive eye surgery at the Eye Unit addresses the problem adequately.Methods: A cross-sectional study of 28 randomly selected patients who had destructive eye surgeries at Sekuru Kaguvi Hospital was conducted over five months from 1st March 2012 to end of July 2012. A structured questionnaire containing 15 questions on the following items: gender, age, diagnosis, surgical procedure done, expectations before and after surgery, adequacy of counseling given and involvement of family was used to collect data. Nine questions to assess depression were adapted from the Patient Health Questionnaire (PHQ-9.Setting:  The study was conducted at SekuruKaguvi Hospital Eye Unit, Parirenyatwa Group of Hospitals in Harare.Results:  Twenty-eight patients who underwent destructive eye surgery during the study period were selected using systematic random sampling. The gender ratio was 1:1 and the mean age was 38.7 years with a range from 24 to 65 years. Fifty percent of the patients in the study had orbital exenteration while the rest had enucleation (14% and evisceration (36%. Twenty-eight percent of the study population had depression.Conclusion: Destructive eye surgery is frequently associated with depression and our current management protocol of patients

  16. TECHNOLOGIES FOR CFC/HALON DESTRUCTION

    Science.gov (United States)

    The report presents an overview of the current status of possible technologies used to destroy chlorofluorocarbons (CFCs) and halons chemicals implicated in the destruction of the stratospheric ozone layer. The Montreal Protocol an international treaty to control the production a...

  17. 27 CFR 40.253 - Destruction.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY (CONTINUED) TOBACCO MANUFACTURE OF TOBACCO PRODUCTS, CIGARETTE PAPERS AND TUBES, AND... completely or by rendering them unfit for consumption. Upon completion of the destruction, the manufacturer...

  18. Gender differentiation of indirect self-destructiveness

    National Research Council Canada - National Science Library

    Tsirigotis, Konstantinos; Gruszczyński, Wojciech; Tsirigotis-Maniecka, Marta

    2013-01-01

    ... as relationships between indirect self-destructiveness and its manifestations (categories) and the psychological dimensions of masculinity and femininity, also from the point of view of assessing occupational health...

  19. THE ETHICAL ASPECT OF PEDAGOGICAL INTERACTION OF TEACHER AND STUDENTS IN SOCIAL NETWORKS: MODERN CONDITION OF THE PROBLEM

    National Research Council Canada - National Science Library

    Tatyana Alekseevna Serezhko; Zhanna Sergeyevna Kokhan

    2017-01-01

    Purpose. In article the possibility of the organization of communication of teachers of the higher school with students on social networks for increase in efficiency of educational process and self-education...

  20. The moderating role of social networks in the relationship between alcohol consumption and treatment utilization for alcohol-related problems.

    Science.gov (United States)

    Mowbray, Orion

    2014-01-01

    Many individuals wait until alcohol use becomes severe before treatment is sought. However, social networks, or the number of social groups an individual belongs to, may play a moderating role in this relationship. Logistic regression examined the interaction of alcohol consumption and social networks as a predictor of treatment utilization while adjusting for sociodemographic and clinical variables among 1,433 lifetime alcohol-dependent respondents from wave 2 of the National Epidemiologic Survey on Alcohol Related Conditions (NESARC). Results showed that social networks moderate the relationship between alcohol consumption and treatment utilization such that for individuals with few network ties, the relationship between alcohol consumption and treatment utilization was diminished, compared to the relationship between alcohol consumption and treatment utilization for individuals with many network ties. Findings offer insight into how social networks, at times, can influence individuals to pursue treatment, while at other times, influence individuals to stay out of treatment, or seek treatment substitutes. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Application of the method for analysis and solution of problems – MASP in the logistics of a big network of the retail

    Directory of Open Access Journals (Sweden)

    Milton Crispim dos Santos

    2016-11-01

    Full Text Available The objective of this study is to apply MASP in the logistics area of a supermarket belonging to a Large Retail Network, initially identifying existing problems in the company’s logistics and then solving the most severe problems according to the above mentioned tool. The research was a qualitative and exploratory case study. The data collection tool used was a questionnaire with 10 open-ended and closed-ended questions, which was distributed to 31 research subjects, composed of employees who occupy positions of management and leadership in 16 sectors of the supermarket. The results of the research identified 11 problems in logistics , with the most relevant being excess stock, which was addressed by the MASP tool through the implementation of 8 steps, aided by other quality tools already established in the literature.

  2. Theory of mind mediates the prospective relationship between abnormal social brain network morphology and chronic behavior problems after pediatric traumatic brain injury.

    Science.gov (United States)

    Ryan, Nicholas P; Catroppa, Cathy; Beare, Richard; Silk, Timothy J; Crossley, Louise; Beauchamp, Miriam H; Yeates, Keith Owen; Anderson, Vicki A

    2016-04-01

    Childhood and adolescence coincide with rapid maturation and synaptic reorganization of distributed neural networks that underlie complex cognitive-affective behaviors. These regions, referred to collectively as the 'social brain network' (SBN) are commonly vulnerable to disruption from pediatric traumatic brain injury (TBI); however, the mechanisms that link morphological changes in the SBN to behavior problems in this population remain unclear. In 98 children and adolescents with mild to severe TBI, we acquired 3D T1-weighted MRIs at 2-8 weeks post-injury. For comparison, 33 typically developing controls of similar age, sex and education were scanned. All participants were assessed on measures of Theory of Mind (ToM) at 6 months post-injury and parents provided ratings of behavior problems at 24-months post-injury. Severe TBI was associated with volumetric reductions in the overall SBN package, as well as regional gray matter structural change in multiple component regions of the SBN. When compared with TD controls and children with milder injuries, the severe TBI group had significantly poorer ToM, which was associated with more frequent behavior problems and abnormal SBN morphology. Mediation analysis indicated that impaired theory of mind mediated the prospective relationship between abnormal SBN morphology and more frequent chronic behavior problems. Our findings suggest that sub-acute alterations in SBN morphology indirectly contribute to long-term behavior problems via their influence on ToM. Volumetric change in the SBN and its putative hub regions may represent useful imaging biomarkers for prediction of post-acute social cognitive impairment, which may in turn elevate risk for chronic behavior problems. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  3. Climate and trade policies: from mutual destruction to mutual support

    OpenAIRE

    MESSERLIN, Patrick

    2012-01-01

    There is no doubt that trade and climate policies can be mutually destructive. But there are three strong reasons to suggest that they can also be mutually supportive: they have a common problem, common foes, and common friends. Mutual support would be much stronger if the world regimes for these two policies shared a few common principles. The climate community should feel at ease with the broad WTO principles of ‘national treatment’ and ‘most-favoured nation’, and rely on them in building i...

  4. The Influence of Identity Solves the Problems of Management of the Communities in the Network Societies More Effectively

    Directory of Open Access Journals (Sweden)

    Benas Brunalas

    2015-02-01

    Full Text Available The two scientific perspectives that compete in social sciences – positivism and postpositivism – present two different perceptions of the realities and their interpretations. The logic of the two different positions perceives identity and the ratio of structure to a unit differently. From positivist perspective, the dominating statements propose that preconceived and ‘stationary’ structures, the states of units of structures and identities exist, whereas post-positivism approach suggests that a circulation of units, structures and identities is a constant action.An aspiration to strictly conform to the logic of one or the other scientific paradigm, while forming ontological and epistemological positions, leads to dead-end, and the initial aspiration of a scientific theory – practical benefit – remains unfulfilled. A way out of this ‘theoretical maze’ is assisted by propositions of scientific realism, which allows combining positions, while adjusting the attitudes of positivism and post-positivism which look contradictory from a standpoint. These propositions follow subjectivistic ontology; however, they deny the fact that it necessarily has to implicate positivistic epistemology. By using the statements of scientific realism, the article justifies a transitional way between the two camps (positivism and post-positivism, while arguing that only by integrating different positions, the research of identity that points to practice is possible. This is especially relevant during the analysis of the structure and the ratio of the structure to a unit.The article holds an attitude that a network society, which has a fresh quality and highlights a double-sided relationship of the structure and a unit of the structure, has been developing in the 21st century. The specific structure of the network is a decentralized structure, which power center can be perceived as an actual network’s self-regulating mode, which ‘indicates’ and

  5. Developing student engagement in networked teaching and learning practices through problem- and project-based learning approaches

    DEFF Research Database (Denmark)

    Lerche Nielsen, Jørgen; Andreasen, Lars Birch

    2012-01-01

    This paper focuses on how learner engagement can be facilitated through use of social media and communication technologies. The discussions are based on the Danish Master’s Programme of ICT and Learning (MIL), where students study in groups within a networked learning structure. The paper reflect...... on the challenges for students as both independent and interconnected learners.......This paper focuses on how learner engagement can be facilitated through use of social media and communication technologies. The discussions are based on the Danish Master’s Programme of ICT and Learning (MIL), where students study in groups within a networked learning structure. The paper reflects...

  6. [Role of the social support network which influences age of death and physical function of elderly people: study of trends in and outside of Japan and future problems].

    Science.gov (United States)

    Kishi, Reiko; Horikawa, Naoko

    2004-02-01

    Concerning associations between the social support network and physical health of the elderly, longitudinal studies have been conducted using various measurement indexes. The studies indicated that the support network influences on physical function and life expectancy. In this study we compared research papers from Japan and elsewhere that appeared after 1980, from the viewpoint of 1) social support effects, and 2) social network effects, to examine potential problems in the future. The main knowledge obtained was that the receipt of emotional support, wide network size, and participation in social activities reduced the risk of early death and decrease in physical function of elderly people. Sex differences were indicated, and in many cases, the effects were more remarkable in men than women. In addition the positive influence of receiving help from a support network, a major subject of conventional research, the effects of offering help to others and negative findings were also examined. It has been indicated that participation in volunteer groups and offer of support to other people can prevent decrease in physical function or early death. As negative effects, improper instrumental support rather disturbs the mental and physical independence of elderly people. As future issues, it is necessary to focus on both positive/negative and receipt/offer effects of support network, and to clarify how to provide example which best match the life of elderly people by comparing sexes and regions. It is also important to actually apply the knowledge gained from observational studies to prevent the elderly from becoming a condition requiring care, and to develop intervention studies which can increase the social contacts of elderly people at the same time as conducting health education and medical treatment.

  7. Introduction to neural networks

    CERN Document Server

    James, Frederick E

    1994-02-02

    1. Introduction and overview of Artificial Neural Networks. 2,3. The Feed-forward Network as an inverse Problem, and results on the computational complexity of network training. 4.Physics applications of neural networks.

  8. Floyd-A∗ Algorithm Solving the Least-Time Itinerary Planning Problem in Urban Scheduled Public Transport Network

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2014-01-01

    Full Text Available We consider an ad hoc Floyd-A∗ algorithm to determine the a priori least-time itinerary from an origin to a destination given an initial time in an urban scheduled public transport (USPT network. The network is bimodal (i.e., USPT lines and walking and time dependent. The modified USPT network model results in more reasonable itinerary results. An itinerary is connected through a sequence of time-label arcs. The proposed Floyd-A∗ algorithm is composed of two procedures designated as Itinerary Finder and Cost Estimator. The A∗-based Itinerary Finder determines the time-dependent, least-time itinerary in real time, aided by the heuristic information precomputed by the Floyd-based Cost Estimator, where a strategy is formed to preestimate the time-dependent arc travel time as an associated static lower bound. The Floyd-A∗ algorithm is proven to guarantee optimality in theory and, demonstrated through a real-world example in Shenyang City USPT network to be more efficient than previous procedures. The computational experiments also reveal the time-dependent nature of the least-time itinerary. In the premise that lines run punctually, “just boarding” and “just missing” cases are identified.

  9. Socio-technical networks: how a technology studies approach may help to solve problems related to technical change

    NARCIS (Netherlands)

    Elzen, Boelem; Enserink, Bert; Enserink, B.; Smit, Willem A.

    1996-01-01

    This paper is motivated by a desire to deal with the problematic aspects of technical development. To achieve this, we need a new approach to the analysis of socio-technical change. In this paper we develop such an approach, called the `Socio-Technical Networks' (STN) approach. The basic concepts of

  10. The Information Aspect of Extremism and Terrorism and the Destructive Trends in the Mass Media

    Directory of Open Access Journals (Sweden)

    E V Nekrasova

    2013-12-01

    Full Text Available The article is devoted to the problem of destructive trends in modern Russian mass media as well as to the information component in the activities of extremist and terrorist organizations. The destructive trends in the mass media manifest themselves in the escalation of animosity, aggression, creation of the cult of violence and xenophobia moods. Terrorist organizations use the mass media for their own purposes: they create the atmosphere of fear and tension in society, recruit new followers, mainly among the youth, which is a serious problem. It is important to use the positive potential of the mass media to counteract extremism and terrorism.

  11. A model for distribution centers location-routing problem on a multimodal transportation network with a meta-heuristic solving approach

    Science.gov (United States)

    Fazayeli, Saeed; Eydi, Alireza; Kamalabadi, Isa Nakhai

    2017-07-01

    Nowadays, organizations have to compete with different competitors in regional, national and international levels, so they have to improve their competition capabilities to survive against competitors. Undertaking activities on a global scale requires a proper distribution system which could take advantages of different transportation modes. Accordingly, the present paper addresses a location-routing problem on multimodal transportation network. The introduced problem follows four objectives simultaneously which form main contribution of the paper; determining multimodal routes between supplier and distribution centers, locating mode changing facilities, locating distribution centers, and determining product delivery tours from the distribution centers to retailers. An integer linear programming is presented for the problem, and a genetic algorithm with a new chromosome structure proposed to solve the problem. Proposed chromosome structure consists of two different parts for multimodal transportation and location-routing parts of the model. Based on published data in the literature, two numerical cases with different sizes generated and solved. Also, different cost scenarios designed to better analyze model and algorithm performance. Results show that algorithm can effectively solve large-size problems within a reasonable time which GAMS software failed to reach an optimal solution even within much longer times.

  12. Improvement of reliability of molecular DNA computing: solution of inverse problem of Raman spectroscopy using artificial neural networks

    Science.gov (United States)

    Dolenko, T. A.; Burikov, S. A.; Vervald, E. N.; Efitorov, A. O.; Laptinskiy, K. A.; Sarmanova, O. E.; Dolenko, S. A.

    2017-02-01

    Elaboration of methods for the control of biochemical reactions with deoxyribonucleic acid (DNA) strands is necessary for the solution of one of the basic problems in the creation of biocomputers—improvement in the reliability of molecular DNA computing. In this paper, the results of the solution of the four-parameter inverse problem of laser Raman spectroscopy—the determination of the type and concentration of each of the DNA nitrogenous bases in multi-component solutions—are presented.

  13. “Q-Feed”—An Effective Solution for the Free-Riding Problem in Unstructured P2P Networks

    Directory of Open Access Journals (Sweden)

    Sabu M. Thampi

    2010-01-01

    Full Text Available This paper presents a solution for reducing the ill effects of free-riders in decentralised unstructured P2P networks. An autonomous replication scheme is proposed to improve the availability and enhance system performance. Q-learning is widely employed in different situations to improve the accuracy in decision making by each peer. Based on the performance of neighbours of a peer, every neighbour is awarded different levels of ranks. At the same time a low-performing node is allowed to improve its rank in different ways. Simulation results show that Q-learning-based free riding control mechanism effectively limits the services received by free-riders and also encourages the low-performing neighbours to improve their position. The popular files are autonomously replicated to nodes possessing required parameters. Due to this improvement of quantity of popular files, free riders are given opportunity to lift their position for active participation in the network for sharing files. Q-feed effectively manages queries from free riders and reduces network traffic significantly.

  14. BEHAVIOR OF CRACKED EGGS AT NON – DESTRUCTIVE IMPACT

    Directory of Open Access Journals (Sweden)

    Jana Strnková

    2014-02-01

    Full Text Available The influence of cracks on the dynamical frequency response of eggshells was studied. The non-destructive impact tests of the intact and cracked eggs were performed. Record of impact force time history was enabled by experimental device. Response of eggshell to the impact was described by the surface displacement of the eggshell. This response was measured by the laser interferometry. The force and response were also expressed in the frequency domain using of the fast Fourier transform. Both time and frequency response were affected by the presence of cracks. It was shown that the influence of cracks on the eggshell response was more effectively described in the frequency domain. The frequency response was relatively very sensitive to the position and orientation of cracks. The frequency response function was characterized by many peaks. Five excitation resonant frequency characteristic of signals were extracted based on the difference of frequency domain response signals. Distinction between intact and cracked eggs was enabled by these parameters. Even if some main problems were solved some of them remained unsolved. One of them was the effect of the impacting body r shape. This problem could be effectively solved namely using of numerical methods. In order to describe the response of eggshell response to the non-destructive impact using of the numerical simulation exact description of eggshell shape was performed. This numerical simulation will be subject of forthcoming paper.

  15. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  16. Network Cosmology

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S.; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology. PMID:23162688

  17. Avoidant personality problems--their association with somatic and mental health, lifestyle, and social network. A community-based study.

    Science.gov (United States)

    Olssøn, Ingrid; Dahl, Alv A

    2012-08-01

    The aim of the study was to explore the associations between the presence of avoidant personality problems (APPs) and 5 areas of impairment: demography, somatic issues, mental health, lifestyle, and social issues. Avoidant personality problem was defined by confirmation of the 2 avoidant personality disorder items of the Iowa Personality Disorder Screen and and the Social Phobia Inventory (SPIN) short version (MINI-SPIN) screening assessment for generalized social anxiety disorder sum score of 6 or more. The questionnaires were administered in a Norwegian population survey (the Oslo Health Study-HUBRO). Cases consisted of 280 individuals with APP and 5 randomly selected controls without APP (n = 1400). The APP group more frequently reported living alone, lower level of education, and lower income than controls. Poor self-rated health, presence of somatic disease, muscular pain, frequent use of analgesics, and visits at a general practitioner were significantly more common in the APP group than among controls. The APP group had significantly higher proportion of caseness of mental distress, low general self-efficacy, and insomnia, and this result held up in multivariate analyses. The APP group showed statistically significant higher proportions of physical inactivity, obesity, daily smoking, and alcohol problems compared with controls. As for social impairment, a significantly higher proportion of the APP group reported "not having enough good friends," "high powerlessness," and low community activism, and the 2 former variables held up in multivariate analyses. In this population-based study, we found that high levels of APP, defined closely to avoidant personality disorder, were significantly associated with demographic, somatic, and mental impairment; low general self-efficacy; and insomnia affecting work ability. In addition, APP showed associations with negative lifestyle, alcohol problems, and social impairment reporting lack of good friends and lack of

  18. Non-destructive Testing of Pipelines

    CERN Document Server

    Annila, L

    2001-01-01

    This paper shall present different, contemporarily available non-destructive testing (NDT) methods of pipelines and compare them to each other from the technical and economical point of view. An evaluation of their suitability for CERN activities, based on the opinions and experience of various specialists at CERN (LHC, ST, TIS), is also introduced.

  19. Creative Destruction in Libraries: Designing our Future

    Directory of Open Access Journals (Sweden)

    Caro Pinto

    2013-11-01

    Full Text Available In Brief: Joseph Schumpeter defines creative destruction as a “process of industrial mutation that incessantly revolutionizes the economic structure from within, incessantly destroying the old one, incessantly creating a new one.” As libraries struggle with how to position themselves to thrive in the digital age, how can we balance the traditional elements of librarianship like […

  20. Climatology of destructive hailstorms in Brazil

    Science.gov (United States)

    Martins, Jorge A.; Brand, Veronika S.; Capucim, Mauricio N.; Felix, Rafael R.; Martins, Leila D.; Freitas, Edmilson D.; Gonçalves, Fabio L. T.; Hallak, Ricardo; Dias, Maria A. F. Silva; Cecil, Daniel J.

    2017-02-01

    Hail is considered to be among the most complex extreme weather phenomena of the atmosphere. Every year, notably in the southern Brazilian States, destructive hailstorms result in serious economic losses and cause a great social impact destroying crops, homes, medical facilities and schools. The aim of this study is to document the spatial, annual, and diurnal variation in destructive hailstorm frequency during a 22 year period from 1991 to 2012 in Brazil. The analysis is based on a collection of reports released by the Brazilian National Civil Protection Secretariat - SEDEC. Based on reports of emergency assistance given to the population affected by a disaster, the information discussed in this work is assumed as representative only of destructive hailstorms. The analysis reveals a large spatial variability, with the majority of hailstorm occurrences distributed in the three southernmost Brazilian States. Within those states, the number of hail reports was observed to increase with increasing population density in rural areas. Hailstorms were reported most often in the late afternoon and evening of the winter/spring transition, in agreement with a few other areas in the subtropics with available studies, but different from the majority of studies for temperate zones, which suggest spring/summer as the hail season. Although the results show some discrepancies compared to satellite hail signatures, the findings of this work confirm that southern Brazil is a region prone to the development of strong convective storms, with high annual numbers of destructive hail events.

  1. 32 CFR 644.497 - Destruction.

    Science.gov (United States)

    2010-07-01

    ... of funds for destruction of improvements which have no sale or salvage value. Accordingly, where such... appropriate Army of Air Force command for disposal action under AR 405-90 or AFR 87-4 as appropriate. However... offered for sale which are more attractive improvements without an expenditure of Government funds. ...

  2. Large destructive facial hemangioma in PHACE syndrome

    Directory of Open Access Journals (Sweden)

    Nagdeve N

    2009-01-01

    Full Text Available We report an infant who presented with large facial hemangioma associated with Dandy-Walker cyst and atrial septal defect. This case is peculiar in that the large facial hemangioma in posterior fossa malformations, hemangiomas, arterial anomalies, coarctation of aorta and other cardiac defects (PHACE syndrome resulted in massive tissue destruction.

  3. Phenomenology of love: The Destructive and Constructive Nature of Love

    Directory of Open Access Journals (Sweden)

    Alireza Farnam

    2017-12-01

    Full Text Available Love, this eminent humane experience, has been explored not only by writers and poets, but also by philosophers, psychologists and even experimental scientists. This paper aims to discuss a novel aspect in phenomenology of love, as the concept of destructive and constructive nature of love, which is to the best of our knowledge, presented for the first time. The fundamental idea of this paper was obtained from verses of Hafiz, then polished by theories of Robert Cloninger and several other thinkers in the field of human emotions. Many verses of Hafiz display love experience as a necessary step towards growth, in a way that could be evinced further by the development of the "self-aware psych" introduced by Cloninger. He introduces the "self-aware psych" as one of the three constituting domains of human mind and personality, the intuitive essence bringing integrity for personality. If self-aware psych flourishes by favorable growth and development, it would prepare the ground for creativity, wisdom and well-being, otherwise, personality disorders would be contingent. The destructive and constructive nature of love, towards development of self-awareness and mental growth, is further determined by re-explaining the proposed theory of "ego as a complex" by Carl Jung, the theory of "network of intentionality" by John Searle, and the theory of "emotional processing" by Edna Foa and Michael Kozak in this context.

  4. Empirical confirmation of creative destruction from world trade data.

    Directory of Open Access Journals (Sweden)

    Peter Klimek

    Full Text Available We show that world trade network datasets contain empirical evidence that the dynamics of innovation in the world economy indeed follows the concept of creative destruction, as proposed by J.A. Schumpeter more than half a century ago. National economies can be viewed as complex, evolving systems, driven by a stream of appearance and disappearance of goods and services. Products appear in bursts of creative cascades. We find that products systematically tend to co-appear, and that product appearances lead to massive disappearance events of existing products in the following years. The opposite-disappearances followed by periods of appearances-is not observed. This is an empirical validation of the dominance of cascading competitive replacement events on the scale of national economies, i.e., creative destruction. We find a tendency that more complex products drive out less complex ones, i.e., progress has a direction. Finally we show that the growth trajectory of a country's product output diversity can be understood by a recently proposed evolutionary model of Schumpeterian economic dynamics.

  5. INVESTIGATION OF THE MODEL FOR DYNAMICS OF DESTRUCTIVE INFORMATION AND PSYCHOLOGICAL INFLUENCE ON MASS CONSCIOUSNESS

    Directory of Open Access Journals (Sweden)

    V. A. Minaev

    2016-12-01

    Full Text Available The article examines a mathematical model of destructive information-psychological influence (IPI dynamics on mass consciousness. It is shown that a model taking into account three main processes - informational influence on mass consciousness of interpersonal communication, mass media, effect of influence forgetting - has solution in the form of a generalized logistic curve. Given a statistical distribution over time of society individuals, who share ideas of IPI, which qualitatively confirms a formal decision model, presented in the form of nonlinear differential equations describing of innovation diffusion. Investigated special cases of the model, which in all cases confirmed existence of asymptotic stationary solutions. To use the model in practice to analyze and predict characteristics of IPI on society, and, ultimately, to control this effect, estimation of its parameters based on statistical data. Accented that the development of the model is essential in modern conditions complicate the problem of ensuring cyber security of the state, society and every individual member of society, including considering the development of social networks.

  6. 28 CFR 25.9 - Retention and destruction of records in the system.

    Science.gov (United States)

    2010-07-01

    ... inquiry, header, message key, ORI or FFL identifier, and inquiry/response data (including the name and... in resolving operational problems, support the appeals process, or support audits of the use and... Brady Act's requirements for destruction: (1) All inquiry and response messages (regardless of media...

  7. Roots of Sin and Destruction of the Religious Education in the Shia Belief

    Science.gov (United States)

    Sadeghiyan, Mehri

    2016-01-01

    The religious Education is one of the key components of the present age detachment from which poses numerous problems for the society Islamic. One of the factors effective in the destruction of the religious Education is the roots of sin avoiding which can lead to the improvement of the religious Education of the members of the society. Thus, the…

  8. Application of Cellular Technologies to the Experimental Treatment of Destructive Inflammatory Arthropathies

    Directory of Open Access Journals (Sweden)

    Marzhan Kaulambayeva

    2014-12-01

    Full Text Available Introduction. The treatment of destructive inflammatory joint diseases (arthropathies is one of the issues of current interest in modern medicine. In destructive inflammatory diseases, the regenerative ability of cartilaginous tissue proves to be inadequate for neogenesis of joints. The goal of this study is to determine the efficacy of bone marrow-derived mononuclear cell fraction (MNC and multipotent mesenchymal stromal cells (MMSC in the treatment of destructive inflammatory joint diseases.Materials and methods. The study subjects consisted of 15 male rabbits weighing 3-4 kg with experimental destructive inflammatory knee joint disease. The test animals were divided into 3 groups: reference group without treatment, first test group – introduction of autologous MNC from rabbit bone marrow into the affected joint, and second test group – introduction of cultured MMSC from rabbit bone marrow into the joint.Results. A morphological examination of the synovial membranes in the reference group on the 40th day of the experiment revealed chronic synovitis with destruction of synoviocytes, thickening and inflammatory infiltration of the underlying connective tissue (subintima. During examination of synovial membranes in the first test group the patches of thickened regenerating inner layer (intima made up by large proliferating synoviocytes were observed. The layer of loose connective tissue (subintima contained a large number of small blood vessels and was only slightly infiltrated by inflammatory cells. The morphological examination of synovial membranes in the second test group discovered thickened regenerating intimal layer sitting on hypertrophied subintima with dense vascular network. Elastic collagenous layers of synovial membrane adjoined proliferating elements in cartilage plates.Conclusion. Both autologous MNC fraction and MMSC from bone marrow proved effectiveness in the treatment of destructive inflammatory joint diseases which

  9. An adaptive recurrent neural-network controller using a stabilization matrix and predictive inputs to solve a tracking problem under disturbances.

    Science.gov (United States)

    Fairbank, Michael; Li, Shuhui; Fu, Xingang; Alonso, Eduardo; Wunsch, Donald

    2014-01-01

    We present a recurrent neural-network (RNN) controller designed to solve the tracking problem for control systems. We demonstrate that a major difficulty in training any RNN is the problem of exploding gradients, and we propose a solution to this in the case of tracking problems, by introducing a stabilization matrix and by using carefully constrained context units. This solution allows us to achieve consistently lower training errors, and hence allows us to more easily introduce adaptive capabilities. The resulting RNN is one that has been trained off-line to be rapidly adaptive to changing plant conditions and changing tracking targets. The case study we use is a renewable-energy generator application; that of producing an efficient controller for a three-phase grid-connected converter. The controller we produce can cope with the random variation of system parameters and fluctuating grid voltages. It produces tracking control with almost instantaneous response to changing reference states, and virtually zero oscillation. This compares very favorably to the classical proportional integrator (PI) controllers, which we show produce a much slower response and settling time. In addition, the RNN we propose exhibits better learning stability and convergence properties, and can exhibit faster adaptation, than has been achieved with adaptive critic designs. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. High-Speed Rail Train Timetabling Problem: A Time-Space Network Based Method with an Improved Branch-and-Price Algorithm

    Directory of Open Access Journals (Sweden)

    Bisheng He

    2014-01-01

    Full Text Available A time-space network based optimization method is designed for high-speed rail train timetabling problem to improve the service level of the high-speed rail. The general time-space path cost is presented which considers both the train travel time and the high-speed rail operation requirements: (1 service frequency requirement; (2 stopping plan adjustment; and (3 priority of train types. Train timetabling problem based on time-space path aims to minimize the total general time-space path cost of all trains. An improved branch-and-price algorithm is applied to solve the large scale integer programming problem. When dealing with the algorithm, a rapid branching and node selection for branch-and-price tree and a heuristic train time-space path generation for column generation are adopted to speed up the algorithm computation time. The computational results of a set of experiments on China’s high-speed rail system are presented with the discussions about the model validation, the effectiveness of the general time-space path cost, and the improved branch-and-price algorithm.

  11. Destructive aneurysmal bone cyst of the mandible.

    Science.gov (United States)

    de Santana Santos, Thiago; de Carvalho Raimundo, Ronaldo; Martins-Filho, Paulo Ricardo Saquete; de Souza de Andrade, Emanuel Sávio; de Oliveira E Silva, Emanuel Dias; Gomes, Ana Cláudia Amorim

    2013-03-01

    Aneurysmal bone cyst (ABC) is an uncommon osteolytic lesion of the bones, usually affecting the long bones and spine. The lesion is rare in the jaws and is found most commonly in the body and ramus of the mandible. In some cases, ABCs may be present as rdestructive lesions simulating malignancies. In these cases, a careful diagnosis should be done, including in the differential diagnosis malignant tumors such as telangiectasic osteosarcoma and intraosseous fibrosarcoma. Removing the lesion is usually easy if it is confined within the bone, but it may prove difficult if the lesions are multilocular, expansive, divided by multiple bony septa, or destructive or when the cortical is perforated. Therefore, the surgical treatment of the destructive ABCs should be more radical.

  12. Study of thermal destruction of lignin

    Energy Technology Data Exchange (ETDEWEB)

    Reti, M.; Hojnos, J.

    1979-01-01

    Using thermofractography, infra- and mass-spectrometry and other techniques thermal destruction of lignin was investigated at a temp. range of 200 to 500/sup 0/C. At temp. from 225 to 330/sup 0/C first of all splitting of ..beta..-aryil- and benzyl-ether binds between principal phenylpropane links of lignin, thus forming derivative phenols, vinyl guaiacol, coinferyl alcohol and aldehyde and respective syringic derivatives. At temp. of 350/sup 0/C splitting of C-C connections occurs in the lateral chain, forming guaiacol, 2,6-dimetoxiphenol and their saturated 4-alkyl derivatives. With a speeded up pyrolysis process, thermal destruction of lignin occurs at temp. of greater than or equal to 400/sup 0/C, with 62% of overall quantity derived at 500-550/sup 0/C with an overall tar release of about 30.

  13. Non-destructive imaging of optical nanofibres

    CERN Document Server

    Madsen, Lars S; Rubinsztein-Dunlop, Halina; Bowen, Warwick P

    2016-01-01

    Single-mode optical nanofibres are a central component of a broad range of applications and emerging technologies. Their fabrication has been extensively studied over the past decade, but imaging of the final sub-micrometre products has been restricted to destructive or low-precision techniques. Here we demonstrate an optical scattering-based scanning method that uses a probe nanofibre to locally scatter the evanescent field of a sample nanofibre. The method does not damage the sample nanofibre and is easily implemented only using the same equipment as in a standard fibre puller setup. We demonstrate sub-nanometre radial resolution at video rates (0.7 nm in 10 ms) on single mode nanofibres, allowing for a complete high-precision profile to be obtained within minutes of fabrication. The method thus enables non-destructive, fast and precise characterisation of optical nanofibers, with applications ranging from optical sensors and cold atom traps to non-linear optics.

  14. Consumer showrooming: value co-destruction

    OpenAIRE

    Daunt, Kate; Harris, Lloyd

    2017-01-01

    Purpose This research employs value co-destruction as a theoretical lens to investigate the antecedents\\ud of consumer showrooming behavior. Drawing on relevant literature, a research model specifying\\ud showrooming dynamics from the consumer’s perspective is conceptualized and empirically tested.\\ud Methodology Utilizing survey data from 275 consumers, structural equation modelling is employed\\ud to assess a research model including thirteen hypotheses.\\ud Findings The study findings reveal ...

  15. Non-destructive profilometry of optical nanofibres

    OpenAIRE

    Madsen, Lars S.; Baker, Christopher; Rubinsztein-Dunlop, Halina; Bowen, Warwick P.

    2016-01-01

    Single-mode optical nanofibres are a central component of a broad range of applications and emerging technologies. Their fabrication has been extensively studied over the past decade, but imaging of the final sub-micrometre products has been restricted to destructive or low-precision techniques. Here we demonstrate an optical scattering-based scanning method that uses a probe nanofibre to locally scatter the evanescent field of a sample nanofibre. The method does not damage the sample nanofib...

  16. Characterizing Destructive Quantum Interference in Electron Transport

    OpenAIRE

    Sam-ang, Panu; Reuter, Matthew G.

    2017-01-01

    Destructive quantum interference in electron transport through molecules provides an unconventional route for suppressing electric current. In this work we introduce "interference vectors" for each interference and use them to characterize the interference. An interference vector may be an orbital of the bare molecule, in which case the interference is very sensitive to perturbation. In contrast, an interference vector may be a combination of multiple molecular orbitals, leading to more robus...

  17. [Computer tomographic findings in sacral destruction].

    Science.gov (United States)

    Heller, M; Grabbe, E; Hagemann, J; Jend, H H

    1981-06-01

    The diagnostic significance of computerized tomography in the diagnosis of destructive and deforming processes of the sacrum is demonstrated by means of 69 examinations of 55 patients. The results are compared with those obtained by means of conventional roentgenography, including tomography and bone scintigraphy. It is confirmed that recent CT scanners are the most sensitive instruments in existence for the visualization of affections of the sacrum in respect to identification and extension.

  18. Catalytic Destruction of Chlorinated Volatile Organic Compounds

    Science.gov (United States)

    1993-08-01

    13X Molecular Sieve," J. Catal.. 50, 390 (1977). 48. Poutsma, M. L., in " Zeolite Chemistry and Catalysis", ACS Monograph 171 (Ed: Rabo, J. A...DISTRIBUTION CODE 13. A.BSTRACT (Maximum,200 words) , _ _ . _ This report gives test results for 14 different cation-modifled zeolite catalysts, all of...found that the most active cat- alysts for destruction of One-carbon VOCs were cobalt exchanged Y- zeolites , while for two-carbon VOCs, the presence

  19. An Analytic Network Process approach for the environmental aspect selection problem — A case study for a hand blender

    Energy Technology Data Exchange (ETDEWEB)

    Bereketli Zafeirakopoulos, Ilke, E-mail: ibereketli@gsu.edu.tr; Erol Genevois, Mujde, E-mail: merol@gsu.edu.tr

    2015-09-15

    Life Cycle Assessment is a tool to assess, in a systematic way, the environmental aspects and its potential environmental impacts and resources used throughout a product's life cycle. It is widely accepted and considered as one of the most powerful tools to support decision-making processes used in ecodesign and sustainable production in order to learn about the most problematic parts and life cycle phases of a product and to have a projection for future improvements. However, since Life Cycle Assessment is a cost and time intensive method, companies do not intend to carry out a full version of it, except for large corporate ones. Especially for small and medium sized enterprises, which do not have enough budget for and knowledge on sustainable production and ecodesign approaches, focusing only on the most important possible environmental aspect is unavoidable. In this direction, finding the right environmental aspect to work on is crucial for the companies. In this study, a multi-criteria decision-making methodology, Analytic Network Process is proposed to select the most relevant environmental aspect. The proposed methodology aims at providing a simplified environmental assessment to producers. It is applied for a hand blender, which is a member of the Electrical and Electronic Equipment family. The decision criteria for the environmental aspects and relations of dependence are defined. The evaluation is made by the Analytic Network Process in order to create a realistic approach to inter-dependencies among the criteria. The results are computed via the Super Decisions software. Finally, it is observed that the procedure is completed in less time, with less data, with less cost and in a less subjective way than conventional approaches. - Highlights: • We present a simplified environmental assessment methodology to support LCA. • ANP is proposed to select the most relevant environmental aspect. • ANP deals well with the interdependencies between aspects

  20. Destructive Single-Event Failures in Schottky Diodes

    Science.gov (United States)

    Casey, Megan C.; Lauenstein, Jean-Marie; Gigliuto, Robert A.; Wilcox, Edward P.; Phan, Anthony M.; Kim, Hak; Chen, Dakai; LaBel, Kenneth A.

    2014-01-01

    This presentation contains test results for destructive failures in DC-DC converters. We have shown that Schottky diodes are susceptible to destructive single-event effects. Future work will be completed to identify parameter that determines diode susceptibility.

  1. IDENTIFICATION OF GENERALIZED LINEAR LOAD IN THREE-PHASE THREE-WIRE NETWORK IN THE PROBLEM OF THE DISTRIBUTION OF ACTUAL CONTRIBUTIONS AT THE POINT OF COMMON COUPLING

    Directory of Open Access Journals (Sweden)

    Yu. L. Sayenko

    2016-12-01

    Full Text Available Purpose. To perform structural and parametric identification of generalized load equivalent circuit of three-phase three-wire load in the network in the space of phase components. Methodology. Underlying structural identification methods are matrix analysis of electrical circuits. Parametric identification is based on the basic laws of electrical engineering. Results. The structure of a generalized load equivalent circuit is composed in three independent nodes. An approximate method for determining its parameters is proposed. The estimation error determination undistorted and distorted parts of the parameters of generalized load equivalent circuit. Originality. Approximate determination of equivalent circuit parameters are based on the results of a single measurement of voltages and phase currents. Practical value. The proposed replacement structure and a method for determining its parameters of the circuit can be used in the problem of the distribution of actual contributions at the point of common coupling.

  2. Tobacco smoking and chronic destructive periodontal disease.

    Science.gov (United States)

    Bergström, Jan

    2004-09-01

    Tobacco smoking is the main risk factor associated with chronic destructive periodontal disease. No other known factor can match the strength of smoking in causing harm to the periodontium. The harmful effects manifest themselves by interfering with vascular and immunologic reactions, as well as by undermining the supportive functions of the periodontal tissues. The typical characteristic of smoking-associated periodontal disease is the destruction of the supporting tissues of the teeth, with the ensuing clinical symptoms of bone loss, attachment loss, pocket formation, and eventually tooth loss. A review of the international literature that has accumulated over the past 20 years offers convincing evidence that smokers exhibit greater bone loss and attachment loss, as well as more pronounced frequencies of periodontal pockets, than non-smokers do. In addition, tooth loss is more extensive in smokers. Smoking, thus, considerably increases the risk for destructive periodontal disease. Depending on the definition of disease and the exposure to smoking, the risk is 5- to 20-fold elevated for a smoker compared to a never-smoker. For a smoker exposed to heavy long-life smoking, the risk of attracting destructive periodontal disease is equivalent to that of attracting lung cancer. The outcome of periodontal treatment is less favorable or even unfavorable in smokers. Although long-term studies are rare, available studies unanimously agree that treatment failures and relapse of disease are predominantly seen in smokers. This contention is valid irrespective of treatment modality, suggesting that smoking will interfere with an expected normal outcome following commonplace periodontal therapies. The majority of available studies agree that the subgingival microflora of smokers and non-smokers are no different given other conditions. As a consequence, the elevated morbidity in smokers does not depend on particular microflora. The mechanisms behind the destructive effects of

  3. Non-destructive photoacoustic imaging of metal surface defects

    Science.gov (United States)

    Jeon, Seungwan; Kim, Jeesu; Yun, Jong Pil; Kim, Chulhong

    2016-11-01

    The detection of metal surface defects is important in achieving the goals of product quality enhancement and manufacturing cost reduction. Identifying the defects with visual inspection is difficult, inaccurate, and time-consuming. Thus, several inspection methods using line cameras, magnetic field, and ultrasound have been proposed. However, identifying small defects on metal surfaces remains a challenge. To deal with this problem, we propose the use of photoacoustic imaging (PAI) as a new non-destructive imaging tool to detect metal surface defects. We successfully visualized two types of cracks (i.e., unclassified and seam cracks) in metal plate samples using PAI. In addition, we successfully extracted cracked edges from height-encoded photoacoustic maximum amplitude projection images using the Laplacian of Gaussian filtering method, and then, quantified the detected edges for a statistical analysis. We concluded that PAI can be useful in detecting metal surface defects reducing the defect rate and manufacturing cost during metal production.

  4. Community Pharmacist Training-and-Communication Network and Drug-Related Problems in Patients With CKD: A Multicenter, Cluster-Randomized, Controlled Trial.

    Science.gov (United States)

    Lalonde, Lyne; Quintana-Bárcena, Patricia; Lord, Anne; Bell, Robert; Clément, Valérie; Daigneault, Anne-Marie; Legris, Marie-Ève; Letendre, Sara; Mouchbahani, Marie; Jouini, Ghaya; Azar, Joëlle; Martin, Élisabeth; Berbiche, Djamal; Beaulieu, Stephanie; Beaunoyer, Sébastien; Bertin, Émilie; Bouvrette, Marianne; Charbonneau-Séguin, Noémie; Desrochers, Jean-François; Desforges, Katherine; Dumoulin-Charette, Ariane; Dupuis, Sébastien; El Bouchikhi, Maryame; Forget, Roxanne; Guay, Marianne; Lemieux, Jean-Phillippe; Morin-Bélanger, Claudia; Noël, Isabelle; Ricard, Stephanie; Sauvé, Patricia; Ste-Marie Paradis, François

    2017-09-01

    Appropriate training for community pharmacists may improve the quality of medication use. Few studies have reported the impact of such programs on medication management for patients with chronic kidney disease (CKD). Multicenter, cluster-randomized, controlled trial. Patients with CKD stage 3a, 3b, or 4 from 6 CKD clinics (Quebec, Canada) and their community pharmacies. Each cluster (a pharmacy and its patients) was randomly assigned to either ProFiL, a training-and-communication network program, or the control group. ProFiL pharmacists completed a 90-minute interactive web-based training program on use of medications in CKD and received a clinical guide, patients' clinical summaries, and facilitated access to the CKD clinic. Drug-related problems (primary outcome), pharmacists' knowledge and clinical skills, and patients' clinical attributes (eg, blood pressure and glycated hemoglobin concentration). Drug-related problems were evaluated the year before and after the recruitment of patients using a validated set of significant drug-related problems, the Pharmacotherapy Assessment in Chronic Renal Disease (PAIR) criteria. Pharmacists' questionnaires were completed at baseline and after 1 year. Clinical attributes were documented at baseline and after 1 year using available information in medical charts. 207 community pharmacies, 494 pharmacists, and 442 patients with CKD participated. After 1 year, the mean number of drug-related problems per patient decreased from 2.16 to 1.60 and from 1.70 to 1.62 in the ProFiL and control groups, respectively. The difference in reduction of drug-related problems per patient between the ProFiL and control groups was -0.32 (95% CI, -0.63 to -0.01). Improvements in knowledge (difference, 4.5%; 95% CI, 1.6%-7.4%) and clinical competencies (difference, 7.4%; 95% CI, 3.5%-11.3%) were observed among ProFiL pharmacists. No significant differences in clinical attributes were observed across the groups. High proportion of missing data

  5. Destructive and non-destructive evaluation methods of interface on F82H HIPed joints

    Energy Technology Data Exchange (ETDEWEB)

    Kishimoto, Hirotatsu, E-mail: hkishi@mmm.muroran-it.ac.jp [OASIS, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan); Graduate School, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan); Muramatsu, Yusuke [Graduate School, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan); Asakura, Yuki [OASIS, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan); Graduate School, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan); Endo, Tetsuo [Graduate School, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan); Kohyama, Akira [OASIS, Muroran Institute of Technology, 27-1, Muroran, Hokkaido (Japan)

    2016-11-01

    Highlights: • The first wall of F82H steel will be fabricated by the HIP method. • Inspection techniques need to be developed for the HIPed interface. • Both destructive and non-destructive inspection techniques are introduced. - Abstract: The first walls of F82H steel with built-in cooling channels will be assembled thin plates and rectangular pipes by a HIP method. Silicon oxides form on an interface of HIPed joints during HIPing and result in the lowering of toughness of the HIPed joints. A large issue is investigation method of HIPed interface. The flexibility of specimen size for the investigation will be necessary because of the thin wall of cooling channels. A small specimen destructive test technique which is able to distinguish a base metal and an excellent HIPed joint has been desired, and recent researches find out a torsion test method to solve the issue. Non-destructive test technique is another issue for the inspection of the first wall. An ultrasonic inspection method is a candidate but silicon oxides are too small to produce good flaw echo from oxides, some solutions will be necessary. Present research introduces the current status of development of small specimen destructive test technique and the ultrasonic method for the first wall inspection.

  6. Snorting the clivus away: an extreme case of cocaine-induced midline destructive lesion.

    Science.gov (United States)

    Molteni, Marco; Saibene, Alberto Maria; Luciano, Ketty; Maccari, Alberto

    2016-10-20

    Cocaine is a drug with relevant socioeconomic and clinical implications, which is usually recreationally used for its stimulant effects. It is widely known that the habit of snorting cocaine is associated with a peculiar type of drug-induced chronic rhinitis, which leads to inflammation of the sinonasal mucosa, slowly progressing to a destruction of nasal, palatal and pharyngeal tissues. These characteristic lesions due to cocaine abuse are commonly called cocaine-induced midline destructive lesions (CIMDL). Diagnosis is not always straightforward, since various conditions, mainly vasculitis, might mimic this acquired condition. The extent of pharyngeal involvement varies, although often a prolonged abuse can trigger a progressive destruction of oral and nasal tissues, with development of infections and recurrent inflammation. Our article focuses on cocaine as a world health problem with important ear, nose and throat implications and discusses the difficulties in diagnosing and treating CIMDL, through a case report. 2016 BMJ Publishing Group Ltd.

  7. FIRST 100 T NON-DESTRUCTIVE MAGNET

    Energy Technology Data Exchange (ETDEWEB)

    J. R. SIMS; ET AL

    1999-10-01

    The first 100 T non-destructive (100 T ND) magnet and power supplies as currently designed are described. This magnet will be installed as part of the user facility research equipment at the National High Magnetic Field Laboratory (NHMFL) Pulsed Field Facility at Los Alamos National Laboratory. The 100 T ND magnet will provide a 100 T pulsed field of 5 ms duration (above 90% of full field) in a 15 mm diameter bore once per hour. Magnet operation will be non-destructive. The magnet will consist of a controlled power outer coil set which produces a 47 T platform field in a 225 mm diameter bore. Located within the outer coil set will be a 220 mm outer diameter capacitor powered insert coil. Using inertial energy storage a synchronous motor/generator will provide ac power to a set of seven ac-dc converters rated at 64 MW/80 MVA each. These converters will energize three independent coil circuits to create 170 MJ of field energy in the outer coil set at the platform field of 47 T. The insert will then be energized to produce the balance of the 100 T peak field using a 2.3 MJ, 18 kV (charged to 15 kV), 14.4 mF capacitor bank controlled with solid-state switches. The magnet will be the first of its kind and the first non-destructive, reusable 100 T pulsed magnet. The operation of the magnet will be described along with special features of its design and construction.

  8. Rapidly destructive osteoarthritis can mimic infection

    Directory of Open Access Journals (Sweden)

    Gavin Hart, MD

    2016-03-01

    Full Text Available The intraoperative appearance of rapidly destructive osteoarthritis and septic arthritis can be similar. Three patients at our institution demonstrated preoperative or intraoperative findings potentially consistent with infection during primary total hip arthroplasty; however, none of these patients were found to have an actual infection. One of these patients underwent an unnecessary 2-stage total hip arthroplasty secondary to the intraoperative appearance of their joint fluid. We advocate performing an infection workup preoperatively when patients present with rapid degenerative changes of their hip joint to diminish the uncertainty of proceeding with arthroplasty.

  9. Biologic and chemical weapons of mass destruction.

    Science.gov (United States)

    Bozeman, William P; Dilbero, Deanna; Schauben, Jay L

    2002-11-01

    Weapons of mass destruction (WMDs) are capable of producing massive casualties and are typically grouped into nuclear, biologic, and chemical weapons. In the wake of the September 11th disasters, attention to terrorist groups and the potential for use of WMDs has increased. Biologic and chemical weapons are relatively accessible and inexpensive to develop, and are thought to be the most available to foreign states and subnational terrorist groups. This article reviews various biologic and chemical weapons, including emergency diagnosis and management of selected agents.

  10. D.H. Lawrence and modern destructiveness.

    Science.gov (United States)

    Gutierrez, D

    1980-01-01

    This article discusses twentieth century societal destructiveness as reflected in four key prose works by D.H. Lawrence--the novels Sons and Lovers, Women in Love, Lady Chatterley's Lover and the early travel book Twilight in Italy. Sons and Lovers, which projects the young Lawrence persona's struggle between life and death, partly accounts for a deepening sensitivity to life and death in modern society in Lawrence's subsequent works. It is seen that Lawrence's writings depict the perilous trends today towards the mechanization of our fundamental being, and the resultant life-threatening qualities of sensationalism and reduction of the individual inner life.

  11. Perception of Communication Network Fraud Dynamics by Network ...

    African Journals Online (AJOL)

    The massive growth of electronic commerce represent a new set of vulnerabilities aimed at the distortion, disruption, and destruction of the global and national information infrastructures, and are indeed significant threats to the integrity of networked systems. This paper investigates the perception of communication network ...

  12. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...... network methodology in one’s research might supersede the perceived benefits of doing so. As a response to that problem, we argue that workshops can act as a road towards meaningful engagement with networks and highlight that network methodology promises new ways of interpreting data to answer questions...

  13. [Destruction of tattoo by ruby laser].

    Science.gov (United States)

    Serres, P; Gaignebet, J; Hattat, J L; Compain, P; Vire, O; Despres, S

    1991-01-01

    The originality of tattoo destruction by ruby laser is to selectively treat the tattooed areas without injuring the surrounding normal cells, in order to obtain better healing. Therefore, we selected a red laser (ruby, emitting at 694.3 nm), with very short flashes (100 ns with self Q switched ruby laser). Ruby laser spots of about 1 cm diameter are delivered to on the area to be treated. As the black particles of the tattoo absorb more laser energy than the surrounding pale-pink skin (140 Mw/cm2, i.e. 14 j/cm2), we can obtain quite localized destruction and better healing. The beam is focussed on one point of the tattoo with a sighting neon-helium laser. In view of the very short impact, the energy absorbed by the pigmented particles diffuses minimally to adjacent tissues. After the crust falls, carrying away some tattoo pigment on its deeper surface, a pale-pink scar forms, then gradually fades in several months. With thick tattoos, it is necessary to proceed in layers and to plan a course of several treatments about one month apart. Compared with the other methods of tattoo removal (dermabrasion, salt, CO2 laser), ruby laser gives the best cosmetic results, even in keloid prone areas.

  14. Non-destructive testing; Examenes no destructivos

    Energy Technology Data Exchange (ETDEWEB)

    Calva, Mauricio; Loske, Achim [Instituto de Investigaciones Electricas, Cuernavaca (Mexico)

    1987-12-31

    The application of non-destructive testing (NDT) in several technical and industrial fields is pointed out, standing out its utilization in the detection of future failures without affecting the examined element. Likewise, the different types of NDTs and their processes, such as x-rays, ultrasoud, magnetic particles, induced currents, penetrating fluids, and optical means, are described. The Non-Destructive Tests Laboratory of the Instituto de Investigaciones Electricas (IIE), plans to create new and more reliable systems independent from the operator`s capacity, to contribute to fulfill the inspection and quality control needs of the generating Mexican power plants. [Espanol] Se senala la aplicacion de los examenes no destructivos (END) a diversos campos tecnicos e industriales, destacando su utilizacion en la deteccion de futuras fallas sin afectar el elemento examinado. Asimismo, se describen los diferentes tipos de END y sus procesos, tales como radiografia, ultrasonido, particulas magneticas, corrientes inducidas, liquidos penetrantes y metodos opticos. El Laboratorio de Pruebas no Destructivas, del Instituto de Investigaciones Electricas (IIE), planea crear sistemas novedosos mas confiables, que no dependan de la capacidad del operador, para contribuir a satisfacer las necesidades de inspeccion y control de calidad que se presentan en las plantas generadoras de energia mexicanas.

  15. Articulation points in complex networks

    Science.gov (United States)

    Tian, Liang; Bashan, Amir; Shi, Da-Ning; Liu, Yang-Yu

    2017-01-01

    An articulation point in a network is a node whose removal disconnects the network. Those nodes play key roles in ensuring connectivity of many real-world networks, from infrastructure networks to protein interaction networks and terrorist communication networks. Despite their fundamental importance, a general framework of studying articulation points in complex networks is lacking. Here we develop analytical tools to study key issues pertinent to articulation points, such as the expected number of them and the network vulnerability against their removal, in an arbitrary complex network. We find that a greedy articulation point removal process provides us a different perspective on the organizational principles of complex networks. Moreover, this process results in a rich phase diagram with two fundamentally different types of percolation transitions. Our results shed light on the design of more resilient infrastructure networks and the effective destruction of terrorist communication networks.

  16. Implications of the problem orientated medical record (POMR) for research using electronic GP databases: a comparison of the Doctors Independent Network Database (DIN) and the General Practice Research Database (GPRD)

    OpenAIRE

    Caine Steve; Richards Nicky; Bremner Stephen A; De Wilde Stephen; Cook Derek G; Carey Iain M; Strachan David P; Hilton Sean R

    2003-01-01

    Abstract Background The General Practice Research Database (GPRD) and Doctor's Independent Network Database (DIN), are large electronic primary care databases compiled in the UK during the 1990s. They provide a valuable resource for epidemiological and health services research. GPRD (based on VAMP) presents notes as a series of discrete episodes, whereas DIN is based on a system (MEDITEL) that used a Problem Orientated Medical Record (POMR) which links prescriptions to diagnostic problems. We...

  17. Solution to the inverse problem of estimating gap-junctional and inhibitory conductance in inferior olive neurons from spike trains by network model simulation.

    Science.gov (United States)

    Onizuka, Miho; Hoang, Huu; Kawato, Mitsuo; Tokuda, Isao T; Schweighofer, Nicolas; Katori, Yuichi; Aihara, Kazuyuki; Lang, Eric J; Toyama, Keisuke

    2013-11-01

    The inferior olive (IO) possesses synaptic glomeruli, which contain dendritic spines from neighboring neurons and presynaptic terminals, many of which are inhibitory and GABAergic. Gap junctions between the spines electrically couple neighboring neurons whereas the GABAergic synaptic terminals are thought to act to decrease the effectiveness of this coupling. Thus, the glomeruli are thought to be important for determining the oscillatory and synchronized activity displayed by IO neurons. Indeed, the tendency to display such activity patterns is enhanced or reduced by the local administration of the GABA-A receptor blocker picrotoxin (PIX) or the gap junction blocker carbenoxolone (CBX), respectively. We studied the functional roles of the glomeruli by solving the inverse problem of estimating the inhibitory (gi) and gap-junctional conductance (gc) using an IO network model. This model was built upon a prior IO network model, in which the individual neurons consisted of soma and dendritic compartments, by adding a glomerular compartment comprising electrically coupled spines that received inhibitory synapses. The model was used in the forward mode to simulate spike data under PIX and CBX conditions for comparison with experimental data consisting of multi-electrode recordings of complex spikes from arrays of Purkinje cells (complex spikes are generated in a one-to-one manner by IO spikes and thus can substitute for directly measuring IO spike activity). The spatiotemporal firing dynamics of the experimental and simulation spike data were evaluated as feature vectors, including firing rates, local variation, auto-correlogram, cross-correlogram, and minimal distance, and were contracted onto two-dimensional principal component analysis (PCA) space. gc and gi were determined as the solution to the inverse problem such that the simulation and experimental spike data were closely matched in the PCA space. The goodness of the match was confirmed by an analysis of variance

  18. Non-destructive microwave evaluation of TBC delamination induced by acute angle laser drilling

    Science.gov (United States)

    Sezer, H. K.; Li, Lin; Wu, Z.; Anderson, B.; Williams, P.

    2007-01-01

    Laser drilling has been applied to the production of cooling holes of various size and angles in the modern aerospace gas turbine components such as turbine blades, nozzle guide vanes, combustion chambers and afterburner. These parts are usually made of heat resistant nickel superalloys. The superalloy substrate is coated with yttria-stabilized zirconia thermal barrier coatings (TBCs) to protect them from reaching excessive temperatures in hot engine environments. Drilling the parts at acute angles to the surface is complicated because (i) multiple layers are being drilled through, (ii) the melt ejection and heat flow patterns around the hole are non-symmetrical and (iii) the drilling distance is greater than when drilling normal to the surface. In a previous investigation by the authors, delamination of TBC was addressed as a main problem of angled drilling and mechanisms involved were discussed. Characterization of delamination cracks was normally performed via metallographic techniques. It involves sectioning the samples using an abrasive cutting machine, grinding with successively finer silicon carbide paper up to the centre of the hole and polishing to allow optical microscopic analysis of the cracks. However, clamping and sectioning process of thermal-spray-coated workpieces can introduce cracks in brittle coatings due to the drag of the cut-off wheels. Hence, it is not possible to decide if the delamination is caused as a result of post-process sectioning or laser drilling. In this paper, a microwave non-destructive testing (NDT) technique is employed to evaluate the integrity of TBC after acute angle laser drilling. An Agilent 8510 XF network analyser operating over the frequency range of 45 MHz to 110 GHz was used to measure the amplitude and phase variations of scattered waves. The results significantly indicated the existence of delamination of 1-1.5 mm long at the TBC/substrate interface on the leading edge part of an acute-angled hole laser drilled

  19. The Creation and Destruction of Social Capital

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard

    are urging all social scientists to think more as social scientists rather than just as anthropologists, economists, historians, political scientists, or sociologists. Their effort to broaden the way social scientists think about social organization is an important step, especially for those of us interested...... in public policies. . . This is the type of book that should be assigned to graduate students across the social sciences as an illustration of the kind of work that they should aspire to do. I know I have learned a great deal from reading this book and appreciate the effort that the Svendsens have put......‘A welcome contribution to scholarly economic and public policy debates, The Creation and Destruction of Social Capital is written for advanced students yet offers insights critical to better understanding micro and macro economics alike.' - Willis M. Buhle, The Midwest Book Review ‘The Svendsens...

  20. Characterizing destructive quantum interference in electron transport

    Science.gov (United States)

    Sam-ang, Panu; Reuter, Matthew G.

    2017-05-01

    Destructive quantum interference in electron transport through molecules provides an unconventional route for suppressing electric current. In this work we introduce ‘interference vectors’ for each interference and use them to characterize the interference. An interference vector may be a combination of multiple molecular orbitals (MOs), leading to more robust interference that is likelier to be experimentally observable. In contrast, an interference vector may itself be a MO, in which case the interference is not robust and will be harder to detect. Our characterization scheme quantifies these two possibilities through the degree of rotation and also assigns an order to each interference that describes the shape of the Landauer-Büttiker transmission function around the interference. Several examples are then presented, showcasing the generality of our theory and characterization scheme, which is not limited to specific classes of molecules or particular molecule-electrode coupling patterns.

  1. Threat credibility and weapons of mass destruction.

    Science.gov (United States)

    Moores, Leon E

    2002-03-15

    Individual or collective preparedness for an attack involving weapons of mass destruction (WMD) must be based on an analysis of the threat. In threat assessment one takes many factors into account, including the physical and psychological parameters of the attacker. Although the potential devastation caused by WMD is significant, there are many limitations to the effective use of such weapons. Casualty rates will likely be measured in the thousands rather than millions because of factors that will be discussed. The psychological ramifications, it should be noted, the permutations of which have not yet been defined, will be much longer lasting. In this paper the author discusses these and other characteristics of the current threat.

  2. Risk Assessment for Destructive Re-Entry

    Science.gov (United States)

    Lips, T.; Koppenwallner, G.; Bianchi, L.; Klinkrad, H.

    2009-03-01

    From 2007 to 2008, Hypersonic Technology Göttingen (HTG) worked on a study called Risk Assessment for Destructive Re-entry (RADR). The main purposes of this study were to identify and to quantify the inherent uncertainties of re-entry analysis tools, and to provide possible risk mitigation measures. For these purposes, three basic risk scenarios were specified: a 1-ton-class satellite without propulsion for uncontrolled re-entry, a 6-ton-class satellite with propulsion and the capability to perform a controlled re-entry, and a 1-ton-class launcher upper stage re-entering uncontrolled. Based on the identified uncertainty parameters, variation analyses were conducted for these scenarios with the two ESA tools for re-entry analysis SCARAB (Spacecraft Atmospheric Reentry and Aerothermal Breakup) and SESAM (Spacecraft Entry Survival Analysis Module). This paper describes the major results of the RADR study.

  3. Destructive Single-Event Failures in Diodes

    Science.gov (United States)

    Casey, Megan C.; Gigliuto, Robert A.; Lauenstein, Jean-Marie; Wilcox, Edward P.; Kim, Hak; Chen, Dakai; Phan, Anthony M.; LaBel, Kenneth A.

    2013-01-01

    In this summary, we have shown that diodes are susceptible to destructive single-event effects, and that these failures occur along the guard ring. By determining the last passing voltages, a safe operating area can be derived. By derating off of those values, rather than by the rated voltage, like what is currently done with power MOSFETs, we can work to ensure the safety of future missions. However, there are still open questions about these failures. Are they limited to a single manufacturer, a small number, or all of them? Is there a threshold rated voltage that must be exceeded to see these failures? With future work, we hope to answer these questions. In the full paper, laser results will also be presented to verify that failures only occur along the guard ring.

  4. Non-destructive evaluation of composites

    Science.gov (United States)

    Chu, Tsuchin Philip

    1996-01-01

    The composite materials have been used in aerospace industries for quite some time. Several non-destructive evaluation (NDE) methods have been developed to inspect composites in order to detect flaws, matrix cracking, and delamination. These methods include ultrasonics, acoustic emission, shearography, thermography, X-ray, and digital image correlation. The NDE Branch of Marshall Space Flight Center has recently acquired a thermal imaging NDE system. The same system has been used at NASA Langley Research Center for detecting disbonds. In order to compare different NDE methods, three carbon/carbon composite panels were used for experiment using ultrasonic C-scan, shearography, and thermography methods. These panels have teflon inserts to simulate the delamination between plies in a composite panel. All three methods have successfully located the insert. The experiment and results are presented in the following sections.

  5. Galaxy simulation with dust formation and destruction

    Science.gov (United States)

    Aoyama, Shohei; Hou, Kuan-Chou; Shimizu, Ikkoh; Hirashita, Hiroyuki; Todoroki, Keita; Choi, Jun-Hwan; Nagamine, Kentaro

    2017-04-01

    We perform smoothed particle hydrodynamics (SPH) simulations of an isolated galaxy with a new treatment for dust formation and destruction. To this aim, we treat dust and metal production self-consistently with star formation and supernova (SN) feedback. For dust, we consider a simplified model of grain size distribution by representing the entire range of grain sizes with large and small grains. We include dust production in stellar ejecta, dust destruction by SN shocks, grain growth by accretion and coagulation and grain disruption by shattering. We find that the assumption of fixed dust-to-metal mass ratio becomes no longer valid when the galaxy is older than 0.2 Gyr, at which point the grain growth by accretion starts to contribute to the non-linear rise of dust-to-gas ratio. As expected in our previous one-zone model, shattering triggers grain growth by accretion since it increases the total surface area of grains. Coagulation becomes significant when the galaxy age is greater than ˜ 1 Gyr; at this epoch, the abundance of small grains becomes high enough to raise the coagulation rate of small grains. We further compare the radial profiles of dust-to-gas ratio (D) and dust-to-metal ratio (D/Z, I.e. depletion) at various ages with observational data. We find that our simulations broadly reproduce the radial gradients of dust-to-gas ratio and depletion. In the early epoch (≲ 0.3 Gyr), the radial gradient of D follows the metallicity gradient with D/Z determined by the dust condensation efficiency in stellar ejecta, while the D gradient is steeper than the Z gradient at the later epochs because of grain growth by accretion. The framework developed in this paper is applicable to any SPH-based galaxy evolution simulations including cosmological ones.

  6. The Destruction of Books by Traditionists

    Directory of Open Access Journals (Sweden)

    Melchert, Christopher

    2014-06-01

    Full Text Available This paper is a survey of the destruction of books particularly by traditionists (collectors, transmitters, and critics of hadith and particularly in the ninth century CE and before, offered as an addendum to Omar Ali de Unzaga’s forthcoming study of book burning in Islam. The destruction of books from distrust of written transmission has been adequately brought out by Michael Cook. What I chiefly add to previous scholarly accounts are some additional examples, a brief consideration of destroying books for the sake of orthodoxy, and a better account of pious reasons for destroying books, which had much to do with distrust not of writing hadith but of teaching it as a temptation to pride and a distraction from weightier things.Este artículo ofrece una panorámica de la destrucción de libros especialmente por parte de los tradicionistas (compiladores, transmisores, críticos del hadiz, especialmente en el siglo IX de la era cristiana y antes, que sirve como una adenda al estudio (en curso de publicación de Omar Ali de Unzaga sobre la quema de libros en el islam. La destrucción de libros a causa de la desconfianza hacia la transmisión escrita ha sido analizada en profundidad por Michael Cook. Lo que me interesa añadir a la investigación previa son algunos ejemplos adicionales, unas breves consideraciones sobre la destrucción de libros en pro de la ortodoxia, y una mejor presentación de las razones piadosas para destruir libros, razones que tenían mucho que ver con la desconfianza no tanto de poner escrito el hadiz, sino de enseñarlo, en tanto que tentación para caer en la vanidad y distracción de asuntos más importantes.

  7. KINETICS OF DESTRUCTION OF NANOMODIFIED SULFIR COMPOSITES

    Directory of Open Access Journals (Sweden)

    KOROLEV Evgenij Valerjevich

    2013-12-01

    Full Text Available As the service load on structures is constantly growing, modern construction industry needs new materials which could provide more capabilities and meet special requirements for operational performance. One of such materials is the so-called sulfur composite. When producing this composite the sulfur is used as a binder and different powders, fibers and grains can be used as the disperse phases. There are many advantages of sulfur composites: cheap binder, quick structure forming, high chemical resistance etc. For some operational conditions, however, the sulfur composites show the lack of required compressive strength. But recently developed method – nanomodification – addresses mentioned drawback of sulfur composites. Nanomodification is the formation of intermediate nanoscale layer on fine filler by means of addition of selected precursor. Moreover, taking into account the necessity to characterize the material not only by one scalar parameter – the compressive strength – but also by kinetics of fracture, we candecide that experimental methods of fracture mechanics should be used during examination of sulfur composite. One of the most promising is the acoustic emission (AE method, which is often designated as a method of non-destructive testing. Nevertheless, acoustic emission occurs – and can be measured – during the process of destructive testing too. The successful application of the acoustic emission method for studying kinetics of fracture imposes some requirements to testing machine characteristics; thus, all measurements were carried out with the device that had been developed for this purpose. It was shown that nanomodified sulfur composites demonstrate the reduction of AE energy to the final stage of load. Because of this, we propose to describe the fracture kinetics by «median stress» – stress corresponding to the half-release of all AE energy during fracture. It was shown that offered scalar parameter is in strong

  8. A Hybrid Estimation of Distribution Algorithm for Multi-Objective Multi-Sourcing Intermodal Transportation Network Design Problem Considering Carbon Emissions

    Directory of Open Access Journals (Sweden)

    Shou-feng Ji

    2017-06-01

    Full Text Available The increasing concern on global warming is prompting transportation sector to take into account more sustainable operation strategies. Among them, intermodal transportation (IT has already been regarded as one of the most effective measures on carbon reductions. This paper focuses on the model and algorithm for a certain kind of IT, namely multi-objective multi-sourcing intermodal transportation network design problem (MO_MITNDP, in which carbon emission factors are specially considered. The MO_MITNDP is concerned with determining optimal transportation routes and modes for a series of freight provided by multiple sourcing places to find good balance between the total costs and time efficiencies. First, we establish a multi-objective integer programming model to formulate the MO_MITNDP with total cost (TTC and maximum flow time (MFT criteria. Specifically, carbon emission costs distinguished by the different transportation mode and route are included in the cost function. Second, to solve the MO_MITNDP, a hybrid estimation of distribution algorithm (HEDA combined with a heterogeneous marginal distribution and a multi-objective local search is proposed, in which the from the Pareto dominance scenario. Finally, based on randomly generated data and a real-life case study of Jilin Petrochemical Company (JPC, China, simulation experiments and comparisons are carried out to demonstrate the effectiveness and application value of the proposed HEDA.

  9. Moisture assessment by fast and non-destructive in situ measurements

    DEFF Research Database (Denmark)

    Hansen, Kurt Kielsgaard; Møller, Eva B.; Hansen, Ernst Jan de Place

    2014-01-01

    A building inspection report is made in connection with the resale of 90% of all single-family houses in Denmark. The building inspection is visual with the option of using simple hand-held instruments but with no destructive measures allowed. However, many construction components have a high...... moisture content, which is not revealed by this inspection. The moisture content may become a problem for the buyers. This problem might have been avoided if the moisture content of the Building materials was measured on inspection. This is easily done in wood-based materials but for example in concrete...... and brick the moisture content is difficult to determine within a short period time. There is political pressure to include moisture measurements in the report if it does not increase the cost of the inspection significantly. Therefore, a moisture-measuring method is needed that is non-destructive, fast...

  10. How would you handle a terrorist act involving weapons of mass destruction?

    Science.gov (United States)

    1999-11-01

    The American College of Emergency Physicians (ACEP), the Joint Commission on Accreditation of Healthcare Organizations, and the American Medical Association are focusing on preparation for terrorist attacks using weapons of mass destruction, which include nuclear, chemical, or biologic agents. A nuclear or chemical terrorism incident combines the problem of treating mass casualties with that of decontaminating patients. Joint Commission surveyors are asking about domestic terrorism preparedness. ACEP will offer a training course within 18 months for physicians, nurses, and paramedics.

  11. Assessment and Treatment of Pica and Property Destruction of Holiday Decorations

    Science.gov (United States)

    Mitteer, Daniel R.; Romani, Patrick W.; Greer, Brian D.; Fisher, Wayne W.

    2016-01-01

    Problem behavior exhibited by individuals with autism can be disruptive to family traditions, such as decorating for the holidays. We present data for a 6-year-old girl who engaged in automatically reinforced pica and property destruction of holiday decorations. Treatment was evaluated within an ABCDCD reversal design. During baseline Phases A and B, we observed elevated rates of problem behavior. We implemented differential reinforcement of alternative behavior in Phase C to teach a response to compete with problem behavior. Little change in toy play or problem behavior occurred. In Phase D, we added a facial screen to the differential-reinforcement procedures, which resulted in increases in toy play and decreases in problem behavior. Findings are discussed in terms of how interventions for problem behavior can promote alternative behavior while facilitating household activities and traditions. PMID:26380947

  12. Thermodynamic Profiles of the Destructive June 2012 Derecho

    Science.gov (United States)

    Liu, C.; Novakovskaia, E.; Bosse, J.; Ware, R.; Stillman, D.; Sloop, C.; Blanchette, L.; Demoz, B.; Nelson, M.; Cooper, L.; Czarnetzki, A.; Reehorst, A.

    2012-12-01

    The June 2012 mid-Atlantic and Midwest Derecho was one of the most destructive and deadly fast-moving severe thunderstorm events in North American history. The derecho produced wind gusts approaching 100 miles per hour as it traveled more than 600 miles across large sections of the Midwestern United States, the central Appalachians and the Mid-Atlantic States on the afternoon and evening of June 29, 2012 and into the early morning of June 30, 2012. It produced hurricane-like impacts with little warning, resulting in more than 20 deaths, widespread damage and millions of power outages across the entire affected region. We present continuous temperature and moisture profiles observed by microwave radiometers, and derived forecast indices, along the storm path at locations in Iowa, Ohio and Maryland, providing unique perspective on the evolution of this historic storm. For example, an extreme CAPE value of 5,000 J/kg was derived from radiometer observations at Germantown, Maryland ten hours before storm passage, and 80 knot Wind Index (WINDEX) was derived seven hours before passage. The Germantown radiometer is operated as part of the Earth Networks Boundary Layer Network (BLN) for continuous thermodynamic monitoring of the planetary boundary layer up to 30,000 feet. The BLN uses Radiometrics microwave profilers providing continuous temperature and humidity soundings with radiosonde-equivalent observation accuracy, and unique liquid soundings. This case study illustrates the promise for severe storm forecast improvement based on continuous monitoring of temperature and moisture in the boundary layer and above.

  13. I Keep my Problems to Myself: Negative Social Network Orientation, Social Resources, and Health-Related Quality of Life in Cancer Survivors

    Science.gov (United States)

    Symes, Yael; Campo, Rebecca A.; Wu, Lisa M.; Austin, Jane

    2016-01-01

    Background Cancer survivors treated with hematopoietic stem cell transplant rely on their social network for successful recovery. However, some survivors have negative attitudes about using social resources (negative social network orientation) that are critical for their recovery. Purpose We examined the association between survivors’ social network orientation and health-related quality of life (HRQoL) and whether it was mediated by social resources (network size, perceived support, and negative and positive support-related social exchanges). Methods In a longitudinal study, 255 survivors completed validated measures of social network orientation, HRQoL, and social resources. Hypotheses were tested using path analysis. Results More negative social network orientation predicted worse HRQoL (p social exchanges. Conclusions Survivors with negative social network orientation may have poorer HRQoL in part due to deficits in several key social resources. Findings highlight a subgroup at risk for poor transplant outcomes and can guide intervention development. PMID:26693932

  14. Aseismic blocks and destructive earthquakes in the Aegean

    Science.gov (United States)

    Stiros, Stathis

    2017-04-01

    Aseismic areas are not identified only in vast, geologically stable regions, but also within regions of active, intense, distributed deformation such as the Aegean. In the latter, "aseismic blocks" about 200m wide were recognized in the 1990's on the basis of the absence of instrumentally-derived earthquake foci, in contrast to surrounding areas. This pattern was supported by the available historical seismicity data, as well as by geologic evidence. Interestingly, GPS evidence indicates that such blocks are among the areas characterized by small deformation rates relatively to surrounding areas of higher deformation. Still, the largest and most destructive earthquake of the 1990's, the 1995 M6.6 earthquake occurred at the center of one of these "aseismic" zones at the northern part of Greece, found unprotected against seismic hazard. This case was indeed a repeat of the case of the tsunami-associated 1956 Amorgos Island M7.4 earthquake, the largest 20th century event in the Aegean back-arc region: the 1956 earthquake occurred at the center of a geologically distinct region (Cyclades Massif in Central Aegean), till then assumed aseismic. Interestingly, after 1956, the overall idea of aseismic regions remained valid, though a "promontory" of earthquake prone-areas intruding into the aseismic central Aegean was assumed. Exploitation of the archaeological excavation evidence and careful, combined analysis of historical and archaeological data and other palaeoseismic, mostly coastal data, indicated that destructive and major earthquakes have left their traces in previously assumed aseismic blocks. In the latter earthquakes typically occur with relatively low recurrence intervals, >200-300 years, much smaller than in adjacent active areas. Interestingly, areas assumed a-seismic in antiquity are among the most active in the last centuries, while areas hit by major earthquakes in the past are usually classified as areas of low seismic risk in official maps. Some reasons

  15. Options for the destruction of chemical weapons and management of the associated risks.

    Science.gov (United States)

    Manley, Ron G

    2006-09-01

    The destruction of chemical weapons is a hazardous operation. The degree of hazard posed, however, is not uniform and is dependent on the specific chemical agent and the configuration of the weapon or bulk storage vessel in which it is contained. For example, a highly volatile nerve agent in an explosively configured munition, such as a rocket, poses a very different hazard from that of a bulk storage container of viscous mustard gas. Equally the handling of recovered, often highly corroded, World War (WW)I or WWII chemical munitions will pose a very different hazard from that associated with dealing with modern chemical weapons stored under the appropriate conditions. Over the years, a number of technologies have been developed for the destruction of chemical weapons. Each has its advantages and disadvantages. None of them provide a universal solution to the problem. When assessing options for the destruction of these weapons and the management of the associated risks, therefore, it is important to give due consideration and weight to these differences. To ensure that the destruction technology selected takes due account of them and that the resulting overall risk assessment accurately reflects the actual risks involved.

  16. Models of network reliability analysis, combinatorics, and Monte Carlo

    CERN Document Server

    Gertsbakh, Ilya B

    2009-01-01

    Unique in its approach, Models of Network Reliability: Analysis, Combinatorics, and Monte Carlo provides a brief introduction to Monte Carlo methods along with a concise exposition of reliability theory ideas. From there, the text investigates a collection of principal network reliability models, such as terminal connectivity for networks with unreliable edges and/or nodes, network lifetime distribution in the process of its destruction, network stationary behavior for renewable components, importance measures of network elements, reliability gradient, and network optimal reliability synthesis

  17. NON-DESTRUCTIVE SOIL CARBON ANALYZER.

    Energy Technology Data Exchange (ETDEWEB)

    Wielopolski, Lucian; Hendrey, G.; Orion, I.; Prior, S.; Rogers, H.; Runion, B.; Torbert, A.

    2004-02-01

    This report describes the feasibility, calibration, and safety considerations of a non-destructive, in situ, quantitative, volumetric soil carbon analytical method based on inelastic neutron scattering (INS). The method can quantify values as low as 0.018 gC/cc, or about 1.2% carbon by weight with high precision under the instrument's configuration and operating conditions reported here. INS is safe and easy to use, residual soil activation declines to background values in under an hour, and no radiological requirements are needed for transporting the instrument. The labor required to obtain soil-carbon data is about 10-fold less than with other methods, and the instrument offers a nearly instantaneous rate of output of carbon-content values. Furthermore, it has the potential to quantify other elements, particularly nitrogen. New instrumentation was developed in response to a research solicitation from the U.S. Department of Energy (DOE LAB 00-09 Carbon Sequestration Research Program) supporting the Terrestrial Carbon Processes (TCP) program of the Office of Science, Biological and Environmental Research (BER). The solicitation called for developing and demonstrating novel techniques for quantitatively measuring changes in soil carbon. The report includes raw data and analyses of a set of proof-of-concept, double-blind studies to evaluate the INS approach in the first phase of developing the instrument. Managing soils so that they sequester massive amounts of carbon was suggested as a means to mitigate the atmospheric buildup of anthropogenic CO{sub 2}. Quantifying changes in the soils' carbon stocks will be essential to evaluating such schemes and documenting their performance. Current methods for quantifying carbon in soil by excavation and core sampling are invasive, slow, labor-intensive and locally destroy the system being observed. Newly emerging technologies, such as Laser Induced Breakdown Spectroscopy and Near-Infrared Spectroscopy, offer soil

  18. Finally, proof of weapons of mass destruction.

    Science.gov (United States)

    Baldwin, Ian T

    2003-10-07

    Allelopathy (one species' use of chemicals to harm other species) may be a key ingredient in successful invasions of alien plants into established communities. Bais et al. show that in response to elicitation by common soil fungi, spotted knapweed (Centaurea maculosa) launches an ineffective defense against the fungi that results in extensive collateral damage to neighboring plants. Specifically, the flavonoid (-)-catechin, released from the roots of knapweed, produces a massive reactive oxygen species (ROS)-mediated oxidative burst, Ca2+ signaling, and rapid cell death in those unadapted native species whose habitats the plant regularly invades. The roots release both (+) and (-) enantiomers, but only the (-) enantiomer functions as a weapon of mass destruction; the (+) enantiomer inhibits the growth of numerous common soil-borne bacterial pathogens. Eliciting apoptotic response for a competitive advantage is an example of signal cross-talk between the genomes of interacting organisms and highlights how the internal signaling of one organism can be used by others to adjust their phenotypes in an adaptive manner. The study provides strong circumstantial evidence for an allelopathic interaction, but the genetic manipulation of (-)-catechin release would allow researchers to determine if these responses occur in nature. Precise genetic control over the release of secondary metabolites from plants would benefit ecological research.

  19. Detection of weapons of mass destruction

    Science.gov (United States)

    Bjorkholm, Paul J.

    2003-07-01

    High Energy X-ray cargo screening is a mature technology that has proven its value in the detection of contraband material hidden within cargo including fully loaded sea containers. To date high energy screening has been largely applied to manifest verification and to drug detection. However, the dramatic change in world terrorism has altered the application. Now it is essential that weapons of mass destruction (WMD"s) be interdicted with incredibly high accuracy. The implication of a missed detection has gone from loss of revenue or the lowering of the street price of drugs to potentially stopping, at least for some significant time, most world commerce. Screening containers with high energy x-rays (~250+ mm of steel penetration) is capable of detecting all nuclear threats at a fraction of the strategically important mass. The screening operation can be automated so that no human decisions are required with very low false alarms. Finally, the goal of 100% inspection of cargo inbound to the United States from the twenty largest international ports is an achievable goal with hardware costs in the area of that already spent on airport security.

  20. Non-destructive measurement of cultural property

    Energy Technology Data Exchange (ETDEWEB)

    Hirao, Yoshimitsu [Tokyo National Research Inst. of Cultural Properties, Tokyo (Japan). Dept. of Conservation Science

    1997-02-01

    Non-destructive analytical method is favored for the measurement of samples from the field of cultural properties. Among many scientific methods, X-ray fluorescence spectrometry and X-ray diffraction method are frequently applied in this field. X-ray fluorescence spectrometer is the main method for the measurement of chemical composition of cultural properties when sample is not taken out. It is the most important concept during the measurement, that samples should be kept in the safety condition without any difficulty or defect. Because a sample from the field of cultural properties could not be cut or could not be laid down in some cases, instruments should be improved to admit these samples and conditions. It is one of the solutions for this point to equip a large sample chamber in the instrument. Several new instruments with large sample chamber which was specially designed for the cultural properties were explained. Applications of these instruments were also explained for the real archaeological and historical samples. Even the measurements is not quantitative and qualitative analysis only, the results is evaluated to be valuable for the understanding of the samples. The micro focus X-ray fluorescence spectrometer was also applied in this field. The method gave not only the ordinary chemical composition but also the structure of the samples by mapping. (author)

  1. Developmentally programmed nuclear destruction during yeast gametogenesis.

    Science.gov (United States)

    Eastwood, Michael D; Cheung, Sally W T; Lee, Kwan Yin; Moffat, Jason; Meneghini, Marc D

    2012-07-17

    Autophagy controls cellular catabolism in diverse eukaryotes and modulates programmed cell death in plants and animals. While studies of the unicellular yeast Saccharomyces cerevisiae have provided fundamental insights into the mechanisms of autophagy, the roles of cell death pathways in yeast are less well understood. Here, we describe widespread developmentally programmed nuclear destruction (PND) events that occur during yeast gametogenesis. PND is executed through apoptotic-like DNA fragmentation in coordination with an unusual form of autophagy that is most similar to mammalian lysosomal membrane permeabilization and mega-autophagy, a form of plant autophagic cell death. Undomesticated strains execute gametogenic PND broadly in maturing colonies to the apparent benefit of sibling cells, confirming its prominence during the yeast life cycle. Our results reveal that diverse cell-death-related processes converge during gametogenesis in a microbe distantly related to plants or animals, highlighting gametogenesis as a process during which programmed cell death mechanisms may have evolved. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. Power, Creativity, and Destruction in Turner's Fires

    Directory of Open Access Journals (Sweden)

    Leo Costello

    2017-12-01

    Full Text Available This article considers Turner’s depictions of fire throughout his career. Beginning with some of his very first images, including 'The Pantheon, the Morning after the Fire', it argues that while fire would eventually come to be a means for Turner to create his reputation as a painter of destruction, it also held associations of creativity, domesticity, and comfort. Furthermore, while fire was not nearly as prominent in his early work as it was in the early 1830s, it also became a means for him to elaborate issues of viewership, sublimity, and public space. Following a consideration of some of Turner’s most well-known images of fire in the 1830s, such as those in the 'Parliament' paintings, the article concludes with an extended discussion of the 1832 'Shadrach, Meshach and Abednego in the Burning Fiery Furnace'. It broadly connects the pictures of the early 1830s to the growth of mass politics and its implications.

  3. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  4. Are Destructive Operations Still Relevant to Obstetric Practice in ...

    African Journals Online (AJOL)

    Context: From our clinical observation, we often see caesarean section being performed in situations where destructive operations would have been more appropriate. Objective: To determine the proportion of cases of obstructed labour that meet defined criteria for destructive vaginal operation vis-à-vis the proportion that ...

  5. 50 CFR 28.43 - Destruction of dogs and cats.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Destruction of dogs and cats. 28.43 Section 28.43 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR... VIOLATIONS OF PARTS 25, 26, AND 27 Impoundment Procedures § 28.43 Destruction of dogs and cats. Dogs and cats...

  6. 9 CFR 54.7 - Procedures for destruction of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Procedures for destruction of animals. 54.7 Section 54.7 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT... SCRAPIE Scrapie Indemnification Program § 54.7 Procedures for destruction of animals. (a) Scrapie-positive...

  7. 9 CFR 2.129 - Confiscation and destruction of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Confiscation and destruction of animals. 2.129 Section 2.129 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Miscellaneous § 2.129 Confiscation and destruction of...

  8. Unilateral post-tuberculosis lung destruction and massive ...

    African Journals Online (AJOL)

    Abiodun S. Adeniran

    2015-04-29

    Apr 29, 2015 ... Ashour M, Pandya L, Mezraqji A, et al. Unilateral post-tubercu- · lous lung destruction: the left bronchus syndrome. Thorax · 1990;45:210–2. 2. Fawibe AE, Salami AK, Oluboyo PO, Desalu OO, Odeigha LO. Profile and outcome of unilateral tuberculous lung destruction in · Ilorin, Nigeria. West Afr J Med 2011 ...

  9. Willingness to pay for defense against weapons of mass destruction.

    Science.gov (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M

    2001-12-01

    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  10. 27 CFR 25.221 - Voluntary destruction of beer.

    Science.gov (United States)

    2010-04-01

    ... beer. 25.221 Section 25.221 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Voluntary Destruction § 25.221 Voluntary destruction of beer. (a) On brewery premises. (1) A brewer may destroy, at the brewery, beer on which the tax has not...

  11. 15 CFR 721.3 - Destruction or disposal of records.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Destruction or disposal of records... INSPECTION OF RECORDS AND RECORDKEEPING § 721.3 Destruction or disposal of records. If BIS or other authorized U.S. government agency makes a formal or informal request for a certain record or records, such...

  12. 15 CFR 786.3 - Destruction or disposal of records.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Destruction or disposal of records... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS RECORDS AND RECORDKEEPING § 786.3 Destruction or disposal of records. If BIS or any other authorized U.S...

  13. 19 CFR 191.44 - Destruction under Customs supervision.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Destruction under Customs supervision. 191.44 Section 191.44 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK Rejected Merchandise § 191.44 Destruction under Customs...

  14. 19 CFR 191.25 - Destruction under Customs supervision.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Destruction under Customs supervision. 191.25 Section 191.25 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK Manufacturing Drawback § 191.25 Destruction under Customs...

  15. 27 CFR 24.294 - Destruction of wine.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Destruction of wine. 24..., DEPARTMENT OF THE TREASURY LIQUORS WINE Removal, Return and Receipt of Wine Removals Without Payment of Tax § 24.294 Destruction of wine. (a) General. Wine on bonded wine premises may be destroyed on or off wine...

  16. Techniques for Analysing Problems in Engineering Projects

    DEFF Research Database (Denmark)

    Thorsteinsson, Uffe

    1998-01-01

    Description of how CPM network can be used for analysing complex problems in engineering projects.......Description of how CPM network can be used for analysing complex problems in engineering projects....

  17. Destruction of meat and bone meals in cement plants; Destruction des farines animales dans les cimenteries

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2001-10-01

    Following the crisis of the bovine spongiform encephalopathy disease ('mad cow' disease), the French cement industrialists have been requested by the government since 1996 to eliminate the forbidden meat and bone meals in cement kilns where they are used as fuel substitutes. This article presents the advantages of the cement industry file in the destruction of such wastes, the validation and the safety aspects of this process. Meat and bone meal represents a high-grade fuel that lowers the environmental impact of cement production and does not affect the quality of cement. (J.S.)

  18. NITRATE DESTRUCTION LITERATURE SURVEY AND EVALUATION CRITERIA

    Energy Technology Data Exchange (ETDEWEB)

    Steimke, J.

    2011-02-01

    This report satisfies the initial phase of Task WP-2.3.4 Alternative Sodium Recovery Technology, Subtask 1; Develop Near-Tank Nitrate/Nitrite Destruction Technology. Some of the more common anions in carbon steel waste tanks at SRS and Hanford Site are nitrate which is corrosive, and nitrite and hydroxide which are corrosion inhibitors. At present it is necessary to periodically add large quantities of 50 wt% caustic to waste tanks. There are three primary reasons for this addition. First, when the contents of salt tanks are dissolved, sodium hydroxide preferentially dissolves and is removed. During the dissolution process the concentration of free hydroxide in the tank liquid can decrease from 9 M to less than 0.2 M. As a result, roughly half way through the dissolution process large quantities of sodium hydroxide must be added to the tank to comply with requirements for corrosion control. Second, hydroxide is continuously consumed by reaction with carbon dioxide which occurs naturally in purge air used to prevent buildup of hydrogen gas inside the tanks. The hydrogen is generated by radiolysis of water. Third, increasing the concentration of hydroxide increases solubility of some aluminum compounds, which is desirable in processing waste. A process that converts nitrate and nitrite to hydroxide would reduce certain costs. (1) Less caustic would be purchased. (2) Some of the aluminum solid compounds in the waste tanks would become more soluble so less mass of solids would be sent to High Level Vitrification and therefore it would be not be necessary to make as much expensive high level vitrified product. (3) Less mass of sodium would be fed to Saltstone at SRS or Low Level Vitrification at Hanford Site so it would not be necessary to make as much low level product. (4) At SRS less nitrite and nitrate would be sent to Defense Waste Processing Facility (DWPF) so less formic acid would be consumed there and less hydrogen gas would be generated. This task involves

  19. Feasibility Study of Non-Destructive Techniques to Measure Corrosion in SAVY Containers

    Energy Technology Data Exchange (ETDEWEB)

    Davenport, Matthew Nicholas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-07-15

    Stainless Steel SAVY containers are used to transport and store nuclear material. They are prone to interior corrosion in the presence of certain chemicals and a low-oxygen environment. SAVY containers also have relatively thin walls to reduce their weight, making their structural integrity more vulnerable to the effects of corrosion. A nondestructive evaluation system that finds and monitors corrosion within containers in use would improve safety conditions and preclude hazards. Non-destructive testing can determine whether oxidation or corrosion is occurring inside the SAVY containers, and there are a variety of non-destructive testing methods that may be viable. The feasibility study described will objectively decide which method best fits the requirements of the facility and the problem. To improve efficiency, the containers cannot be opened during the non-destructive examination. The chosen technique should also be user-friendly and relatively quick to apply. It must also meet facility requirements regarding wireless technology and maintenance. A feasibility study is an objective search for a new technology or product to solve a particular problem. First, the design, technical, and facility feasibility requirements are chosen and ranked in order of importance. Then each technology considered is given a score based upon a standard ranking system. The technology with the highest total score is deemed the best fit for a certain application.

  20. Ear Problems

    Science.gov (United States)

    ... Women Hair Loss Hand/Wrist/Arm Problems Headaches Hearing Problems Hip Problems Knee Problems Leg Problems Lower Back ... have ear pain or redness but is having problems hearing?YesNo Back to Questions Step 3 Possible Causes ...

  1. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  2. The intergenerational transmission of violence: examining the mediating roles of insecure attachment and destructive disagreement beliefs.

    Science.gov (United States)

    Sutton, Tara E; Simons, Leslie Gordon; Wickrama, K A S; Futris, Ted

    2014-01-01

    Intimate partner violence has been recognized as a major problem on college campuses and is a source of concern for researchers, clinicians, policymakers, and the general population. Most research has focused on the intergenerational transmission of violence and identifying the intrapersonal mechanisms that enable violence in the family of origin to carry over to adult intimate relationships. This study expands the current literature by examining insecure attachment styles and destructive disagreement beliefs as mediators in the relationship between exposure to hostility or aggression in the family of origin and later experiences of dating aggression. Research questions were addressed with a sample of 1,136 college undergraduates (59% women). In all models, results of structural equation modeling indicated that an insecure attachment style and destructive disagreement beliefs mediated the intergenerational transmission of violence among both men and women. These findings have important implications for future research as well as relationship education programs and preventative interventions.

  3. Mathematic modelling of the process of thermal destruction of oil pools

    Energy Technology Data Exchange (ETDEWEB)

    Malamed, V.G.; Reverdatto, V.V.

    1980-08-01

    By means of mathematic modelling, the dynamics of thermal destruction of the oil pool are investigated in the vicinity of a thick bedded intrusive body of basalt magma. Heat conductivity of oil-bearing rocks was estimated as effective with account for liquid convection in porous medium. Calculated are the maximum sizes of exocontact area, where contact metamorphism of porous rocks brought about destructive transformations of oil. The problem is solved in four variants, with various endothermal heat effects of chemical reactions in oil and different ways of input of heat conductivity. For a basalt sill of some 100-meter thickness, the width of the zone of contact oil transformation must not exceed 80 meters. The results obtained can be applied in cases with intrusive bodies of any thickness.

  4. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  5. Transportation network development in a liberalized power system, a coordination problem with production; Le developpement du reseau de transport dans un systeme electrique liberalise, un probleme de coordination avec la production

    Energy Technology Data Exchange (ETDEWEB)

    Rious, V

    2007-10-15

    This thesis analyses how the long term coordination between generation and transmission is organised in a liberalized power system. It relies on a modular analysis framework that allows us to separate the coordination mechanisms into distinct modules. The governance structure of the power network completes this analysis framework. In a rationale of institutional complementarity, this governance structure impacts the way the TSOs effectively implement the power flow management. The proactive behaviour of the TSO for the coordination of generation and transmission can be explained in two ways. Firstly, the network investment can be the only effective process of long term coordination between generation and transmission. Secondly, when forecasting network investment, the TSO can prepare the accommodation of the fast-built generation units and detect the potential failures of locational incentive signals. (author)

  6. Thermal destruction of vessels with liquid upon heating

    Science.gov (United States)

    Zverev, V. G.; Goldin, V. D.; Svetashkov, A. A.

    2016-04-01

    A new engineering technique of calculating the heating and thermal destruction of vessels containing liquid under extreme thermal loading conditions is offered. The heating of the shell and the internal vessel volume is described on the basis of the thermodynamic approach. The pressure growth in a vessel is a result of gas heating and liquid evaporation. Stresses within the shell and its destruction conditions are determined, which allows predicting the critical time of destruction upon heating. The calculation and experimental data for pressure growth inside the vessel are in good agreement.

  7. Proteus - Geology, shape, and catastrophic destruction

    Science.gov (United States)

    Croft, Steven K.

    1992-01-01

    Least-squares fits to the two available limb profiles of Proteus yield a sphericity close to unity; the visual irregularity is due to a degree of surface roughness comparable to that of Hyperion and the smaller icy satellites. A network of streaks that can be interpreted as tectonic troughs cuts the surface of Proteus, and is organized concentrically around either one of the two nearly-coincident Proteus-Neptune of Pharos axes of symmetry. If the streaks are tectonic, they may be due to tidal stresses generated by a past change in Proteus' equilibrium orientation. The streaks may also be disruptive-stress fractures.

  8. CNEM: Cluster Based Network Evolution Model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2015-01-01

    Full Text Available This paper presents a network evolution model, which is based on the clustering approach. The proposed approach depicts the network evolution, which demonstrates the network formation from individual nodes to fully evolved network. An agglomerative hierarchical clustering method is applied for the evolution of network. In the paper, we present three case studies which show the evolution of the networks from the scratch. These case studies include: terrorist network of 9/11 incidents, terrorist network of WMD (Weapons Mass Destruction plot against France and a network of tweets discussing a topic. The network of 9/11 is also used for evaluation, using other social network analysis methods which show that the clusters created using the proposed model of network evolution are of good quality, thus the proposed method can be used by law enforcement agencies in order to further investigate the criminal networks

  9. 2-Sensor Problem

    Directory of Open Access Journals (Sweden)

    Michael Segal

    2004-11-01

    Full Text Available Abstract: Ad-hoc networks of sensor nodes are in general semi-permanently deployed. However, the topology of such networks continuously changes over time, due to the power of some sensors wearing out to new sensors being inserted into the network, or even due to designers moving sensors around during a network re-design phase (for example, in response to a change in the requirements of the network. In this paper, we address the problem of covering a given path by a limited number of sensors — in our case to two, and show its relation to the well-studied matrix multiplication problem.

  10. In situ non-destructive measurement of biofilm thickness and topology in an interferometric optical microscope

    Energy Technology Data Exchange (ETDEWEB)

    Larimer, Curtis [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA; Suter, Jonathan D. [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA; Bonheyo, George [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA; Addleman, Raymond Shane [Pacific Northwest National Laboratory, Battelle for the USDOE, PO Box 999, MSIN P7-50 Richland WA 99354 USA

    2016-03-15

    Biofilms are ubiquitous and deleteriously impact a wide range of industrial processes, medical and dental health issues, and environmental problems such as transport of invasive species and the fuel efficiency of ocean going vessels. Biofilms are difficult to characterize when fully hydrated, especially in a non-destructive manner, because of their soft structure and water-like bulk properties. Herein we describe a non-destructive high resolution method of measuring and monitoring the thickness and topology of live biofilms of using white light interferometric optical microscopy. Using this technique, surface morphology, surface roughness, and biofilm thickness can be measured non-destructively and with high resolution as a function of time without disruption of the biofilm activity and processes. The thickness and surface topology of a P. putida biofilm were monitored growing from initial colonization to a mature biofilm. Typical bacterial growth curves were observed. Increase in surface roughness was a leading indicator of biofilm growth.

  11. Non-destructive foraminiferal paleoclimatic proxies: A brief insight

    Digital Repository Service at National Institute of Oceanography (India)

    Saraswat, R.

    Non-Destructive Foraminiferal Paleoclimatic Proxies: A Brief Insight The knowledge of past climate can help us to understand imminent climatic changes. Oceans are the vast archives of past climate. Various indirect techniques termed as proxies...

  12. Chlorophyll destruction in the presence of bisulfite. [Spinach oleracea

    Energy Technology Data Exchange (ETDEWEB)

    Peiser, G.; Yang, S.F.

    1985-01-01

    Chlorophyll extracted from Spinacia oleracea leaves as well as purified chlorophyll a in ethanolic solutions (pH 4) was rapidly destroyed, as measured by a decrease in absorbance, in the presence of sodium bisulfite, oxygen and light. Omission of sodium bisulfite, oxygen or light resulted in negligible destruction. The light requirement could be partially substituted by addition of manganous sulfate and destruction was further stimulated in the presence of linoleic acid. Hydroquinone, a free radical scavenger, inhibited both light and Mn/sup 2 +/-mediated (dark) destruction. These results suggest that free radicals produced during the aerobic oxidation of bisulfite are involved in the destruction of chlorophyll. When /sub 35/S-bisulfite was used, two labeled degradation products of chlorophyll were observed.

  13. Destruction of Aflatoxins in Contaminated Maize Samples using ...

    African Journals Online (AJOL)

    alice

    Ammoniation procedures may be considered suitable for large scale destruction of aflatoxins that contaminate foodstuffs stored in warm moist places. Key words: Aflatoxins, contaminated foodstuffs, ammoniation procedures. INTRODUCTION. Aflatoxins are mold metabolites of Aspergillus flavus and Aspergillus parasiticus.

  14. Destructive electronics from electrochemical-mechanically triggered chemical dissolution

    Science.gov (United States)

    Sim, Kyoseung; Wang, Xu; Li, Yuhang; Linghu, Changhong; Gao, Yang; Song, Jizhou; Yu, Cunjiang

    2017-06-01

    The considerable need to enhance data and hardware security suggest one possible future for electronics where it is possible to destroy them and even make them disappear physically. This paper reports a type of destructive electronics which features fast transience from chemical dissolution on-demand triggered in an electrochemical-mechanical manner. The detailed materials, mechanics, and device construction of the destructive electronics are presented. Experiment and analysis of the triggered releasing and transience study of electronic materials, resistors and metal-oxide-semiconductor field effect transistors illustrate the key aspects of the destructive electronics. The reported destructive electronics is useful in a wide range of areas from security and defense, to medical applications

  15. 27 CFR 479.24 - Destructive device determination.

    Science.gov (United States)

    2010-04-01

    ..., FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION MACHINE GUNS, DESTRUCTIVE DEVICES... provision of law for any device which he believes is not likely to be used as a weapon shall submit a...

  16. Time Domain Terahertz Axial Computed Tomography Non Destructive Evaluation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose to demonstrate key elements of feasibility for a high speed automated time domain terahertz computed axial tomography (TD-THz CT) non destructive...

  17. Time Domain Terahertz Axial Computed Tomography Non Destructive Evaluation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — In this Phase 2 project, we propose to develop, construct, and deliver to NASA a computed axial tomography time-domain terahertz (CT TD-THz) non destructive...

  18. Assessing biological and technical variation in destructively measured data

    NARCIS (Netherlands)

    Tijskens, L.M.M.; Konopacki, P.J.; Jongbloed, G.; Penchaiya, P.; Schouten, R.E.

    2017-01-01

    The majority of experimental data are obtained by destructive measuring techniques. Inevitably, in all these data variation is present, sometimes small and negligible, sometimes large, preventing proper analysis and extraction of meaningful information by traditional statistical techniques

  19. Weapons of Mass Destruction: Texas National Guard Initiatives

    National Research Council Canada - National Science Library

    Sterner, Jeanette

    2000-01-01

    .... The era of conventional weapons and conventional tactics is over. The arsenal of the world is now comprised of chemical, biological and nuclear weapons collectively known as weapons of mass destruction (WMD...

  20. Predicting Tropical Cyclone Destructive Potential by Integrated Kinetic Energy According to the Powell/Reinhold Scale

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — A method of predicting the destructive capacity of a tropical cyclone based on a new Wind Destructive Potential (WDP) and Storm Surge Destructive Potential (SDP)...

  1. Cartilage destruction in rheumatoid arthritis, its association with functional impairments

    Directory of Open Access Journals (Sweden)

    Natalia Vladimirovna Chichasova

    2014-01-01

    Full Text Available The paper discusses the mechanisms of destructive processes in rheumatoid arthritis (RA. At the present stage, in addition to suppress inflammation, the goals of treatment are to prevent cartilage and bone destruction in the affected joints. Prediction of destructive processes in RA plays an important role as the irreversibility of functional changes in RA directly correlates with the degree of joint injury. The paper discusses the mechanisms of articular cartilage and bone destruction and the significance of different biochemical markers for estimating the degree of injury and for predicting further destruction of small hand and foot joints. In RA, the investigators identify not only clinical (activity indicators, but also biological (bone, cartilage, and synovium damage markers predictors for joint injury: CТXII is a marker for cartilage degradation (collagen type II and CTXI is a marker for bone degradation (collagen type I and their trends over 4–12 or more weeks. Although the occurrence of erosions is considered to be a major manifestation of joint destruction progression in RA, the functional activity in its early stages is shown to depend on the estimate of joint space narrowing (cartilage degradation to a greater extent than on that of erosions when evaluating the destruction by the modified Sharp method. Several randomized placebocontrolled studies (RPCSs have assessed the association of patients' functional capacity with joint space narrowing or with the number of erosions. In RA, cartilage degradation has been demonstrated to play a larger role in irreversible function loss than bone destruction.The possibility of suppressing cartilage degradation, which is indicated in RPCSs of the efficacy of adalimumab, correlates with a better functional outcome in patients with RA. Serum markers for cartilage metabolism may be not only predictors for further radiographic progression, but also be used to evaluate therapeutic effectiveness.

  2. Cartilage destruction in rheumatoid arthritis, its association with functional impairments

    Directory of Open Access Journals (Sweden)

    Natalia Vladimirovna Chichasova

    2014-12-01

    Full Text Available The paper discusses the mechanisms of destructive processes in rheumatoid arthritis (RA. At the present stage, in addition to suppress inflammation, the goals of treatment are to prevent cartilage and bone destruction in the affected joints. Prediction of destructive processes in RA plays an important role as the irreversibility of functional changes in RA directly correlates with the degree of joint injury. The paper discusses the mechanisms of articular cartilage and bone destruction and the significance of different biochemical markers for estimating the degree of injury and for predicting further destruction of small hand and foot joints. In RA, the investigators identify not only clinical (activity indicators, but also biological (bone, cartilage, and synovium damage markers predictors for joint injury: CТXII is a marker for cartilage degradation (collagen type II and CTXI is a marker for bone degradation (collagen type I and their trends over 4–12 or more weeks. Although the occurrence of erosions is considered to be a major manifestation of joint destruction progression in RA, the functional activity in its early stages is shown to depend on the estimate of joint space narrowing (cartilage degradation to a greater extent than on that of erosions when evaluating the destruction by the modified Sharp method. Several randomized placebocontrolled studies (RPCSs have assessed the association of patients' functional capacity with joint space narrowing or with the number of erosions. In RA, cartilage degradation has been demonstrated to play a larger role in irreversible function loss than bone destruction.The possibility of suppressing cartilage degradation, which is indicated in RPCSs of the efficacy of adalimumab, correlates with a better functional outcome in patients with RA. Serum markers for cartilage metabolism may be not only predictors for further radiographic progression, but also be used to evaluate therapeutic effectiveness.

  3. Galaxy destruction in the violent universe

    Science.gov (United States)

    Purcell, Christopher Wayne

    My dissertation takes a novel interdisciplinary approach to Atlantic slavery in the nineteenth century. Unlike previous work on slave economies, it draws upon transnational studies and, especially, the history of science and technology. My research examines transnational networks of "industrial experts" such as chemists and machinists, paying particular attention to the new forms of knowledge they articulated while working in slave societies. While mostly ignored by scholars of both slavery and industrialization, chemists, engineers, statisticians, and machinists worked extensively in sugar refineries, railroad/telegraph systems, machine shops, automated flour-mills and other nodes of commodity production in slave societies of the Americas. Including these important new players in the sociology of the plantation both enriches our understanding of slave societies, and challenges scholars of the Industrial Revolution in the northern United States and Western Europe to revise some of their longest-held notions about the place of slavery in the development of modern capitalism.

  4. The Combine Use of Semi-destructive and Non-destructive Methods for Tiled Floor Diagnostics

    Science.gov (United States)

    Štainbruch, Jakub; Bayer, Karol; Jiroušek, Tomáš; Červinka, Josef

    2017-04-01

    The combination of semi-destructive and non-destructive methods was used to asset the conditions of a tiled floor in the historical monument Minaret, situated in the park complex of the Chateau Lednice (South Moravia Region, Czech Republic), before its renovation. Another set of measurements is going to be performed after the conservation works are finished. (The comparison of the results collected during pre- and post-remediation measurements will be known and presented during the General Assembly meeting in Wien.) The diagnostic complex of methods consisted of photogrammetry, resistivity drilling and georadar. The survey was aimed to contour extends of air gaps beneath the tiles and the efficiency of filling gaps by means of injection, consolidation and gluing individual layers. The state chateau Lednice creates a part of the Lednice-Valtice precinct, a UNESCO landmark, and belongs among the greatest historic monuments in Southern Moravia. In the chateau park there is a romantic observation tower in the shape of a minaret built according to the plans of Josef Hardtmuth between 1798-1804. The Minaret has been extensively renovated for many decades including the restoration of mosaic floors from Venetian terazzo. During the static works of the Minaret building between 1999-2000, the mosaic floors in the rooms on the second floor were transferred and put back onto concrete slabs. Specifically, the floor was cut up to tiles and these were glued to square slabs which were then attached to the base plate. The transfer was not successful and the floor restoration was finalized between 2016-2017. The damage consisted in separating the original floor from the concrete plate which led to creating gaps. Furthermore, the layers of the floor were not compact. It was necessary to fill the gaps and consolidate and glue the layers. The existence of air gap between individual layers of the tiles and their degradation was detected using two different diagnostic methods: semi-destructive

  5. The results of cutting disks testing for rock destruction

    Directory of Open Access Journals (Sweden)

    Khoreshok Aleksey

    2017-01-01

    Full Text Available To determine the rational order of disk tools placement on the working body is necessary to know the maximum amount of rock, destroyed by the disk tool in benching cutting mode depending on the tool geometry parameters, physical and mechanical parameters of rocks. The article contains the definition of rational parameters of cutting disk tools as well as power and energy parameters of the destruction process by cutting disks and by executive body of the coal cutter. The rational geometric parameters of cutting discs are specified. It was found that each step of cutting with a minimum depth of penetration has its own maximum height of bench outcrop. The dependence of the volumes of large items destroyed by the disk tool on the cutting step height was determined. The existence of the cyclic alternation of destruction phases, regardless the fracture parameters, the height of the ledge outcrop, and tools like free cutting geometry were found. In contrast to the free cutting in benching mode of destruction two large fragments of rocks in one cycle were observed. Consequently, the cyclical nature of the destruction process in the benching mode will be characterized by two chips and crushing, and this cycling repeats throughout the destruction process with the same parameters of destruction.

  6. Osteoclast inhibition impairs chondrosarcoma growth and bone destruction.

    Science.gov (United States)

    Otero, Jesse E; Stevens, Jeff W; Malandra, Allison E; Fredericks, Douglas C; Odgren, Paul R; Buckwalter, Joseph A; Morcuende, Jose

    2014-12-01

    Because Chondrosarcoma is resistant to available chemotherapy and radiation regimens, wide resection is the mainstay in treatment, which frequently results in high morbidity and which may not prevent local recurrence. There is a clear need for improved adjuvant treatment of this malignancy. We have observed the presence of osteoclasts in the microenvironment of chondrosarcoma in human pathological specimens. We utilized the Swarm rat chondrosarcoma (SRC) model to test the hypothesis that osteoclasts affect chondrosarcoma pathogenesis. We implanted SRC tumors in tibia of Sprague-Dawley rats and analyzed bone histologically and radiographically for bone destruction and tumor growth. At three weeks, tumors invaded local bone causing cortical disruption and trabecular resorption. Bone destruction was accompanied by increased osteoclast number and resorbed bone surface. Treatment of rats with the zoledronic acid prevented cortical destruction, inhibited trabecular resorption, and resulted in decreased tumor volume in bone. To confirm that inhibition of osteoclasts per se, and not off-target effects of drug, was responsible for the prevention of tumor growth and bone destruction, we implanted SRC into osteopetrotic rat tibia. SRC-induced bone destruction and tumor growth were impaired in osteopetrotic bone compared with control bone. The results from our animal model demonstrate that osteoclasts contribute to chondrosarcoma-mediated bone destruction and tumor growth and may represent a therapeutic target in particular chondrosarcoma patients. © 2014 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  7. Thickness gauging of thin layers by laser ultrasonics and neural network

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, F; Jenot, F; Ouaftouh, M; Duquennoy, M; Ourak, M, E-mail: Fabien.lefevre@univ-valenciennes.fr [Institut d' Electronique de Microelectronique et de Nanotechnologie Departement Opto-Acousto-Electronique (UMR CNRS 8520), Universite de Valenciennes, Le Mont Houy, 59313 Valenciennes Cedex 09 (France)

    2011-01-01

    Non destructive testing has been performed on a thin indium layer deposited on a two inches silicon wafer. Guided waves were generated and studied using a laser ultrasonic setup, and a two-dimensional Fourier transform technique was employed to obtain the dispersion curves. The inverse problem, in other words the determination of the layer thickness and the elastic constants of the substrate, has been solved by means of a feedforward neural network. These parameters were then evaluated simultaneously, the dispersion curves being entirely fitted. The experimental results show a good agreement with the theoretical model. This inversion method was found to be prompt and easy to automate.

  8. DECONTAMINATION/DESTRUCTION TECHNOLOGY DEMONSTRATION FOR ORGANICS IN TRANSURANIC WASTE

    Energy Technology Data Exchange (ETDEWEB)

    Chris Jones; Javier Del Campo; Patrick Nevins; Stuart Legg

    2002-08-01

    The United States Department of Energy's Savannah River Site has approximately 5000 55-gallon drums of {sup 238}Pu contaminated waste in interim storage. These may not be shipped to WIPP in TRUPACT-II containers due to the high rate of hydrogen production resulting from the radiolysis of the organic content of the drums. In order to circumvent this problem, the {sup 238}Pu needs to be separated from the organics--either by mineralization of the latter or by decontamination by a chemical separation. We have conducted ''cold'' optimization trials and surrogate tests in which a combination of a mediated electrochemical oxidation process (SILVER II{trademark}) and ultrasonic mixing have been used to decontaminate the surrogate waste materials. The surrogate wastes were impregnated with copper oxalate for plutonium dioxide. Our process combines both mineralization of reactive components (such cellulose, rubber, and oil) and surface decontamination of less reactive materials such as polyethylene, polystyrene and polyvinylchloride. By using this combination of SILVER II and ultrasonic mixing, we have achieved 100% current efficiency for the destruction of the reactive components. We have demonstrated that: The degree of decontamination achieved would be adequate to meet both WIPP waste acceptance criteria and TRUPACT II packaging and shipping requirements; The system can maintain near absolute containment of the surrogate radionuclides; Only minimal pre-treatment (coarse shredding) and minimal waste sorting are required; The system requires minimal off gas control processes and monitoring instrumentation; The laboratory trials have developed information that can be used for scale-up purposes; The process does not produce dioxins and furans; Disposal routes for secondary process arisings have already been demonstrated in other programs. Based on the results from Phase 1, the recommendation is to proceed to Phase 2 and use the equipment at Savannah

  9. Ironic Effects of the Destructive Tsunami on Public Risk Judgment

    Science.gov (United States)

    Oki, S.; Nakayachi, K.

    2011-12-01

    The 2011 Tohoku earthquake caused more than 20,000 casualties, with most of the dead and missing in an enormous tsunami. Survivors had simply evacuated to higher ground within approximately 30 minutes of its arrival. This reflects the importance of public perception of tsunami risks represented by its heights. Our question is how the devastating tsunami affected people in the western Japan where a great earthquake is anticipated in near future. Existing risk analysis researches show that the experience of natural disasters increases risk perception, even with indirect experiences such as seeing photographs of disaster scenes or thinking about a major natural calamity. No doubt, we can assume that the devastating tsunami would have led people to have a greater sense of associated risks. Our result, however, shows that the destructive tsunami of Tohoku earthquake lowered the risk assessment of tsunami heights. One possible explanation to this paradoxical result is the anchoring heuristic. It defines that laypersons are highly inclined to judge based on the numbers first presented to them. Media's repeating report of record-breaking tsunamis of 30 m or more anchored people to elevate the height to evacuate. The results of our survey pose a significant problem for disaster prevention. The survey area is at high risk of giant earthquake, and according to our results, more than 50% of the people surveyed no longer sensed the danger of a 1-m-high tsunami, whereas about 70% had perceived its peril before the Tohoku earthquake. This is also of great importance in Indonesia or Chile where huge earthquakes had occurred recently. We scientists need to face up to the fact that improvement of quick calculation of tsunami heights is not sufficient at all to mitigate the tsunami disasters, but reorient how we should inform laypersons to evacuate at the emergency situation.

  10. Controlled information destruction: the final frontier in preserving information security for every organisation

    Science.gov (United States)

    Curiac, Daniel-Ioan; Pachia, Mihai

    2015-05-01

    Information security represents the cornerstone of every data processing system that resides in an organisation's trusted network, implementing all necessary protocols, mechanisms and policies to be one step ahead of possible threats. Starting from the need to strengthen the set of security services, in this article we introduce a new and innovative process named controlled information destruction (CID) that is meant to secure sensitive data that are no longer needed for the organisation's future purposes but would be very damaging if revealed. The disposal of this type of data has to be controlled carefully in order to delete not only the information itself but also all its splinters spread throughout the network, thus denying any possibility of recovering the information after its alleged destruction. This process leads to a modified model of information assurance and also reconfigures the architecture of any information security management system. The scheme we envisioned relies on a reshaped information lifecycle, which reveals the impact of the CID procedure directly upon the information states.

  11. Chemical pathway analysis of the Martian atmosphere: The formation and destruction of ozone

    Science.gov (United States)

    Boxe, C.; Stock, J.; Lehmann, R.; Grenfell, L.; Patzer, A.; Rauer, H.; Yung, Y. L.

    2014-12-01

    Ozone is a species of major importance in the Martian atmosphere e.g. since it is involved in the stabilization of Mars' major atmospheric constituent carbon dioxide. Below XX km altitude, ozone acts as an atomic oxygen source, which is produced by photolysis and oxidizes carbon monoxide via catalytic cycles involving odd hydrogen (HOx=H+OH+HO2). Originating mainly from H2O photolysis, odd hydrogen destroys ozone resulting in the observed anti-correlation between water vapor and ozone. Compared with species from the HOx-family, ozone is relatively easy to detect by e.g. UV spectroscopy or IR heterodyne spectroscopy. Similar to carbon dioxide, the concentration of ozone can be critically influenced by chemical trace species acting as catalysts in chemical pathways. The identification of such chemical pathways in complex reaction networks and the quantification of their contribution is in general challenging. Therefore, we use an automated computer algorithm (PAP - Pathway Analysis Program), which is specifically designed to address such problems. In this work, we apply the PAP-algorithm to the results of the newly updated JPL/Caltech photochemical column model of the Martian atmosphere in order to investigate the Martian atmospheric ozone photochemistry. The efficiencies of individual ozone formation and destruction pathways are calculated for different atmospheric heights, by applying the algorithm to each vertical layer of the column model in turn. The results of our investigations suggest that ozone is primarily produced by a Chapman-like mechanism, whereby atomic oxygen is produced by carbon dioxide photolysis instead of molecular oxygen photolysis. In the ozone layer at approximately 40 km altitude, ozone formation is chiefly dominated by a chemical pathway where atomic oxygen is supplied by vertical transport. Ozone consumption pathways involving ozone photolysis are most efficient except for a layer around 40 km altitude where the reaction between ozone and

  12. In-situ Non-destructive Studies on Biofouling Processes in Reverse Osmosis Membrane Systems

    KAUST Repository

    Farhat, Nadia

    2016-12-01

    Reverse osmosis (RO) and nanofiltration (NF) membrane systems are high-pressure membrane filtration processes that can produce high quality drinking water. Biofouling, biofilm formation that exceeds a certain threshold, is a major problem in spiral wound RO and NF membrane systems resulting in a decline in membrane performance, produced water quality, and quantity. In practice, detection of biofouling is typically done indirectly through measurements of performance decline. Existing direct biofouling detection methods are mainly destructive, such as membrane autopsies, where biofilm samples can be contaminated, damaged and resulting in biofilm structural changes. The objective of this study was to test whether transparent luminescent planar oxygen sensing optodes, in combination with a simple imaging system, can be used for in-situ, non-destructive biofouling characterization. Aspects of the study were early detection of biofouling, biofilm spatial patterning in spacer filled channels, and the effect of feed cross-flow velocity, and feed flow temperature. Oxygen sensing optode imaging was found suitable for studying biofilm processes and gave detailed spatial and quantitative biofilm development information enabling better understanding of the biofouling development process. The outcome of this study attests the importance of in-situ, non-destructive imaging in acquiring detailed knowledge on biofilm development in membrane systems contributing to the development of effective biofouling control strategies.

  13. Collaborative learning in networks.

    Science.gov (United States)

    Mason, Winter; Watts, Duncan J

    2012-01-17

    Complex problems in science, business, and engineering typically require some tradeoff between exploitation of known solutions and exploration for novel ones, where, in many cases, information about known solutions can also disseminate among individual problem solvers through formal or informal networks. Prior research on complex problem solving by collectives has found the counterintuitive result that inefficient networks, meaning networks that disseminate information relatively slowly, can perform better than efficient networks for problems that require extended exploration. In this paper, we report on a series of 256 Web-based experiments in which groups of 16 individuals collectively solved a complex problem and shared information through different communication networks. As expected, we found that collective exploration improved average success over independent exploration because good solutions could diffuse through the network. In contrast to prior work, however, we found that efficient networks outperformed inefficient networks, even in a problem space with qualitative properties thought to favor inefficient networks. We explain this result in terms of individual-level explore-exploit decisions, which we find were influenced by the network structure as well as by strategic considerations and the relative payoff between maxima. We conclude by discussing implications for real-world problem solving and possible extensions.

  14. METHODS OF ASSESSING THE DEGREE OF DESTRUCTION OF RUBBER PRODUCTS USING COMPUTER VISION ALGORITHMS

    Directory of Open Access Journals (Sweden)

    A. A. Khvostov

    2015-01-01

    Full Text Available For technical inspection of rubber products are essential methods of improving video scopes analyzing the degree of destruction and aging of rubber in an aggressive environment. The main factor determining the degree of destruction of the rubber product, the degree of coverage is cracked, which can be described as the amount of the total area, perimeter cracks, geometric shapes and other parameters. In the process of creating a methodology for assessing the degree of destruction of rubber products arises the problem of the development of machine vision algorithm for estimating the degree of coverage of the sample fractures and fracture characterization. For the development of image processing algorithm performed experimental studies on the artificial aging of several samples of products that are made from different rubbers. In the course of the experiments it was obtained several samples of shots vulcanizates in real time. To achieve the goals initially made light stabilization of array images using Gaussian filter. Thereafter, for each image binarization operation is applied. To highlight the contours of the surface damage of the sample is used Canny algorithm. The detected contours are converted into an array of pixels. However, a crack may be allocated to several contours. Therefore, an algorithm was developed by combining contours criterion of minimum distance between them. At the end of the calculation is made of the morphological features of each contour (area, perimeter, length, width, angle of inclination, the At the end of the calculation is made of the morphological features of each contour (area, perimeter, length, width, angle of inclination, the Minkowski dimension. Show schedule obtained by the method parameters destruction of samples of rubber products. The developed method allows you to automate assessment of the degree of aging of rubber products in telemetry systems, to study the dynamics of the aging process of polymers to

  15. Relationship-based nursing care and destructive demands.

    Science.gov (United States)

    Kristoffersen, Margareth; Friberg, Febe

    2017-09-01

    The relationship between the nurse and the patient is understood as fundamental in nursing care. However, numerous challenges can be related to the provision of relationship-based nursing care. Challenges exist when nurses do not respond adequately to the patient's appeal for help. Moreover, challenges arising in the nurse-patient relationship can be understood as more destructive demands from the patient to the nurse, thus begging inquiry into such a relationship. The overall aim is to explore and argue the relevance of problematizing destructive demands evident within relationship-based nursing care. This theoretical article explores destructive demands based on the phenomenological philosophy of the Danish theologian and philosopher Knud E. Løgstrup and provides examples of nurses' experiences in everyday nursing care. The examples are drawn from a Norwegian empirical study based on a hermeneutical research design. Participants and research context: Data consisted of qualitative interviews and qualitative follow-up interviews with 13 nurses with varying work experience within the primary and secondary somatic and psychiatric health service, from inside as well as outside institutions. Ethical consideration: The original empirical study was approved by the Norwegian Social Science Data Services. Information was given and consent was obtained from the participants. Two themes are described: strong impressions formed in meetings with patients and persistent concern over the burden of work and ability to endure. Destructive demands related to relationship-based nursing care are discussed along two lines, first, by further elucidating nurses' everyday experiences connected to destructive demands and, second, by highlighting the significance of including destructive demands within the relationship-based nursing care. Including destructive demands related to relationship-based nursing care is of particular significance in enabling the proposition that radical, one

  16. Astrophysical S-factor for destructive reactions of lithium-7 in big bang nucleosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Komatsubara, Tetsuro; Kwon, YoungKwan; Moon, JunYoung; Kim, Yong-Kyun [Rare Isotope Science Project, Institute for Basic Science, Daejeon (Korea, Republic of); Moon, Chang-Bum [Hoseo University, Asan, Chungnam (Korea, Republic of); Ozawa, Akira; Sasa, Kimikazu; Onishi, Takahiro; Yuasa, Toshiaki; Okada, Shunsuke; Saito, Yuta [Division of Physics, University of Tsukuba, Tsukuba, Ibaraki (Japan); Hayakawa, Takehito; Shizuma, Toshiyuki [Japan Atomic Energy Agency, Shirakata Shirane, Tokai, Ibaraki (Japan); Kubono, Shigeru [RIKEN, Hirosawa, Wako, Saitama (Japan); Kusakabe, Motohiko [School of Liberal Arts and Science, Korea Aerospace University (Korea, Republic of); Kajino, Toshitaka [National Astronomical Observatory, Osawa, Mitaka, Tokyo (Japan)

    2014-05-02

    One of the most prominent success with the Big Bang models is the precise reproduction of mass abundance ratio for {sup 4}He. In spite of the success, abundances of lithium isotopes are still inconsistent between observations and their calculated results, which is known as lithium abundance problem. Since the calculations were based on the experimental reaction data together with theoretical estimations, more precise experimental measurements may improve the knowledge of the Big Bang nucleosynthesis. As one of the destruction process of lithium-7, we have performed measurements for the reaction cross sections of the {sup 7}L({sup 3}He,p){sup 9}Be reaction.

  17. Destruction of explosives in groundwater and process water using photocatalytic and biological methods

    Energy Technology Data Exchange (ETDEWEB)

    Rodacy, P.J.; Leslie, P.K.; Prairie, M.R. [and others

    1996-04-01

    The environmentally safe destruction of pinkwater is a significant problem that requires a multidisciplinary approach to solve. We have investigated the application of advanced oxidation processes, including the use of both UV light source and laser technologies. The reactions were run under both oxidizing and reducing atmospheres. Aerobic and anaerobic biotreatments were examined as both pre- and post-treatments to the oxidation processes. The toxicity of the wastewater at various stages of treatment was determined. Membrane preconcentration schemes were examined to determine their effectiveness as part of the total pinkwater treatment scheme.

  18. Application of an Elman neural network to the problem of predicting the throughput of a petroleum collecting station; Previsao da vazao de uma estacao coletora de petroleo utilizando redes neurais de Elman

    Energy Technology Data Exchange (ETDEWEB)

    Paula, Wesley R. de [Universidade Federal de Campina Grande (UFCG), PB (Brazil). Curso de Pos-Graduacao em Informatica; Sousa, Andre G. de [Universidade Federal de Campina Grande (UFCG), PB (Brazil). Curso de Ciencia da Computacao; Gomes, Herman M.; Galvao, Carlos de O. [Universidade Federal de Campina Grande (UFCG), PB (Brazil)

    2004-07-01

    The objective of this paper is to present an initial study on the application of an Elman Neural Network to the problem of predicting the throughput of a petroleum collecting station. This study is part of a wider project, which aims at producing an automatic real-time system to remotely control a petroleum distribution pipeline, in such a way that optimum efficiency can be assured in terms of: (I) maximizing the volume of oil transported; and (II) minimizing energy consumption, risks of failures and damages to the environment. Experiments were carried out to determine the neural network parameters and to examine its performance under varying prediction times in the future. Promising results (with low MSE) have been obtained for predictions obtained up to 10 minutes in the future. (author)

  19. Problems in problem analysis

    DEFF Research Database (Denmark)

    Almegaard, Henrik

    2014-01-01

    The majority of literature on engineering design methods is focused on the processes of fulfilling the design goals as efficiently as possible. This paper will focus on - and discuss - the processes of determining the design goals: the specifications. The purpose is to draw attention to the inher...... to the inherent problems, dilemmas and possibilities in these processes bearing in mind that that the most important decisions in a design project are taken in the beginning of the project....

  20. Hamster and Murine Models of Severe Destructive Lyme Arthritis

    Directory of Open Access Journals (Sweden)

    Erik Munson

    2012-01-01

    Full Text Available Arthritis is a frequent complication of infection in humans with Borrelia burgdorferi. Weeks to months following the onset of Lyme borreliosis, a histopathological reaction characteristic of synovitis including bone, joint, muscle, or tendon pain may occur. A subpopulation of patients may progress to a chronic, debilitating arthritis months to years after infection which has been classified as severe destructive Lyme arthritis. This arthritis involves focal bone erosion and destruction of articular cartilage. Hamsters and mice are animal models that have been utilized to study articular manifestations of Lyme borreliosis. Infection of immunocompetent LSH hamsters or C3H mice results in a transient synovitis. However, severe destructive Lyme arthritis can be induced by infecting irradiated hamsters or mice and immunocompetent Borrelia-vaccinated hamsters, mice, and interferon-gamma- (IFN-γ- deficient mice with viable B. burgdorferi. The hamster model of severe destructive Lyme arthritis facilitates easy assessment of Lyme borreliosis vaccine preparations for deleterious effects while murine models of severe destructive Lyme arthritis allow for investigation of mechanisms of immunopathology.

  1. Indirect self-destructiveness in individuals with schizophrenia

    Directory of Open Access Journals (Sweden)

    Konstantinos Tsirigotis

    2017-06-01

    Full Text Available Objective: To explore the indirect self-destructiveness syndrome in patients with schizophrenia. Methods: Two hundred individuals with paranoid schizophrenia (117 men and 83 women, mean age 37.15 years, all in remission, were examined using the Polish version of the Chronic Self-Destructiveness Scale. Two hundred well-matched healthy individuals served as a control group. Results: The intensity of indirect self-destructiveness was greater in the schizophrenia group than in controls. The intensity of each manifestation was as follows (in decreasing order: helplessness and passiveness in the face of difficulties (A5, personal and social neglects (A3, lack of planfulness (A4, poor health maintenance (A2, transgression and risk (A1. Conclusion: Patients with schizophrenia displayed more behaviors that were indirectly self-destructive than healthy controls; they scored better than healthy controls only on caring for their own health. The patients showed the lowest intensity of behaviors connected with the active form of indirect self-destructiveness, and the highest intensity of behaviors connected with the passive form. These findings may enable delivery of more effective forms of pharmacological and psychosocial help to patients with schizophrenia.

  2. Hamster and Murine Models of Severe Destructive Lyme Arthritis

    Science.gov (United States)

    Munson, Erik; Nardelli, Dean T.; Du Chateau, Brian K.; Callister, Steven M.; Schell, Ronald F.

    2012-01-01

    Arthritis is a frequent complication of infection in humans with Borrelia burgdorferi. Weeks to months following the onset of Lyme borreliosis, a histopathological reaction characteristic of synovitis including bone, joint, muscle, or tendon pain may occur. A subpopulation of patients may progress to a chronic, debilitating arthritis months to years after infection which has been classified as severe destructive Lyme arthritis. This arthritis involves focal bone erosion and destruction of articular cartilage. Hamsters and mice are animal models that have been utilized to study articular manifestations of Lyme borreliosis. Infection of immunocompetent LSH hamsters or C3H mice results in a transient synovitis. However, severe destructive Lyme arthritis can be induced by infecting irradiated hamsters or mice and immunocompetent Borrelia-vaccinated hamsters, mice, and interferon-gamma- (IFN-γ-) deficient mice with viable B. burgdorferi. The hamster model of severe destructive Lyme arthritis facilitates easy assessment of Lyme borreliosis vaccine preparations for deleterious effects while murine models of severe destructive Lyme arthritis allow for investigation of mechanisms of immunopathology. PMID:22461836

  3. Balance Problems

    Science.gov (United States)

    ... it could be a sign of a balance problem. Balance problems can make you feel unsteady. You may also ... injuries, such as a hip fracture. Some balance problems are due to problems in the inner ear. ...

  4. Assessment of disinfectants in explosive destruction system for biological agent destruction : LDRD final report FY04.

    Energy Technology Data Exchange (ETDEWEB)

    Simmons, Blake Alexander; Didlake, John E. Jr.; Bradshaw, Robert W.; Crooker, Paul J.; Buffleben, George M.

    2005-01-01

    Treatment systems that can neutralize biological agents are needed to mitigate risks from novel and legacy biohazards. Tests with Bacillus thuringiensis and Bacillus steurothemophilus spores were performed in a 190-liter, 1-112 lb TNT equivalent rated Explosive Destruction System (EDS) system to evaluate its capability to treat and destroy biological agents. Five tests were conducted using three different agents to kill the spores. The EDS was operated in steam autoclave, gas fumigation and liquid decontamination modes. The first three tests used EDS as an autoclave, which uses pressurized steam to kill the spores. Autoclaving was performed at 130-140 deg C for up to 2-hours. Tests with chlorine dioxide at 750 ppm concentration for 1 hour and 10% (vol) aqueous chlorine bleach solution for 1 hour were also performed. All tests resulted in complete neutralization of the bacterial spores based on no bacterial growth in post-treatment incubations. Explosively opening a glass container to expose the bacterial spores for treatment with steam was demonstrated and could easily be done for chlorine dioxide gas or liquid bleach.

  5. Analog Processor To Solve Optimization Problems

    Science.gov (United States)

    Duong, Tuan A.; Eberhardt, Silvio P.; Thakoor, Anil P.

    1993-01-01

    Proposed analog processor solves "traveling-salesman" problem, considered paradigm of global-optimization problems involving routing or allocation of resources. Includes electronic neural network and auxiliary circuitry based partly on concepts described in "Neural-Network Processor Would Allocate Resources" (NPO-17781) and "Neural Network Solves 'Traveling-Salesman' Problem" (NPO-17807). Processor based on highly parallel computing solves problem in significantly less time.

  6. Spare nonlinear systems resolution; its applicability in the resolution of the problem related power flow in electric power networks; Resolucao de sistemas nao-lineares esparsos; sua aplicacao na resolucao do problema de fluxo de carga em redes de energia eletrica

    Energy Technology Data Exchange (ETDEWEB)

    Duran, Ana Cecilia

    1990-03-01

    This thesis aims to find a better way to solve large scale nonlinear sparse system problems giving special emphasis to load flow in electric power networks. The suggested algorithms are presented 63 refs., 28 figs., 16 tabs.

  7. Concurrency Control in the Problem of Automatic Substitution of the Dataflow Network Agent on Smart-M3 Platform and in the Internet of Things

    Directory of Open Access Journals (Sweden)

    S. I. Balandin

    2012-01-01

    Full Text Available The paper describes implementation of dataflow networks based on Smart-M3 platform for use cases related to the Internet of Things. The mechanism for automatic substitution of computational agents created on top of Smart-M3 platform is described. The paper reviews concurrency issues of the developed solution regarding Smart-M3 platform, as well as in the broader context of the Internet of Things.

  8. MATHEMATICAL MODEL FOR CALCULATION OF MINIMUM PRESSURE PERTAINING TO DESTRUCTION OF SURFACE CORROSION LAYER DUE TO IMPACT OF WORKING LIQUID REVERSIVE STREAM

    Directory of Open Access Journals (Sweden)

    I. V. Kachanov

    2014-01-01

    Full Text Available Due to balance of external and internal force capacities a variation quasistatic problem has been solved in the paper. The problem allows to determine optimum values of α and β angles in the accepted field of sliding lines when destruction pressure takes on a minimum value pmin. It has been ascertained that the minimum pressure pmin which is necessary for destruction of a corrosion layer is registered at stream compression coefficient λ = 0,063 and the pressure is equal to 8-17 MPa for the investigated speed range v = 80-140 m/s.

  9. Winnicott on Jung: destruction, creativity and the unrepressed unconscious.

    Science.gov (United States)

    Meredith-Owen, William

    2011-02-01

    This paper considers Winnicott's critique of Jung, principally expressed in his review of Memories, Dreams, Reflections, which asserts that Jung's creative contribution to analysis was constrained by his failure to integrate his 'primitive destructive impulses', subsequent to inadequate early containment. It is argued that although Winnicott's diagnosis illuminates Jung's shadow, particularly his constraints vis-à-vis the repressed Freudian unconscious, it fails to appreciate the efficacy of the compensatory containment Jung found in the collective unconscious. This enigmatic relationship between destruction and creativity-so central to late Winnicott-is illuminated by Matte Blanco's bi-logic, and further explored in relation to William Blake. Winnicott's personal resolution through his Jung-inspired 'splitting headache' dream of destruction-previously considered in this Journal by Morey (2005) and Sedgwick (2008)-is given particular attention. © 2011, The Society of Analytical Psychology.

  10. [Role of microorganisms in the destruction of spodumene].

    Science.gov (United States)

    Karavaĭko, G I; Krutsko, V S; Mel'nikova, E O; Avakian, Z A; Ostroushko, Iu I

    1980-01-01

    A broad spectrum of microorganisms has been shown to be involved in the destruction of spodumene, a typical mineral of lithium pegmatites. The following microorganisms are most active: the microscopic fungi Penicillium notatum and Aspergillus niger, the thiobacilli Thiobacillus thiooxidans, and the so-called "silicate" slime forming bacterium Bacillus micilaginosus n. sp. siliceus. Spodumene destruction is accompanied with lithium, aluminium and silicon being transferred into solution. The activity of this process depends on the microbial species, the pH of the medium, and some other factors. Lithium and aluminium are extracted best of all at acid pH values whereas silicon at alkaline pH values. Possible mechanisms for spodumene destruction by microorganisms are discussed.

  11. 27 CFR 25.223 - Destruction of beer off brewery premises.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Destruction of beer off... TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Voluntary Destruction § 25.223 Destruction of beer off brewery premises. (a) Destruction without supervision. A brewer may destroy beer without...

  12. NASA's unique networking environment

    Science.gov (United States)

    Johnson, Marjory J.

    1988-01-01

    Networking is an infrastructure technology; it is a tool for NASA to support its space and aeronautics missions. Some of NASA's networking problems are shared by the commercial and/or military communities, and can be solved by working with these communities. However, some of NASA's networking problems are unique and will not be addressed by these other communities. Individual characteristics of NASA's space-mission networking enviroment are examined, the combination of all these characteristics that distinguish NASA's networking systems from either commercial or military systems is explained, and some research areas that are important for NASA to pursue are outlined.

  13. Product acceptance environmental and destructive testing for reliability.

    Energy Technology Data Exchange (ETDEWEB)

    Dvorack, Michael A.; Kerschen, Thomas J.; Collins, Elmer W.

    2007-08-01

    To determine whether a component is meeting its reliability requirement during production, acceptance sampling is employed in which selected units coming off the production line are subjected to additional environmental and/or destructive tests that are within the normal environment space to which the component is expected to be exposed throughout its life in the Stockpile. This report describes what these tests are and how they are scored for reliability purposes. The roles of screens, Engineering Use Only tests, and next assembly product acceptance testing are also discussed, along with both the advantages and disadvantages of environmental and destructive testing.

  14. Coupled field induced conversion between destructive and constructive quantum interference

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Xiangqian, E-mail: xqjiang@hit.edu.cn; Sun, Xiudong

    2016-12-15

    We study the control of quantum interference in a four-level atom driven by three coherent fields forming a closed loop. The spontaneous emission spectrum shows two sets of peaks which are dramatically influenced by the fields. Due to destructive quantum interference, a dark line can be observed in the emission spectrum, and the condition of the dark line is given. We found that the conversion between destructive and constructive quantum interference can be achieved through controlling the Rabi frequency of the external fields.

  15. Destructive behavior of iron oxide in projectile impact

    Science.gov (United States)

    Shang, Wang; Xiaochen, Wang; Quan, Yang; Zhongde, Shan

    2017-12-01

    The damage strain values of Q235-A surface oxide scale were obtained by scanning electron microscopy (SEM/EDS) and universal tensile testing machine. The finite element simulation was carried out to study the destruction effects of oxidation at different impact rates. The results show that the damage value of the oxide strain is 0.08%. With the increase of the projectile velocity, the damage area of the oxide scale is increased, and the damage area is composed of the direct destruction area and the indirect failure area. The indirect damage area is caused by the stress/strain to the surrounding expansion after the impact of the steel body.

  16. Non-destructive state measurement of individual neutral atoms

    Science.gov (United States)

    Gibbons, Michael; Shih, Chung-Yu; Hamley, Chris; Chapman, Michael

    2011-05-01

    Non-destructive state detection of individual neutral atoms is essential for scalable neutral atom quantum information processing. We have demonstrated non-destructive fluorescent state detection of individual neutral atom qubits trapped in an optical lattice. The hyperfine state of the atom is measured with 95% accuracy and the atom loss rate of 1%. State detection is performed on individual atoms over 100 times before being lost from the trap, representing a significant increase in the data collection rates. Using this technique, we have observed microwave Rabi oscillations with measurements done on one-and-the-same atom.

  17. Job creation and destruction, worker reallocation and wages

    DEFF Research Database (Denmark)

    Belzil, Christian

    1997-01-01

    Using Danish firm level data on employment dynamics merged with individual records on all workers in a given firm, various measures of employment and worker reallocation used in the macroeconomics literature are incorporated in a wage equation framework. The effects of job creation/destruction an......Using Danish firm level data on employment dynamics merged with individual records on all workers in a given firm, various measures of employment and worker reallocation used in the macroeconomics literature are incorporated in a wage equation framework. The effects of job creation....../destruction and worker rellocation are estimated using standard panel data techniques. Brief results will go here!!!...

  18. Feather loss and feather destructive behavior in pet birds.

    Science.gov (United States)

    Rubinstein, Jonathan; Lightfoot, Teresa

    2014-01-01

    Feather loss in psittacine birds is a common and frustrating clinical presentation. Causes include medical and nonmedical causes of feather loss with and without overt feather destructive behavior. Underlying causes include inappropriate husbandry and housing; parasitic, viral and bacterial infections; metabolic and allergic diseases; and behavioral disorders. Prior to a diagnosis of a behavioral disorder, medical causes of feather loss must be excluded through a complete medical work-up including history, physical examination, and diagnostic testing. This article focuses on common medical and nonmedical causes of feather loss and feather destructive behavior and approaches to diagnosis and treatment. Copyright © 2014 Elsevier Inc. All rights reserved.

  19. An extremely broad band metamaterial absorber based on destructive interference.

    Science.gov (United States)

    Sun, Jingbo; Liu, Lingyun; Dong, Guoyan; Zhou, Ji

    2011-10-24

    We propose a design of an extremely broad frequency band absorber based on destructive interference mechanism. Metamaterial of multilayered SRRs structure is used to realize a desirable refractive index dispersion spectrum, which can induce a successive anti-reflection in a wide frequency range. The corresponding high absorptance originates from the destructive interference of two reflection waves from the two surfaces of the metamaterial. A strongly absorptive bandwidth of almost 60 GHz is demonstrated in the range of 0 to 70 GHz numerically. This design provides an effective and feasible way to construct broad band absorber in stealth technology, as well as the enhanced transmittance devices. © 2011 Optical Society of America

  20. Periodontium destruction associated with oncology therapy. Five case reports

    Energy Technology Data Exchange (ETDEWEB)

    Wright, W.E.

    1987-08-01

    Radiation treatment to the head and neck and cytotoxic chemotherapy can produce deleterious side effects to the periodontium that are generally transient in nature, reversible, and do not result in permanently visible defects. However, combinations of the malignant disease itself, the direct and indirect effects of medical therapy and associated oral infections, along with local trauma can lead to periodontal tissue destruction with resulting permanent architectural defects. Five case reports illustrate destructive alterations of the periodontium that were associated with oncology therapy. Proposed guidelines for periodontal treatment of compromised individuals undergoing oncology therapies are suggested.