WorldWideScience

Sample records for network device management

  1. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  2. Method and system for mesh network embedded devices

    Science.gov (United States)

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  3. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  4. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  5. Resource management for device-to-device underlay communication

    CERN Document Server

    Song, Lingyang; Xu, Chen

    2013-01-01

    Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication.This

  6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  7. A Scalable Policy and SNMP Based Network Management Framework

    Institute of Scientific and Technical Information of China (English)

    LIU Su-ping; DING Yong-sheng

    2009-01-01

    Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management. However,cross-vendor hardware compatibility is one of the limitations in policy-based management. Devices existing in current network mostly support SNMP rather than Common Open Policy Service (COPS) protocol. By analyzing traditional network management and policy-based network management, a scalable network management framework is proposed. It is combined with Internet Engineering Task Force (IETF) framework for policybased management and SNMP-based network management. By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.

  8. Resource Management for Device-to-Device Communications in Heterogeneous Networks Using Stackelberg Game

    Directory of Open Access Journals (Sweden)

    Yinuo He

    2014-01-01

    Full Text Available Device-to-device (D2D communications and femtocell systems can bring significant benefits to users’ throughput. However, the complicated three-tier interference among macrocell, femtocell, and D2D systems is a challenging issue in heterogeneous networks. As D2D user equipment (UE can cause interference to cellular UE, scheduling and allocation of channel resources and power of D2D communication need elaborate coordination. In this paper, we propose a joint scheduling and resource allocation scheme to improve the performance of D2D communication. We take UE rate and UE fairness into account by performing interference management. First, we construct a Stackelberg game framework in which we group a macrocellular UE, a femtocellular UE, and a D2D UE to form a two-leader one-follower pair. The cellular UE are leaders, and D2D UE is the follower who buys channel resources from the leaders. We analyze the equilibrium of the game and obtain solutions to the equilibrium. Second, we propose an algorithm for joint scheduling of D2D pairs based on their utility. Finally, we perform computer simulations to study the performance of the proposed scheme.

  9. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  10. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  11. Network management, status and directions

    International Nuclear Information System (INIS)

    Cottrell, R.L.A.; Streater, T.C.

    1992-09-01

    It has been said that the ''network is the system''. This implies providing levels of service, reliability, predictability and availability that are commensurate with or better than those that individual computers provide today. To provide this requires integrated network management for interconnected networks of heterogeneous devices covering both the local campus and across the world and spanning many administrative domains. This talk will review the status of existing tools to address management for networks. It draws on experience from both within and outside the HEP community

  12. Role of management devices in enacting strategy

    DEFF Research Database (Denmark)

    Harritz, Daniel

    2016-01-01

    the SSC’s creation. Originality/value - This study is the first to use a performative method to highlight the temporary and local nature of enacting strategic decisions to construct an SSC in the public sector. Keywords: Management control, SSC, strategic change, actor-network theory, organizational......Purpose - This study illustrates the role of management devices in enacting strategy and strategic decisions, resulting in the development of a Shared Service Centre (SSC) in a Danish municipality. It shows how devices interact in defending, rejecting and reframing strategy, leading to the closure...... the active role of non-human entities, such as management devices, in enacting and reformulating strategy. Findings - Different devices have become key actants in shaping and formulating the new strategy in the municipality and the strategic decision to construct a SSC. However, different devices mobilise...

  13. Semantic Technologies for User-Centric Home Network Management

    OpenAIRE

    Ibrahim Rana, Annie

    2015-01-01

    Home area network (HAN) management is problematic for ordinary home users. Lack of user expertise, potential complexity of administration tasks, extreme diversity of network devices, price pressures producing devices with minimal feature sets, and highly dynamic requirements of user applications are some of the main challenges in HANs. As networking becomes enabled in many more HAN devices, these problems are set to increase. A viable solution to address these challenges lie...

  14. Network-Assisted Distributed Fairness-Aware Interference Coordination for Device-to-Device Communication Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Francis Boabang

    2017-01-01

    Full Text Available Device-to-device (D2D communication underlaid cellular network is considered a key integration feature in future cellular network. However, without properly designed interference management, the interference from D2D transmission tends to degrade the performance of cellular users and D2D pairs. In this work, we proposed a network-assisted distributed interference mitigation scheme to address this issue. Specifically, the base station (BS acts as a control agent that coordinates the cross-tier interference from D2D transmission through a taxation scheme. The cotier interference is controlled by noncooperative game amongst D2D pairs. In general, the outcome of noncooperative game is inefficient due to the selfishness of each player. In our game formulation, reference user who is the victim of cotier interference is factored into the payoff function of each player to obtain fair and efficient outcome. The existence, uniqueness of the Nash Equilibrium (NE, and the convergence of the proposed algorithm are characterized using Variational Inequality theory. Finally, we provide simulation results to evaluate the efficiency of the proposed algorithm.

  15. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  16. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  17. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  18. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    , such as limited wireless bandwidth operation, routing, scheduling, network control, etc. Currently Bluetooth specification particularly does not describe in details about how to implement Quality of Service and Resource Management in Bluetooth protocol stacks. These issues become significant, when the number...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... capacity allocation, network traffic control, inter-piconet scheduling, and buffer management. First, after a short presentation about Bluetooth technology, and QoS issues, queueing models and a simulation-based buffer management have been constructed. Then by using analysis and simulation, it shows some...

  19. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.; Sorour, Sameh; Al-Naffouri, Tareq Y.; Yang, Hong-Chuan; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost

  20. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  1. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  2. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices.

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  3. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures. PMID:29066942

  4. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  5. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  6. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2017-10-01

    Full Text Available In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU devices to convolutional neural networks (CNNs. We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  7. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Directory of Open Access Journals (Sweden)

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  8. Nominal Device Support for ATCA Shelf Manager

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Bruno; Carvalho, Paulo F.; Rodrigues, A.P.; Carvalho, Bernardo B.; Sousa, Jorge; Batista, Antonio J.N.; Combo, Alvaro M.; Cruz, Nuno; Correia, Carlos M.B.A.; Goncalves, Bruno [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Correia, Miguel [Centro de Instrumentacao, Departamento de Fisica, Universidade de Coimbra, 3004-516 Coimbra (Portugal)

    2015-07-01

    The ATCA standard specifies a mandatory Shelf Manager (ShM) unit which is a key element for the system operation. It includes the Intelligent Platform Management Controller (IPMC) which monitors the system health, retrieves inventory information and controls the Field Replaceable Units (FRUs). These elements enable the intelligent health monitoring, providing high-availability and safety operation, ensuring the correct system operation. For critical systems like ones of tokamak ITER these features are mandatory to support the long pulse operation. The Nominal Device Support (NDS) was designed and developed for the ITER CODAC Core System (CCS), which will be the responsible for plant Instrumentation and Control (I and C), supervising and monitoring on ITER. It generalizes the Enhanced Physics and Industrial Control System (EPICS) device support interface for Data Acquisition (DAQ) and timing devices. However the support for health management features and ATCA ShM are not yet provided. This paper presents the implementation and test of a NDS for the ATCA ShM, using the ITER Fast Plant System Controller (FPSC) prototype environment. This prototype is fully compatible with the ITER CCS and uses the EPICS Channel Access (CA) protocol as the interface with the Plant Operation Network (PON). The implemented solution running in an EPICS Input / Output Controller (IOC) provides Process Variables (PV) to the PON network with the system information. These PVs can be used for control and monitoring by all CA clients, such as EPICS user interface clients and alarm systems. The results are presented, demonstrating the fully integration and the usability of this solution. (authors)

  9. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  10. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  11. ATCA Shelf Manager EPICS device support for ITER CODAC Core System

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Bruno, E-mail: bsantos@ipfn.ist.utl.pt [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Carvalho, Paulo F.; Rodrigues, A.P.; Carvalho, Bernardo B.; Sousa, Jorge; Batista, António J.N.; Correia, Miguel; Combo, Álvaro M.; Cruz, Nuno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Correia, Carlos M.B.A. [Centro de Instrumentação, Departamento de Física, Universidade de Coimbra, 3004-516 Coimbra (Portugal); Gonçalves, Bruno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-10-15

    Highlights: • This architecture targets the health management integration into the NDS. • The developed solution supports the ShM redundancy features, specified by ATCA. • The average RTT was around 59 ms and in 99.9% of the cases was less than 130 ms. • Without losing any update cycle, can monitor a system shelf with approximately 400 sensors. • This solution enables the user to configure the entire system in DB files and st.cmd. - Abstract: The ITER CODAC Core System (CCS) is responsible for plant Instrumentation and Control (I&C) supervising and monitoring. This system uses the Enhanced Physics and Industrial Control System (EPICS) Channel Access (CA) protocol as the interface with the Plant Operation Network (PON). This paper presents a generic EPICS device support developed for the integration of the ATCA Shelf Manager (ShM) into the ITER CCS, providing scalability and easy configuration. The device support uses the available HTTP interface on Shelf Manager in the communication layer. Both HTTP server and sensors/actuators definitions can be configured using the EPICS database file and the Input/Output Controller (IOC) initialization file. A proposal based on this device is also presented, targeting the Nominal Device Support (NDS) for health management. The EPICS device support running in an IOC provides Process Variables (PV) to the PON network with the system information and these PVs can be used by all CA clients, such as EPICS user interface clients, alarm systems and archive systems. Operation with redundant ATCA ShMs and device support scalability tests were performed and the results are presented.

  12. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Science.gov (United States)

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  13. Implementation and role of device management Solutions to the end users

    OpenAIRE

    Egbeni, Victor Kanayo

    2009-01-01

    This research is based on consumer complaints with respect to recently purchased consumer electronics. This research document will investigate the instances of development and device management as a tool used to aid consumer and manage consumer’s mobile products in order to resolve issues in or before the consumers is aware one exists. The problem at the present time is that mobile devices are becoming very advanced pieces of technology, and not all manufacturers and network providers have ke...

  14. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  15. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  16. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  17. On Managed Services Lanes and their Use in Home Networks

    NARCIS (Netherlands)

    Hartog, F.T.H. den; Nooren, P.A.; Delphinanto, A.; Fledderus, E.R

    2013-01-01

    Home networks show an increasing level of heterogeneity regarding the devices connected, network technologies used, and services supported. Heterogeneity inhibits quality assurance for new services, such as online gaming, energy management, and health care. This paper focuses on the role that the

  18. Impact of stand-by energy losses in electronic devices on smart network performance

    Directory of Open Access Journals (Sweden)

    Mandić-Lukić Jasmina S.

    2012-01-01

    Full Text Available Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic devices is needed to operate or to be in their stand-by mode. The consumption of these devices is added to the consumption of many other electronic devices already in use in households and offices, thus giving rise to the overall power consumption and threatening to counteract the primary function of smart networks. This paper addresses the consumption of particular electronic devices, with an emphasis placed on their thermal losses when in stand-by mode and their total share in the overall power consumption in certain countries. The thermal losses of electronic devices in their stand-by mode are usually neglected, but it seems theoretically possible that a massive increase in their number can impact net performance of the future smart networks considerably so that above an optimum level of energy savings achieved by their penetration, total consumption begins to increase. Based on the current stand-by energy losses from the existing electronic devices, we propose that the future penetration of smart networks be optimized taking also into account losses from their own electronic devices, required to operate in stand-by mode.

  19. Computerized management of radiology department: Installation and use of local area network(LAN) by personal computers

    International Nuclear Information System (INIS)

    Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo

    1993-01-01

    There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe

  20. Group handoff management in low power microcell-femtocell network

    Directory of Open Access Journals (Sweden)

    Debashis De

    2017-02-01

    Full Text Available This paper presents an analytical model of group based hand-off management based on bird flocking behavior. In the proposed scheme, a number of mobile devices form a group if these devices move together for a long time duration. Although call delivery or call generation are performed individually, hand-off is performed in a group. Dynamic group formation, group division and group merging methods are proposed in this paper. From the simulation results it is demonstrated that approximately 75%, 65% and 90% reduction in power, cost and latency consumption can be obtained respectively using group hand-off management. Thus the proposed scheme is referred as green, economic and fast hand-off strategy. In this paper instead of a macrocell network, a microcell-femtocell network is considered as the transmission power of a microcell or a femtocell base station is much less than a macrocell base station. Simulation results present that the microcell-femtocell network achieves approximately 25–55% and 35–55% reduction in power transmission, and 50–65% and 15–45% reduction in path loss than only a macrocell network and macrocell-femtocell network respectively. Thus microcell-femtocell network is a power-efficient network.

  1. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically as...

  2. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  3. Device configuration-management system

    International Nuclear Information System (INIS)

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information

  4. Next generation network performance management: a business perspective

    CSIR Research Space (South Africa)

    Harding, C

    2010-08-01

    Full Text Available multitude of transport and access technologies on almost any user device. The most important and integral component of the NGCN NGN Architectural Framework is the physical and logical management of the network elements and services to provide maximum utility...

  5. Management Concepts and the Navigation of Interessement Devices

    DEFF Research Database (Denmark)

    Hansen, Per Richard; Clausen, Christian

    2017-01-01

    principle) and how the concepts configured change in mutual learning processes characterized by conflict, trial and error. This paper contributes to a new understanding of the role of management concepts in change informed by actor-network theory and the concept of interessement devices, and how management......Management concepts are increasingly defining the way we perceive the needs, possibilities and potential outcomes of organizational change. While management concepts such as business process reengineering (BPR), lean manufacturing and stage gate models have been subject to study and debate......, keyconcerns centre on outcomes (or the lack thereof) and the translation of concepts as they are spread and adopted. However, their role in shaping actual organizational change is poorly understood. Very little has been said about how management concepts are used in organizations, and what managers actually...

  6. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  7. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  8. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  9. Networked Attached Devices at SNS

    CERN Document Server

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  10. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  11. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Science.gov (United States)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  12. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  13. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Directory of Open Access Journals (Sweden)

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  14. Instantly decodable network coding for real-time device-to-device communications

    KAUST Repository

    Douik, Ahmed

    2016-01-04

    This paper studies the delay reduction problem for instantly decodable network coding (IDNC)-based device-to-device (D2D) communication-enabled networks. Unlike conventional point-to-multipoint (PMP) systems in which the wireless base station has the sufficient computation abilities, D2D networks rely on battery-powered operations of the devices. Therefore, a particular emphasis on the computation complexity needs to be addressed in the design of delay reduction algorithms for D2D networks. While most of the existing literature on IDNC directly extend the delay reduction PMP schemes, known to be NP-hard, to the D2D setting, this paper proposes to investigate and minimize the complexity of such algorithms for battery-powered devices. With delay minimization problems in IDNC-based systems being equivalent to a maximum weight clique problems in the IDNC graph, the presented algorithms, in this paper, can be applied to different delay aspects. This paper introduces and focuses on the reduction of the maximum value of the decoding delay as it represents the most general solution. The complexity of the solution is reduced by first proposing efficient methods for the construction, the update, and the dimension reduction of the IDNC graph. The paper, further, shows that, under particular scenarios, the problem boils down to a maximum clique problem. Due to the complexity of discovering such maximum clique, the paper presents a fast selection algorithm. Simulation results illustrate the performance of the proposed schemes and suggest that the proposed fast selection algorithm provides appreciable complexity gain as compared to the optimal selection one, with a negligible degradation in performance. In addition, they indicate that the running time of the proposed solution is close to the random selection algorithm.

  15. Communication devices for network-hopping communications and methods of network-hopping communications

    Science.gov (United States)

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  16. Methods, media and systems for managing a distributed application running in a plurality of digital processing devices

    Science.gov (United States)

    Laadan, Oren; Nieh, Jason; Phung, Dan

    2012-10-02

    Methods, media and systems for managing a distributed application running in a plurality of digital processing devices are provided. In some embodiments, a method includes running one or more processes associated with the distributed application in virtualized operating system environments on a plurality of digital processing devices, suspending the one or more processes, and saving network state information relating to network connections among the one or more processes. The method further include storing process information relating to the one or more processes, recreating the network connections using the saved network state information, and restarting the one or more processes using the stored process information.

  17. Network device interface for digitally interfacing data channels to a controller via a network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  18. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  19. Growing pains: medical device interoperability. Regulators and new standards are helping to bring about the convergence of medical devices and information management systems on IT networks.

    Science.gov (United States)

    Degaspari, John

    2011-07-01

    Both provider organizations and medical device vendors have made significant, if slow-going, progress over the last several years to network their digitally-enabled medical devices. Recent strides in both the regulatory and standards arenas have provided renewed impetus on the part of both stakeholder groups to bring more interoperability to disparate medical devices, resulting in better security and quality of patient data.

  20. Analysis and Tools for Improved Management of Connectionless and Connection-Oriented BLE Devices Coexistence.

    Science.gov (United States)

    Del Campo, Antonio; Cintioni, Lorenzo; Spinsante, Susanna; Gambi, Ennio

    2017-04-07

    With the introduction of low-power wireless technologies, like Bluetooth Low Energy (BLE), new applications are approaching the home automation, healthcare, fitness, automotive and consumer electronics markets. BLE devices are designed to maximize the battery life, i.e., to run for long time on a single coin-cell battery. In typical application scenarios of home automation and Ambient Assisted Living (AAL), the sensors that monitor relatively unpredictable and rare events should coexist with other sensors that continuously communicate health or environmental parameter measurements. The former usually work in connectionless mode, acting as advertisers, while the latter need a persistent connection, acting as slave nodes. The coexistence of connectionless and connection-oriented networks, that share the same central node, can be required to reduce the number of handling devices, thus keeping the network complexity low and limiting the packet's traffic congestion. In this paper, the medium access management, operated by the central node, has been modeled, focusing on the scheduling procedure in both connectionless and connection-oriented communication. The models have been merged to provide a tool supporting the configuration design of BLE devices, during the network design phase that precedes the real implementation. The results highlight the suitability of the proposed tool: the ability to set the device parameters to allow us to keep a practical discovery latency for event-driven sensors and avoid undesired overlaps between scheduled scanning and connection phases due to bad management performed by the central node.

  1. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  2. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  3. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  4. Forensic analysis of social networking application on iOS devices

    Science.gov (United States)

    Zhang, Shuhui; Wang, Lianhai

    2013-12-01

    The increased use of social networking application on iPhone and iPad make these devices a goldmine for forensic investigators. Besides, QQ, Wechat, Sina Weibo and skype applications are very popular in China and didn't draw attention to researchers. These social networking applications are used not only on computers, but also mobile phones and tablets. This paper focuses on conducting forensic analysis on these four social networking applications on iPhone and iPad devices. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application and correlation analysis with other activities. Advices to the forensic investigators are also given. It could help the investigators to describe the crime behavior and reconstruct the crime venue.

  5. Mobile Device Management in the DOD Enterprise Network: Factors for Risk Management, Integration, and It Acquisition

    Science.gov (United States)

    2013-03-01

    Administration NFC Near Field Communications NIST National Institute of Standards and Technology NPRST Navy Personnel Research, Studies, and Technology ...information technology (IT) system acquisition process to acquire a mobile device management (MDM) toolset to mitigate information assurance (IA) risks...method study to understand the concerns of federal information technology professionals who are knowledgeable on MDM and the acquisition

  6. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  7. Network Resource Awareness and Prediction on Mobile Devices

    NARCIS (Netherlands)

    Peddemors, A.J.H.

    2009-01-01

    In the past several years, personal mobile devices have developed rapidly as versatile computing platforms, capable of installing and running many different applications. Often, these devices are equipped with multiple (wireless) network interfaces supporting internet access through one or more

  8. Creating wi-fi bluetooth mesh network for crisis management applications

    Science.gov (United States)

    Al-Tekreeti, Safa; Adams, Christopher; Al-Jawad, Naseer

    2010-04-01

    This paper proposes a wireless mesh network implementation consisting of both Wi-Fi Ad-Hoc networks as well as Bluetooth Piconet/Scatternet networks, organised in an energy and throughput efficient structure. This type of networks can be easily constructed for Crises management applications, for example in an Earthquake disaster. The motivation of this research is to form mesh network from the mass availability of WiFi and Bluetooth enabled electronic devices such as mobile phones and PC's that are normally present in most regions were major crises occurs. The target of this study is to achieve an effective solution that will enable Wi-Fi and/or Bluetooth nodes to seamlessly configure themselves to act as a bridge between their own network and that of the other network to achieve continuous routing for our proposed mesh networks.

  9. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  10. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Directory of Open Access Journals (Sweden)

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  11. Risk management communication system between a local government and residents using several network systems and terminal devices

    Science.gov (United States)

    Ohyama, Takashi; Enomoto, Hiroyuki; Takei, Yuichiro; Maeda, Yuji

    2009-05-01

    Most of Japan's local governments utilize municipal disaster-management radio communications systems to communicate information on disasters or terrorism to residents. The national government is progressing in efforts toward digitalization by local governments of these systems, but only a small number (approx. 10%) have introduced such equipment due to its requiring large amounts of investment. On the other hand, many local governments are moving forward in installation of optical fiber networks for the purpose of eliminating the "digital divide." We herein propose a communication system as an alternative or supplement to municipal disaster-management radio communications systems, which utilizes municipal optical fiber networks, the internet and similar networks and terminals. The system utilizes the multiple existing networks and is capable of instantly distributing to all residents, and controlling, risk management information. We describe the system overview and the field trials conducted with a local government using this system.

  12. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies....

  13. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... organisation theories and theories about strategic management....

  14. Managing ANSA Objects with OSI Network Management Tools

    OpenAIRE

    Polizzi, Marc; Genilloud, Guy

    1995-01-01

    OSI Network Management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, as this model is not well-adapted for the management of software components, distributed programming environments (e.g. DCE, CORBA, ANSAware) essentially ignore the OSI Network Management model. We assume nevertheless that OSI Network managers will want to have some control of a distributed infrastructure and application. We examine how access to some of ...

  15. Reactive power management of power networks with wind generation

    CERN Document Server

    Amaris, Hortensia; Ortega, Carlos Alvarez

    2012-01-01

    As the energy sector shifts and changes to focus on renewable technologies, the optimization of wind power becomes a key practical issue. Reactive Power Management of Power Networks with Wind Generation brings into focus the development and application of advanced optimization techniques to the study, characterization, and assessment of voltage stability in power systems. Recent advances on reactive power management are reviewed with particular emphasis on the analysis and control of wind energy conversion systems and FACTS devices. Following an introduction, distinct chapters cover the 5 key

  16. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

    Science.gov (United States)

    Busdicker, Mike; Upendra, Priyanka

    2017-09-02

    This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.

  17. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  18. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  19. Network management in motion. Part 1. Network management in perspective. Transition or paradox?

    International Nuclear Information System (INIS)

    Van Beuge, M.

    2010-01-01

    In a series of articles various legal aspects of network management are discussed from a European and a Dutch perspective. In this first part a general introduction is given on network management and related topics, such as developing local networks to international networks, the integration to unbundling the energy market in Europe, the development of centralized to decentralized, and from conventional to sustainable. [nl

  20. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  1. An Architectural Modelfor Intelligent Network Management

    Institute of Scientific and Technical Information of China (English)

    罗军舟; 顾冠群; 费翔

    2000-01-01

    Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries. In this paper, an architectural model for Intelligent Network Management (INM) is presented. The INM system includes a manager system, which controls all subsystems and coordinates different management tasks; an expert system, which is responsible for handling particularly difficult problems, and intelligent agents, which bring the management closer to applications and user requirements by spreading intelligent agents through network segments or domain. In the expert system model proposed, especially an intelligent fault management system is given.The architectural model is to build the INM system to meet the need of managing modern network systems.

  2. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  3. Signal Processing Device (SPD) for networked radiation monitoring system

    International Nuclear Information System (INIS)

    Dharmapurikar, A.; Bhattacharya, S.; Mukhopadhyay, P.K.; Sawhney, A.; Patil, R.K.

    2010-01-01

    A networked radiation and parameter monitoring system with three tier architecture is being developed. Signal Processing Device (SPD) is a second level sub-system node in the network. SPD is an embedded system which has multiple input channels and output communication interfaces. It acquires and processes data from first level parametric sensor devices, and sends to third level devices in response to request commands received from host. It also performs scheduled diagnostic operations and passes on the information to host. It supports inputs in the form of differential digital signals and analog voltage signals. SPD communicates with higher level devices over RS232/RS422/USB channels. The system has been designed with main requirements of minimal power consumption and harsh environment in radioactive plants. This paper discusses the hardware and software design details of SPD. (author)

  4. CERN tests reveal security flaws with industrial network devices

    CERN Document Server

    Lüders, Stefan

    2006-01-01

    The CERN high energy particle physics facility at Geneva, Switzerland will incorporate a wide range of COTS industrial control systems within its next generation particle collider, the LHC. In particular, the Internet will be used to facilitate the remote access for accelerator and particle physicists and system experts based at several hundred locations around the globe. The integration of Industrial Ethernet and COTS PLCs within the LHC program focuses extreme attention on the industrial network cyber-security requirement. CERN's response has been to conduct operational research on the security resilience of networked industrial devices. As test team lead Stefan Lüders reports here, industrial networked devices put through the organisation's test procedures have generally shown up unexpected vulnerabilities.

  5. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  6. Wearable Device Control Platform Technology for Network Application Development

    Directory of Open Access Journals (Sweden)

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  7. QoS and energy management in cognitive radio network case study approach

    CERN Document Server

    Mishra, Vishram; Lau, Chiew-Tong

    2017-01-01

    This book covers the important aspects involved in making cognitive radio devices portable, mobile and green, while also extending their service life. At the same time, it presents a variety of established theories and practices concerning cognitive radio from academia and industry. Cognitive radio can be utilized as a backbone communication medium for wireless devices. To effectively achieve its commercial application, various aspects of quality of service and energy management need to be addressed. The topics covered in the book include energy management and quality of service provisioning at Layer 2 of the protocol stack from the perspectives of medium access control, spectrum selection, and self-coexistence for cognitive radio networks.

  8. Cable networks, services, and management

    CERN Document Server

    2015-01-01

    Cable Networks, Services, and Management is the first book to cover cable networks, services, and their management, in-depth, for network operators, engineers, researchers, and students. Thirteen experts in various fields have contributed their knowledge of network architectures and services, Operations, Administration, Maintenance, Provisioning, Troubleshooting (OAMPT) for residential and business services, cloud, Software Defined Networks (SDN), as well as virtualization concepts and their applications as part of the future directions of cable networks. The book begins by introducing architecture and services for Data Over Cable Service Interface Specification (DOCSIS) 3.0/ 3.1, Converged Cable Access Platform (CCAP), Content Distribution Networks (CDN, IP TV, and Packet Cable and Wi-Fi for Residential Services. Topics that are discussed in proceeding chapters include: operational systems and management architectures, service orders, provisioning, fault manageme t, performance management, billing systems a...

  9. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Science.gov (United States)

    Valdivieso Caraguay, Ángel Leonardo; García Villalba, Luis Javier

    2017-01-01

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors. PMID:28362346

  10. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.

    Science.gov (United States)

    Caraguay, Ángel Leonardo Valdivieso; Villalba, Luis Javier García

    2017-03-31

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  11. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  12. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  13. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-05-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  14. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-01-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  15. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  16. Transparent Electrodes Based on Silver Nanowire Networks: From Physical Considerations towards Device Integration.

    Science.gov (United States)

    Bellet, Daniel; Lagrange, Mélanie; Sannicolo, Thomas; Aghazadehchors, Sara; Nguyen, Viet Huong; Langley, Daniel P; Muñoz-Rojas, David; Jiménez, Carmen; Bréchet, Yves; Nguyen, Ngoc Duy

    2017-05-24

    The past few years have seen a considerable amount of research devoted to nanostructured transparent conducting materials (TCM), which play a pivotal role in many modern devices such as solar cells, flexible light-emitting devices, touch screens, electromagnetic devices, and flexible transparent thin film heaters. Currently, the most commonly used TCM for such applications (ITO: Indium Tin oxide) suffers from two major drawbacks: brittleness and indium scarcity. Among emerging transparent electrodes, silver nanowire (AgNW) networks appear to be a promising substitute to ITO since such electrically percolating networks exhibit excellent properties with sheet resistance lower than 10 Ω/sq and optical transparency of 90%, fulfilling the requirements of most applications. In addition, AgNW networks also exhibit very good mechanical flexibility. The fabrication of these electrodes involves low-temperature processing steps and scalable methods, thus making them appropriate for future use as low-cost transparent electrodes in flexible electronic devices. This contribution aims to briefly present the main properties of AgNW based transparent electrodes as well as some considerations relating to their efficient integration in devices. The influence of network density, nanowire sizes, and post treatments on the properties of AgNW networks will also be evaluated. In addition to a general overview of AgNW networks, we focus on two important aspects: (i) network instabilities as well as an efficient Atomic Layer Deposition (ALD) coating which clearly enhances AgNW network stability and (ii) modelling to better understand the physical properties of these networks.

  17. Applications of Graph Spectral Techniques to Water Distribution Network Management

    Directory of Open Access Journals (Sweden)

    Armando di Nardo

    2018-01-01

    Full Text Available Cities depend on multiple heterogeneous, interconnected infrastructures to provide safe water to consumers. Given this complexity, efficient numerical techniques are needed to support optimal control and management of a water distribution network (WDN. This paper introduces a holistic analysis framework to support water utilities on the decision making process for an efficient supply management. The proposal is based on graph spectral techniques that take advantage of eigenvalues and eigenvectors properties of matrices that are associated with graphs. Instances of these matrices are the adjacency matrix and the Laplacian, among others. The interest for this application is to work on a graph that specifically represents a WDN. This is a complex network that is made by nodes corresponding to water sources and consumption points and links corresponding to pipes and valves. The aim is to face new challenges on urban water supply, ranging from computing approximations for network performance assessment to setting device positioning for efficient and automatic WDN division into district metered areas. It is consequently created a novel tool-set of graph spectral techniques adapted to improve main water management tasks and to simplify the identification of water losses through the definition of an optimal network partitioning. Two WDNs are used to analyze the proposed methodology. Firstly, the well-known network of C-Town is investigated for benchmarking of the proposed graph spectral framework. This allows for comparing the obtained results with others coming from previously proposed approaches in literature. The second case-study corresponds to an operational network. It shows the usefulness and optimality of the proposal to effectively manage a WDN.

  18. Network resource management

    NARCIS (Netherlands)

    2009-01-01

    The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth,

  19. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  20. Laser Processed Silver Nanowire Network Transparent Electrodes for Novel Electronic Devices

    Science.gov (United States)

    Spechler, Joshua Allen

    Silver nanowire network transparent conducting layers are poised to make headway into a space previously dominated by transparent conducting oxides due to the promise of a flexible, scaleable, lab-atmosphere processable alternative. However, there are many challenges standing in the way between research scale use and consumer technology scale adaptation of this technology. In this thesis we will explore many, and overcome a few of these challenges. We will address the poor conductivity at the narrow nanowire-nanowire junction points in the network by developing a laser based process to weld nanowires together on a microscopic scale. We address the need for a comparative metric for transparent conductors in general, by taking a device level rather than a component level view of these layers. We also address the mechanical, physical, and thermal limitations to the silver nanowire networks by making composites from materials including a colorless polyimide and titania sol-gel. Additionally, we verify our findings by integrating these processes into devices. Studying a hybrid organic/inorganic heterojunction photovoltaic device we show the benefits of a laser processed electrode. Green phosphorescent organic light emitting diodes fabricated on a solution phase processed silver nanowire based electrode show favorable device metrics compared to a conductive oxide electrode based control. The work in this thesis is intended to push the adoption of silver nanowire networks to further allow new device architectures, and thereby new device applications.

  1. A Single-Walled Carbon Nanotube Network Gas Sensing Device

    Directory of Open Access Journals (Sweden)

    I-Ju Teng

    2011-08-01

    Full Text Available The goal of this research was to develop a chemical gas sensing device based on single-walled carbon nanotube (SWCNT networks. The SWCNT networks are synthesized on Al2O3-deposted SiO2/Si substrates with 10 nm-thick Fe as the catalyst precursor layer using microwave plasma chemical vapor deposition (MPCVD. The development of interconnected SWCNT networks can be exploited to recognize the identities of different chemical gases by the strength of their particular surface adsorptive and desorptive responses to various types of chemical vapors. The physical responses on the surface of the SWCNT networks cause superficial changes in the electric charge that can be converted into electronic signals for identification. In this study, we tested NO2 and NH3 vapors at ppm levels at room temperature with our self-made gas sensing device, which was able to obtain responses to sensitivity changes with a concentration of 10 ppm for NO2 and 24 ppm for NH3.

  2. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  3. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Ángel Leonardo Valdivieso Caraguay

    2017-03-01

    Full Text Available This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  4. Managing collaborative innovation networks

    DEFF Research Database (Denmark)

    Stevens, Vidar; Agger, Annika

    2017-01-01

    Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...... steps. Such a management approach allows actors to get to know each other and from thereon expand, with more background and appreciation for the others’ goals, behaviors, and intentions, their group activities concerning the formulation of a radical and innovative policy plan....

  5. Service oriented network architecture for control and management of home appliances

    Science.gov (United States)

    Hayakawa, Hiroshi; Koita, Takahiro; Sato, Kenya

    2005-12-01

    Recent advances in multimedia network systems and mechatronics have led to the development of a new generation of applications that associate the use of various multimedia objects with the behavior of multiple robotic actors. The connection of audio and video devices through high speed multimedia networks is expected to make the system more convenient to use. For example, many home appliances, such as a video camera, a display monitor, a video recorder, an audio system and so on, are being equipped with a communication interface in the near future. Recently some platforms (i.e. UPnP1, HAVi2 and so on) are proposed for constructing home networks; however, there are some issues to be solved to realize various services by connecting different equipment via the pervasive peer-to-peer network. UPnP offers network connectivity of PCs of intelligent home appliances, practically, which means to require a PC in the network to control other devices. Meanwhile, HAVi has been developed for intelligent AV equipments with sophisticated functions using high CPU power and large memory. Considering the targets of home alliances are embedded systems, this situation raises issues of software and hardware complexity, cost, power consumption and so on. In this study, we have proposed and developed the service oriented network architecture for control and management of home appliances, named SONICA (Service Oriented Network Interoperability for Component Adaptation), to address these issues described before.

  6. Formation of a national network for rapid response to device and lead advisories: The Canadian Heart Rhythm Society Device Advisory Committee

    Science.gov (United States)

    Krahn, Andrew D; Simpson, Christopher S; Parkash, Ratika; Yee, Raymond; Champagne, Jean; Healey, Jeffrey S; Cameron, Doug; Thibault, Bernard; Mangat, Iqwal; Tung, Stanley; Sterns, Laurence; Birnie, David H; Exner, Derek V; Sivakumaran, Soori; Davies, Ted; Coutu, Benoit; Crystal, Eugene; Wolfe, Kevin; Verma, Atul; Stephenson, Elizabeth A; Sanatani, Shubhayan; Gow, Robert; Connors, Sean; Paredes, Felix Ayala; Turabian, Mike; Kus, Teresa; Essebag, Vidal; Gardner, Martin

    2009-01-01

    The Canadian Heart Rhythm Society (CHRS) Device Advisory Committee was commissioned to respond to advisories regarding cardiac rhythm device and lead performance on behalf of the CHRS. In the event of an advisory, the Chair uses an e-mail network to disseminate advisory information to Committee members broadly representative of the Canadian device community. A consensus recommendation is prepared by the Committee and made available to all Canadian centres on the CHRS Web site after approval by the CHRS executive. This collaborative approach using an e-mail network has proven very efficient in providing a rapid national response to device advisories. The network is an ideal tool to collect specific data on implanted device system performance and allows for prompt reporting of clinically relevant data to front-line clinicians and patients. PMID:19584969

  7. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  8. Temporal Databases in Network Management

    National Research Council Canada - National Science Library

    Gupta, Ajay

    1998-01-01

    .... This thesis discusses issues involved with performing network management, specifically with means of reducing and storing the large quantity of data that networks management tools and systems generate...

  9. Adaptive Capacity Management in Bluetooth Networks

    OpenAIRE

    Son, L.T.

    2004-01-01

    With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low power, and low cost mobile ad hoc solution for the global interconnection of all mobile devices. To implement Bluetooth network as a true mobile ad hoc wireless network operating in short radio range, h...

  10. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  11. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    KAUST Repository

    Elrasad, Amr

    2016-01-01

    The increasing bandwidth demands in access networks motivates network operators, networking devices manufacturers, and standardization institutions to search for new approaches for access networks. These approaches should support higher bandwidth

  12. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  13. A Hardware-Supported Algorithm for Self-Managed and Choreographed Task Execution in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Borja Bordel

    2018-03-01

    Full Text Available Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices. On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations.

  14. Policy-based Network Management in Home Area Networks: Interim Test Results

    OpenAIRE

    Ibrahim Rana, Annie; Ó Foghlú, Mícheál

    2009-01-01

    This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...

  15. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  16. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  17. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas

    2015-10-24

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  18. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas; Sezgin, Aydin

    2015-01-01

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  19. Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Popovski, Petar

    2015-01-01

    ) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which......Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii......, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while...

  20. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  1. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  2. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  3. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  4. An approach for management of mobile devices in pharmaceutical company

    OpenAIRE

    Prešeren, Tadej

    2008-01-01

    The areas of the mobile device management is developing very fast. Hence, the thesis “An approach for management of mobile devices in pharmaceutical company” introduces all key directives that should be considered when implementing mobile device management. A survey of standards and recommendations on the mobile device security has been elaborated. Relevant guidelines for security policy definition are presented with the risk analysis for mobile device usage. Furthermore, the model for mana...

  5. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    Science.gov (United States)

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-01-01

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead. PMID:23807687

  6. D-MSR: a distributed network management scheme for real-time monitoring and process control applications in wireless industrial automation.

    Science.gov (United States)

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-06-27

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  7. Low-cost Augmented Reality prototype for controlling network devices

    OpenAIRE

    Nguyen, Anh; Banic, Amy

    2014-01-01

    With the evolution of mobile devices, and smart-phones in particular, comes the ability to create new experiences that enhance the way we see, interact, and manipulate objects, within the world that surrounds us. It is now possible to blend data from our senses and our devices in numerous ways that simply were not possible before using Augmented Reality technology. In a near future, when all of the office devices as well as your personal electronic gadgets are on a common wireless network, op...

  8. Knowledge management in international networks

    NARCIS (Netherlands)

    Man, de A.P.

    2006-01-01

    Networks and knowledge are intimately connected. Networks are believed to be innovative because of the smooth transfer, combination and creation of knowledge that can take place in them. Interestingly however, knowledge management research has hardly studied knowledge management techniques in

  9. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  10. Mobile human network management and recommendation by probabilistic social mining.

    Science.gov (United States)

    Min, Jun-Ki; Cho, Sung-Bae

    2011-06-01

    Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.

  11. Information and management system for the secondary electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Knezevic, M. (Rudnik i Termoelectrana Gacko u Osnivanju (Yugoslavia))

    1988-07-01

    Emphasizes the importance of a reliable and continuous secondary electrical distribution network for surface coal mine productivity. Interruptions in equipment operation caused by mechanical and electrical failures should be eliminated without delay. Effective communication systems should lead to reliable management and high productivity in mines. It is suggested that mines be divided into four groups according to their sensitivity to supply interruptions, and provided with remotely controlled signalling devices linked to main and auxiliary dispatching stations equipped with micro-computers. Productivity may be increased by some 50-70% and supply costs decreased by some 35% if appropriate electrical distribution systems are used. A sketch of a secondary electrical supply network is attached. 11 refs.

  12. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  13. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  14. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  15. Network management for 900-1300 MW PWR power plant industrial network

    International Nuclear Information System (INIS)

    Schlosser, J.G.; Maillart, H.; Lopinto, Y.

    1993-07-01

    Communication networks are a vital element in industrial information system projects. Because of the complexity of these networks, which are heterogeneous in terms of hardware, protocols and communication software, the need is now clear to consider them as applications in and of themselves. For this reason, EDF communication networks are now covered by system requirement specifications with SPRINT, and by an acceptance policy which calls for conformance certificates and defines methods for interoperability tests. Network management completes the picture, and attempts to provide the resources with which to assess present network status and manage communication networks. For this purpose, EDF has selected the OSI standard, which is based on four key concepts: - the ''Manager - Agent'' structural model, - a service (CMISE) and a protocol (CMIP) which enable exchange of management information, - an object-oriented management data model, -functions for: configuration, anomaly, performance and alarm management. This document presents the results of a project to integrate into a single management platform communication systems which do not conform to the OSI management recommendations. There were three major phases to the project: - a review of the OSI management model, and most particularly of the information model advocated; - a review of the resources to be managed and a comparison of the information provided by the different agents. Specifications were proposed for the management object and attribute classes which can usefully be implemented; - integration of ARLIC. During development of a breadboard version based on a BULL ISM platform for management of the power plant local area network, one possible solution for integration of ARLIC was proposed, describing the ARLIC information modeling along the lines of the OSI model. This project showed that it is possible to use the OSI modeling to represent management data manipulated by the communication software used on

  16. Transmitting patient and device data via GSM--central management for decentral mobile medical devices.

    Science.gov (United States)

    Bachmor, T; Schöchlin, J; Bolz, A

    2002-01-01

    Equipping medical devices with long range telemetry opens completely new possibilities for emergency response, home care and remote diagnosis. Mobile communications nowadays seem to be a generally accepted part of our modern world, but bridging the gap between new (consumer-) technologies and medical devices still is a challenge today. Providing a telemetry link (GSM) is just the trivial part--ensuring security, reliability and service management are the more critical tasks that need to be addressed. Therefore, a complete system concept consists of an automatic fleet management (e.g. periodic device-initiated service calls) as well as customer relationship management (CRM), including technical service and a trouble-ticket system.

  17. Accessing ANSA Objects from OSI Network Management

    OpenAIRE

    Berrah, Karrim; Gay, David; Genilloud, Guy

    1994-01-01

    OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...

  18. Game-Theoretic Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Network

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2018-01-01

    Full Text Available Device-to-Device communication underlaying cellular network can increase the spectrum efficiency due to direct proximity communication and frequency reuse. However, such performance improvement is influenced by the power interference caused by spectrum sharing and social characteristics in each social community jointly. In this investigation, we present a dynamic game theory with complete information based D2D resource allocation scheme for D2D communication underlaying cellular network. In this resource allocation method, we quantify both the rate influence from the power interference caused by the D2D transmitter to cellular users and rate enhancement brought by the social relationships between mobile users. Then, the utility function maximization game is formulated to optimize the overall transmission rate performance of the network, which synthetically measures the final influence from both power interference and sociality enhancement. Simultaneously, we discuss the Nash Equilibrium of the proposed utility function maximization game from a theoretical point of view and further put forward a utility priority searching algorithm based resource allocation scheme. Simulation results show that our proposed scheme attains better performance compared with the other two advanced proposals.

  19. Innovative, wearable snap connector technology for improved device networking in electronic garments

    Science.gov (United States)

    Kostrzewski, Andrew A.; Lee, Kang S.; Gans, Eric; Winterhalter, Carole A.; Jannson, Tomasz P.

    2007-04-01

    This paper discusses Physical Optics Corporation's (POC) wearable snap connector technology that provides for the transfer of data and power throughout an electronic garment (e-garment). These connectors resemble a standard garment button and can be mated blindly with only one hand. Fully compatible with military clothing, their application allows for the networking of multiple electronic devices and an intuitive method for adding/removing existing components from the system. The attached flexible cabling also permits the rugged snap connectors to be fed throughout the standard webbing found in military garments permitting placement in any location within the uniform. Variations of the snap electronics/geometry allow for integration with USB 2.0 devices, RF antennas, and are capable of transferring high bandwidth data streams such as the 221 Mbps required for VGA video. With the trend towards providing military officers with numerous electronic devices (i.e., heads up displays (HMD), GPS receiver, PDA, etc), POC's snap connector technology will greatly improve cable management resulting in a less cumbersome uniform. In addition, with electronic garments gaining widespread adoption in the commercial marketplace, POC's technology is finding applications in such areas as sporting good manufacturers and video game technology.

  20. Smart home design for electronic devices monitoring based wireless gateway network using cisco packet tracer

    Science.gov (United States)

    Sihombing, Oloan; Zendrato, Niskarto; Laia, Yonata; Nababan, Marlince; Sitanggang, Delima; Purba, Windania; Batubara, Diarmansyah; Aisyah, Siti; Indra, Evta; Siregar, Saut

    2018-04-01

    In the era of technological development today, the technology has become the need for the life of today's society. One is needed to create a smart home in turning on and off electronic devices via smartphone. So far in turning off and turning the home electronic device is done by pressing the switch or remote button, so in control of electronic device control less effective. The home smart design is done by simulation concept by testing system, network configuration, and wireless home gateway computer network equipment required by a smart home network on cisco packet tracer using Internet Thing (IoT) control. In testing the IoT home network wireless network gateway system, multiple electronic devices can be controlled and monitored via smartphone based on predefined configuration conditions. With the Smart Ho me can potentially increase energy efficiency, decrease energy usage costs, control electronics and change the role of residents.

  1. Managing the Cooperative Network.

    Science.gov (United States)

    Segal, JoAn S.

    1983-01-01

    Discussion of the management of not-for-profit corporations which provide computerized library networks highlights marketing, nonprofit constraints, multiple goals, consumer demands, professional commitment, external influences, motivation and control, dependence on charisma, management and altruism, hybrid organizations, and rational management.…

  2. The Concept of the Remote Devices Content Management

    Directory of Open Access Journals (Sweden)

    Miroslav Behan

    2012-01-01

    Full Text Available Modern mobile communication devices which are often used as remote access to information systems bring up many advantages for user. Unfortunately in some cases when user has several different mobile devices for the same remote access, a problem of multiplatform and multivendor environment fragments productivity by user knowledge in principals of approach to possible services, controlling or management of devices as well as features is available. The customizable interface of remote device management benefits by the control of all owned, authorized, or publically accessible devices from single point of user perspective. We propose a concept of such information system which takes into account mobile devices and their content. Concept is suitable not only for Apple iOS or Google Android, but also it covers all mobile platforms as well as the sensors capabilities of mobile devices which can turn such mobile Smart Device to Smart and mobile sensor concentrator.

  3. Service and device discovery of nodes in a wireless sensor network

    NARCIS (Netherlands)

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  4. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P; Abu-Mahfouz, Adnan M

    2017-05-04

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  5. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Directory of Open Access Journals (Sweden)

    Musa Ndiaye

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs are becoming increasingly popular with the advent of the Internet of things (IoT. Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  6. Distributed Prognostics and Health Management with a Wireless Network Architecture

    Science.gov (United States)

    Goebel, Kai; Saha, Sankalita; Sha, Bhaskar

    2013-01-01

    A heterogeneous set of system components monitored by a varied suite of sensors and a particle-filtering (PF) framework, with the power and the flexibility to adapt to the different diagnostic and prognostic needs, has been developed. Both the diagnostic and prognostic tasks are formulated as a particle-filtering problem in order to explicitly represent and manage uncertainties in state estimation and remaining life estimation. Current state-of-the-art prognostic health management (PHM) systems are mostly centralized in nature, where all the processing is reliant on a single processor. This can lead to a loss in functionality in case of a crash of the central processor or monitor. Furthermore, with increases in the volume of sensor data as well as the complexity of algorithms, traditional centralized systems become for a number of reasons somewhat ungainly for successful deployment, and efficient distributed architectures can be more beneficial. The distributed health management architecture is comprised of a network of smart sensor devices. These devices monitor the health of various subsystems or modules. They perform diagnostics operations and trigger prognostics operations based on user-defined thresholds and rules. The sensor devices, called computing elements (CEs), consist of a sensor, or set of sensors, and a communication device (i.e., a wireless transceiver beside an embedded processing element). The CE runs in either a diagnostic or prognostic operating mode. The diagnostic mode is the default mode where a CE monitors a given subsystem or component through a low-weight diagnostic algorithm. If a CE detects a critical condition during monitoring, it raises a flag. Depending on availability of resources, a networked local cluster of CEs is formed that then carries out prognostics and fault mitigation by efficient distribution of the tasks. It should be noted that the CEs are expected not to suspend their previous tasks in the prognostic mode. When the

  7. MANAGING WITHIN DISTRIBUTED INNOVATION NETWORKS

    OpenAIRE

    LAWRENCE DOOLEY; DAVID O'SULLIVAN

    2007-01-01

    Business competitiveness and sustainability depends on the effective management of innovation. To be effective, innovation needs to take place within every area of an organisation and by association within organisational networks that include key suppliers, customers and other strategic partners. Distributed innovation management is the process of managing innovation both within and across networks of organisations that have come together to co-design, co-produce and co-service the needs of c...

  8. Network-Embedded Management and Applications Understanding Programmable Networking Infrastructure

    CERN Document Server

    Wolter, Ralf

    2013-01-01

    Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...

  9. Networked business process management

    NARCIS (Netherlands)

    Grefen, P.W.P.J.

    2013-01-01

    In the current economy, a shift can be seen from stand-alone business organizations to networks of tightly collaborating business organizations. To allow this tight collaboration, business process management in these collaborative networks is becoming increasingly important. This paper discusses

  10. [Design and application of implantable medical device information management system].

    Science.gov (United States)

    Cao, Shaoping; Yin, Chunguang; Zhao, Zhenying

    2013-03-01

    Through the establishment of implantable medical device information management system, with the aid of the regional joint sharing of resources, we further enhance the implantable medical device traceability management level, strengthen quality management, control of medical risk.

  11. Design and development of a device management platform for EAST cryogenic system

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Zhiwei, E-mail: zzw@ipp.ac.cn; Lu, Xiaofei, E-mail: xiaofeilu@ipp.ac.cn; Zhuang, Ming, E-mail: zhm@ipp.ac.cn; Hu, Liangbing, E-mail: huliangbing@ipp.ac.cn; Xia, Genhai, E-mail: xgh@ipp.ac.cn

    2014-05-15

    Highlights: • A device management platform for EAST cryogenic system based on DCS is designed. • This platform enhances the integrity and continuity of system device information. • It can help predictive maintenance and device management decision. - Abstract: EAST cryogenic system is one of the critical sub-systems of the EAST tokamak device. It is a large scale helium cryoplant, which adopts distributed control system to realize monitoring and control of the cryogenic process and devices. However, the maintenance and management of most field devices are still in the corrective maintenance or traditional preventive maintenance stage. Under maintained or over maintained problems widely exist, which could cause devices fault and increase operation costs. Therefore, a device management platform is proposed for a safe and steady operation as well as fault diagnosis and predictive maintenance of EAST cryogenic system. This paper presents the function design and architecture design of the cryogenic device management platform. This platform is developed based on DeltaV DCS and acquires monitoring data through OPC protocol. It consists of three pillars, namely device information management, device condition management, and device performance monitoring. The development and implementation of every pillar are illustrated in detail in this paper. Test results and discussions are presented in the end.

  12. Pilot Program Evaluating Personal Tablet Device Use Across Campus

    Science.gov (United States)

    2012-01-01

    Protocol ISM – Information Systems Management ISP – Internet Service Provider LAN – Local Area Network Mbps – Mega Bits Per Second MDM – Mobile Device...Management NIPRNET – Nonsecure Internet Protocol Router Network OCSP – Online Certificate Status Protocol OSI – Open Systems Interconnection PII

  13. Secure Real-Time Monitoring and Management of Smart Distribution Grid using Shared Cellular Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Ganem, Hervé; Jorguseski, Ljupco

    2017-01-01

    capabilities. Thanks to the advanced measurement devices, management framework, and secure communication infrastructure developed in the FP7 SUNSEED project, the Distribution System Operator (DSO) now has full observability of the energy flows at the medium/low voltage grid. Furthermore, the prosumers are able......, where the smart grid ICT solutions are provided through shared cellular LTE networks....

  14. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  15. DETERMINANTS OF NETWORK OUTCOMES: THE IMPACT OF MANAGEMENT STRATEGIES.

    Science.gov (United States)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-09-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more influence on network dynamics than previously theorized.

  16. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  17. The Role of Social Networks in Early Adoption of Mobile Devices

    Science.gov (United States)

    Tscherning, Heidi; Mathiassen, Lars

    As mobile devices have become the personal information-processing interface of choice, many individuals seem to swiftly follow fashion. Yet, the literature is silent on how early adopters of mobile devices overcome uncertainties related to shifts in technology. Based on purposive sampling, this paper presents detailed insights into why and how five closely related individuals made the decision to adopt the iPhone before it was available through traditional supply chains. Focusing on the role played by social networks, we analyze how adoption threshold, opinion leaders, social contagion, and social learning shaped adoption behaviors and outcomes. The analyses confirm that network structures impact the early decision to accept the iPhone; they show that when facing uncertainty, adoption decisions emerged as a combined result of individual adoption reflections and major influences from the social network as well as behaviors observed within the network, and, they reveal interesting behaviors that differed from expectations. In conclusion, we discuss implications for both theory and practice.

  18. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2017-01-01

    , this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore......, a first objective of this work is to assess the operating regions where employing cooperation results in higher throughput and/or energy savings. We consider multicast scenarios with network coded mechanisms employing Random Linear Network Coding (RLNC). However, although RLNC is good for low amount...... of transmissions in multicast, it has an inherent overhead from extreme high or low field related caveats. Thus, as a second objective, we review and propose the application of new network codes that posses low overhead for multicasting, by having a short representation and low dependence probability. We provide...

  19. Tunable photonic bandgap fiber based devices for optical networks

    DEFF Research Database (Denmark)

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    In future all optical networks one of the enabling technologies is tunable elements including reconfigurable routers, switches etc. Thus, the development of a technology platform that allows construction of tuning components is critical. Lately, microstructured optical fibers, filled with liquid......, for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...... crystals, have proven to be a candidate for such a platform. Microstructured optical fibers offer unique wave-guiding properties that are strongly related to the design of the air holes in the cladding of the fiber. These wave-guiding properties may be altered by filling the air holes with a material...

  20. Research on two-port network of wavelet transform processor using surface acoustic wavelet devices and its application.

    Science.gov (United States)

    Liu, Shoubing; Lu, Wenke; Zhu, Changchun

    2017-11-01

    The goal of this research is to study two-port network of wavelet transform processor (WTP) using surface acoustic wave (SAW) devices and its application. The motive was prompted by the inconvenience of the long research and design cycle and the huge research funding involved with traditional method in this field, which were caused by the lack of the simulation and emulation method of WTP using SAW devices. For this reason, we introduce the two-port network analysis tool, which has been widely used in the design and analysis of SAW devices with uniform interdigital transducers (IDTs). Because the admittance parameters calculation formula of the two-port network can only be used for the SAW devices with uniform IDTs, this analysis tool cannot be directly applied into the design and analysis of the processor using SAW devices, whose input interdigital transducer (IDT) is apodized weighting. Therefore, in this paper, we propose the channel segmentation method, which can convert the WTP using SAW devices into parallel channels, and also provide with the calculation formula of the number of channels, the number of finger pairs and the static capacitance of an interdigital period in each parallel channel firstly. From the parameters given above, we can calculate the admittance parameters of the two port network for each channel, so that we can obtain the admittance parameter of the two-port network of the WTP using SAW devices on the basis of the simplification rule of parallel two-port network. Through this analysis tool, not only can we get the impulse response function of the WTP using SAW devices but we can also get the matching circuit of it. Large numbers of studies show that the parameters of the two-port network obtained by this paper are consistent with those measured by network analyzer E5061A, and the impulse response function obtained by the two-port network analysis tool is also consistent with that measured by network analyzer E5061A, which can meet the

  1. Social Networks and Welfare in Future Animal Management.

    Science.gov (United States)

    Koene, Paul; Ipema, Bert

    2014-03-17

    It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal species. Social Network Analysis (SNA) facilitates the characterization of social networking at group, subgroup and individual levels. SNA is currently used for modeling the social behavior and management of wild animals and social welfare of zoo animals. It has been recognized for use with farm animals but has yet to be applied for management purposes. Currently, the main focus is on cattle, because in large groups (poultry), recording of individuals is expensive and the existence of social networks is uncertain due to on-farm restrictions. However, in many cases, a stable social network might be important to individual animal fitness, survival and welfare. For instance, when laying hens are not too densely housed, simple networks may be established. We describe here small social networks in horses, brown bears, laying hens and veal calves to illustrate the importance of measuring social networks among animals managed by humans. Emphasis is placed on the automatic measurement of identity, location, nearest neighbors and nearest neighbor distance for management purposes. It is concluded that social networks are important to the welfare of human-managed animal species and that welfare management based on automatic recordings will become available in the near future.

  2. EPICS device support module as ATCA system manager for the ITER fast plant system controller

    Energy Technology Data Exchange (ETDEWEB)

    Carvalho, Paulo F., E-mail: pricardofc@ipfn.ist.utl.pt [Associação EURATOM/IST, Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico – Universidade Técnica de Lisboa, Lisboa (Portugal); Santos, Bruno; Gonçalves, Bruno; Carvalho, Bernardo B.; Sousa, Jorge; Rodrigues, A.P.; Batista, António J.N.; Correia, Miguel; Combo, Álvaro [Associação EURATOM/IST, Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico – Universidade Técnica de Lisboa, Lisboa (Portugal); Correia, Carlos M.B.A. [Centro de Instrumentação, Departamento de Física, Universidade de Coimbra, Coimbra (Portugal); Varandas, Carlos A.F. [Associação EURATOM/IST, Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico – Universidade Técnica de Lisboa, Lisboa (Portugal)

    2013-10-15

    Highlights: ► In Nuclear Fusion, demanding security and high-availability requirements call for redundancy to be available. ► ATCA based Nuclear Fusion Systems are composed by several electronic and mechanical component. ► Control and monitoring of ATCA electronic systems are recommended. ► ITER Fast Plant System Controller Project CODAC system prototype. ► EPICS device support module as External ATCA system manager solution. -- Abstract: This paper presents an Enhanced Physics and Industrial Control System (EPICS) device support module for the International Thermonuclear Experimental Reactor (ITER) Fast Plant System Controller (FPSC) project based in Advanced Telecommunications Computing Architecture (ATCA) specification. The developed EPICS device support module provides an External System Manager (ESM) solution for monitoring and control the ITER FPSC ATCA shelf system and data acquisition boards in order to take proper action and report problems to a control room operator or high level management unit in case of any system failure occurrence. EPICS device support module acts as a Channel Access (CA) server to report problems and publish ATCA system data information to the control room operator, high level management unit or other CA network clients such as Control System Studio Operator Interfaces (CSS OPIs), Best Ever Alarm System Toolkit (BEAST), Best Ever Archive Utility (BEAUTY) or other CA client applications. EPICS device support module communicates with the ATCA Shelf manager (ShM) using HTTP protocol to send and receive commands through POST method in order to get and set system and shelf components properties such as fan speeds measurements, temperatures readings, module status and ATCA boards acquisition and configuration parameters. All system properties, states, commands and parameters are available through the EPICS device support module CA server in EPICS Process Variables (PV) and signals format. ATCA ShM receives the HTTP protocol

  3. D-MHR: A Distributed Management Scheme for Hybrid Networks to Provide Real-time Industrial Wireless Automation

    NARCIS (Netherlands)

    Zand, P.; Das, Kallol; Mathews, E.; Havinga, Paul J.M.

    Current wireless technologies for industrial application, such as WirelessHART and ISA100.11a, use a centralized management approach which makes it difficult and costly for harvester-powered I/O devices to re-join the network in case of power failure. The communication overhead and delay to cope

  4. Locating of Series FACTS Devices for Multi-Objective Congestion Management Using Components of Nodal Prices

    Directory of Open Access Journals (Sweden)

    A. R. Moradi

    2017-03-01

    Full Text Available Congestion and overloading for lines are the main problems in the exploitation of power grids. The consequences of these problems in deregulated systems can be mentioned as sudden jumps in prices in some parts of the power system, lead to an increase in market power and reduction of competition in it. FACTS devices are efficient, powerful and economical tools in controlling power flows through transmission lines that play a fundamental role in congestion management. However, after removing congestion, power systems due to targeting security restrictions may be managed with a lower voltage or transient stability rather than before removing. Thus, power system stability should be considered within the construction of congestion management. In this paper, a multi-objective structure is presented for congestion management that simultaneously optimizes goals such as total operating cost, voltage and transient security. In order to achieve the desired goals, locating and sizing of series FACTS devices are done with using components of nodal prices and the newly developed grey wolf optimizer (GWO algorithm, respectively. In order to evaluate reliability of mentioned approaches, a simulation is done on the 39-bus New England network.

  5. A Process Management System for Networked Manufacturing

    Science.gov (United States)

    Liu, Tingting; Wang, Huifen; Liu, Linyan

    With the development of computer, communication and network, networked manufacturing has become one of the main manufacturing paradigms in the 21st century. Under the networked manufacturing environment, there exist a large number of cooperative tasks susceptible to alterations, conflicts caused by resources and problems of cost and quality. This increases the complexity of administration. Process management is a technology used to design, enact, control, and analyze networked manufacturing processes. It supports efficient execution, effective management, conflict resolution, cost containment and quality control. In this paper we propose an integrated process management system for networked manufacturing. Requirements of process management are analyzed and architecture of the system is presented. And a process model considering process cost and quality is developed. Finally a case study is provided to explain how the system runs efficiently.

  6. Cloud services, networking, and management

    CERN Document Server

    da Fonseca, Nelson L S

    2015-01-01

    Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content. Self-contained chapters for readers with specific interests. Includes commercial applications on Cloud (video services and games).

  7. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  8. An emerging network storage management standard: Media error monitoring and reporting information (MEMRI) - to determine optical tape data integrity

    Science.gov (United States)

    Podio, Fernando; Vollrath, William; Williams, Joel; Kobler, Ben; Crouse, Don

    1998-01-01

    Sophisticated network storage management applications are rapidly evolving to satisfy a market demand for highly reliable data storage systems with large data storage capacities and performance requirements. To preserve a high degree of data integrity, these applications must rely on intelligent data storage devices that can provide reliable indicators of data degradation. Error correction activity generally occurs within storage devices without notification to the host. Early indicators of degradation and media error monitoring 333 and reporting (MEMR) techniques implemented in data storage devices allow network storage management applications to notify system administrators of these events and to take appropriate corrective actions before catastrophic errors occur. Although MEMR techniques have been implemented in data storage devices for many years, until 1996 no MEMR standards existed. In 1996 the American National Standards Institute (ANSI) approved the only known (world-wide) industry standard specifying MEMR techniques to verify stored data on optical disks. This industry standard was developed under the auspices of the Association for Information and Image Management (AIIM). A recently formed AIIM Optical Tape Subcommittee initiated the development of another data integrity standard specifying a set of media error monitoring tools and media error monitoring information (MEMRI) to verify stored data on optical tape media. This paper discusses the need for intelligent storage devices that can provide data integrity metadata, the content of the existing data integrity standard for optical disks, and the content of the MEMRI standard being developed by the AIIM Optical Tape Subcommittee.

  9. The Analysis of User Behaviour of a Network Management Training Tool using a Neural Network

    Directory of Open Access Journals (Sweden)

    Helen Donelan

    2005-10-01

    Full Text Available A novel method for the analysis and interpretation of data that describes the interaction between trainee network managers and a network management training tool is presented. A simulation based approach is currently being used to train network managers, through the use of a simulated network. The motivation is to provide a tool for exposing trainees to a life like situation without disrupting a live network. The data logged by this system describes the detailed interaction between trainee network manager and simulated network. The work presented here provides an analysis of this interaction data that enables an assessment of the capabilities of the trainee network manager as well as an understanding of how the network management tasks are being approached. A neural network architecture is implemented in order to perform an exploratory data analysis of the interaction data. The neural network employs a novel form of continuous self-organisation to discover key features in the data and thus provide new insights into the learning and teaching strategies employed.

  10. Wireless Sensor Networks Database: Data Management and Implementation

    Directory of Open Access Journals (Sweden)

    Ping Liu

    2014-04-01

    Full Text Available As the core application of wireless sensor network technology, Data management and processing have become the research hotspot in the new database. This article studied mainly data management in wireless sensor networks, in connection with the characteristics of the data in wireless sensor networks, discussed wireless sensor network data query, integrating technology in-depth, proposed a mobile database structure based on wireless sensor network and carried out overall design and implementation for the data management system. In order to achieve the communication rules of above routing trees, network manager uses a simple maintenance algorithm of routing trees. Design ordinary node end, server end in mobile database at gathering nodes and mobile client end that can implement the system, focus on designing query manager, storage modules and synchronous module at server end in mobile database at gathering nodes.

  11. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications

    OpenAIRE

    Leila Melki; Sameh Najeh; Hichem Besbes

    2016-01-01

    In a cellular network it's very difficult to make spectrum resource more efficiently. Device-to-Device (D2D) technology enables new service opportunities, and provides high throughput and reliable communication while reducing the base station load. For better total performance, short-range D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. Here we argue that single-hop D2D technology can be used to further improve cellular net...

  12. Social networking and ecomobility through nomadic devices

    OpenAIRE

    PAUZIE, Annie

    2012-01-01

    Widespread among population of sophisticated nomadic devices such as smart phones is a possibility to be connected to social networks 'Anytime', 'Anywhere'. It can constitute a potential to support ecomobility with information on real time of location of danger/risky zones identified by drivers belonging to community members: potential to avoid traffic jams and to optimise the trip, ridesharing through connections between drivers and travellers belonging to the same community: potential to de...

  13. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  14. Managing logistical processes in franchise retail trade networks

    OpenAIRE

    Grigorenko Tatyana N.; Kochubey Dmitriy V.

    2013-01-01

    The article analyses approaches to organisation of internal logistics of franchise trade networks and methodical provision of assessment of results of logistical activity at companies of franchise networks. The article justifies urgency of application of referent models of management of supply chains in construction of a system of management of logistical activity of franchise networks. It offers classification of models of management of internal logistics of franchise retail trade networks. ...

  15. VNML: Virtualized Network Management Laboratory for Educational ...

    African Journals Online (AJOL)

    VNML: Virtualized Network Management Laboratory for Educational Purposes. ... Journal of Fundamental and Applied Sciences ... In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college ...

  16. The Managing Epilepsy Well Network:: Advancing Epilepsy Self-Management.

    Science.gov (United States)

    Sajatovic, Martha; Jobst, Barbara C; Shegog, Ross; Bamps, Yvan A; Begley, Charles E; Fraser, Robert T; Johnson, Erica K; Pandey, Dilip K; Quarells, Rakale C; Scal, Peter; Spruill, Tanya M; Thompson, Nancy J; Kobau, Rosemarie

    2017-03-01

    Epilepsy, a complex spectrum of disorders, affects about 2.9 million people in the U.S. Similar to other chronic disorders, people with epilepsy face challenges related to management of the disorder, its treatment, co-occurring depression, disability, social disadvantages, and stigma. Two national conferences on public health and epilepsy (1997, 2003) and a 2012 IOM report on the public health dimensions of epilepsy highlighted important knowledge gaps and emphasized the need for evidence-based, scalable epilepsy self-management programs. The Centers for Disease Control and Prevention translated recommendations on self-management research and dissemination into an applied research program through the Prevention Research Centers Managing Epilepsy Well (MEW) Network. MEW Network objectives are to advance epilepsy self-management research by developing effective interventions that can be broadly disseminated for use in people's homes, healthcare providers' offices, or in community settings. The aim of this report is to provide an update on the MEW Network research pipeline, which spans efficacy, effectiveness, and dissemination. Many of the interventions use e-health strategies to eliminate barriers to care (e.g., lack of transportation, functional limitations, and stigma). Strengths of this mature research network are the culture of collaboration, community-based partnerships, e-health methods, and its portfolio of prevention activities, which range from efficacy studies engaging hard-to-reach groups, to initiatives focused on provider training and knowledge translation. The MEW Network works with organizations across the country to expand its capacity, help leverage funding and other resources, and enhance the development, dissemination, and sustainability of MEW Network programs and tools. Guided by national initiatives targeting chronic disease or epilepsy burden since 2007, the MEW Network has been responsible for more than 43 scientific journal articles, two

  17. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices

    OpenAIRE

    Beyene, Yordanos

    2014-01-01

    In this dissertation, we attempt to understand and predict the performance of security devices. More specifically, we examine the following types of questions: (a) Given a security device, and a traffic load, can we predict the performance of the device? (b) Given a traffic load and a security device, how can we tune the performance of the device to achieve the desired trade-off between security and performance? We consider both stateful firewalls and Network Intrusion Prevention systems (NIP...

  18. Photon management of GaN-based optoelectronic devices via nanoscaled phenomena

    KAUST Repository

    Tsai, Yu-Lin

    2016-09-06

    Photon management is essential in improving the performances of optoelectronic devices including light emitting diodes, solar cells and photo detectors. Beyond the advances in material growth and device structure design, photon management via nanoscaled phenomena have also been demonstrated as a promising way for further modifying/improving the device performance. The accomplishments achieved by photon management via nanoscaled phenomena include strain-induced polarization field management, crystal quality improvement, light extraction/harvesting enhancement, radiation pattern control, and spectrum management. In this review, we summarize recent development, challenges and underlying physics of photon management in GaN-based light emitting diodes and solar cells. (C) 2016 Elsevier Ltd. All rights reserved.

  19. Medical device risk management and its economic impact

    Directory of Open Access Journals (Sweden)

    Katerina Krsteva Jakimovska

    2013-10-01

    Full Text Available The importance of medical devices in everyday users/patients lives is imensse. This is the reason why emphasis must be put on safety during their use. Satisfactory safety level can be achived by implementation of quality and risk management standards. Medical device manufacturers must learn to deal with the potential risks by using theoretical and practical examples and measures in order to protect their users/patients and themselves from suffering huge losses arising from adverse events or recall of their products. The best moment for implementation of risk management methods and analysis begins from the device design and development through manufacturing, sales and distribution. These way medical device manufacturers will succseed in protecting their users/patients from serious adverse events and at the same time protect their brand and society status, while minimizing economic losses.

  20. Using Bayesian belief networks in adaptive management.

    Science.gov (United States)

    J.B. Nyberg; B.G. Marcot; R. Sulyma

    2006-01-01

    Bayesian belief and decision networks are relatively new modeling methods that are especially well suited to adaptive-management applications, but they appear not to have been widely used in adaptive management to date. Bayesian belief networks (BBNs) can serve many purposes for practioners of adaptive management, from illustrating system relations conceptually to...

  1. Management continuity in local health networks

    Directory of Open Access Journals (Sweden)

    Mylaine Breton

    2012-04-01

    Full Text Available Introduction: Patients increasingly receive care from multiple providers in a variety of settings. They expect management continuity that crosses boundaries and bridges gaps in the healthcare system. To our knowledge, little research has been done to assess coordination across organizational and professional boundaries from the patients' perspective. Our objective was to assess whether greater local health network integration is associated with management continuity as perceived by patients. Method: We used the data from a research project on the development and validation of a generic and comprehensive continuity measurement instrument that can be applied to a variety of patient conditions and settings. We used the results of a cross-sectional survey conducted in 2009 with 256 patients in two local health networks in Quebec, Canada. We compared four aspects of management continuity between two contrasting network types (highly integrated vs. poorly integrated. Results: The scores obtained in the highly integrated network are better than those of the poorly integrated network on all dimensions of management continuity (coordinator role, role clarity and coordination between clinics, and information gaps between providers except for experience of care plan. Conclusion: Some aspects of care coordination among professionals and organizations are noticed by patients and may be valid indicators to assess care coordination.

  2. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  3. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  4. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  5. An Intelligent Alternative Approach to the efficient Network Management

    Directory of Open Access Journals (Sweden)

    MARTÍN, A.

    2012-12-01

    Full Text Available Due to the increasing complexity and heterogeneity of networks and services, many efforts have been made to develop intelligent techniques for management. Network intelligent management is a key technology for operating large heterogeneous data transmission networks. This paper presents a proposal for an architecture that integrates management object specifications and the knowledge of expert systems. We present a new approach named Integrated Expert Management, for learning objects based on expert management rules and describe the design and implementation of an integrated intelligent management platform based on OSI and Internet management models. The main contributions of our approach is the integration of both expert system and managed models, so we can make use of them to construct more flexible intelligent management network. The prototype SONAP (Software for Network Assistant and Performance is accuracy-aware since it can control and manage a network. We have tested our system on real data to the fault diagnostic in a telecommunication system of a power utility. The results validate the model and show a significant improvement with respect to the number of rules and the error rate in others systems.

  6. Agile Management and Interoperability Testing of SDN/NFV‐Enriched 5G Core Networks

    Directory of Open Access Journals (Sweden)

    Taesang Choi

    2018-02-01

    Full Text Available In the fifth generation (5G era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission‐critical Internet of Things is the main differentiator of 5G services. These types of real‐time and large‐bandwidth‐consuming services require a radio latency of less than 1 ms and an end‐to‐end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software‐defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof‐of‐concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

  7. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  8. Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Jun Huang

    2015-08-01

    Full Text Available Device-to-Device (D2D communication has recently emerged as a promising technology to improve the capacity and coverage of cellular systems. To successfully implement D2D communications underlaying a cellular network, resource allocation for D2D links plays a critical role. While most of prior resource allocation mechanisms for D2D communications have focused on interference within a single-cell system, this paper investigates the resource allocation problem for a multicell cellular network in which a D2D link reuses available spectrum resources of multiple cells. A repeated game theoretic approach is proposed to address the problem. In this game, the base stations (BSs act as players that compete for resource supply of D2D, and the utility of each player is formulated as revenue collected from both cellular and D2D users using resources. Extensive simulations are conducted to verify the proposed approach and the results show that it can considerably enhance the system performance in terms of sum rate and sum rate gain.

  9. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  10. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  11. Bring Your Own Device and Nurse Managers' Decision Making.

    Science.gov (United States)

    Martinez, Karen; Borycki, Elizabeth; Courtney, Karen L

    2017-02-01

    The Bring Your Own Device phenomenon is important in the healthcare environment because this trend is changing the workplace in healthcare organizations, such as British Columbia. At present, there is little research that exists in Canada to provide a distinct understanding of the complexities and difficulties unique to this phenomenon within the nursing practice. This study focused on the experiences and perceptions of nurse managers regarding how they make decisions on the use of personal handheld devices in the workplace. Telephone interviews (N = 10) and qualitative descriptive analysis were used. Four major themes emerged: (1) management perspective, (2) opportunities, (3) disadvantages, and (4) solutions. Nurse managers and other executives in healthcare organizations and health information technology departments need to be aware of the practice and organizational implications of the Bring Your Own Device movement.

  12. Photon management of GaN-based optoelectronic devices via nanoscaled phenomena

    KAUST Repository

    Tsai, Yu-Lin; Lai, Kun-Yu; Lee, Ming-Jui; Liao, Yu-Kuang; Ooi, Boon S.; Kuo, Hao-Chung; He, Jr-Hau

    2016-01-01

    Photon management is essential in improving the performances of optoelectronic devices including light emitting diodes, solar cells and photo detectors. Beyond the advances in material growth and device structure design, photon management via

  13. PIYAS-Proceeding to Intelligent Service Oriented Memory Allocation for Flash Based Data Centric Sensor Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanam Shahla Rizvi

    2009-12-01

    Full Text Available Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS. This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  14. PIYAS-proceeding to intelligent service oriented memory allocation for flash based data centric sensor devices in wireless sensor networks.

    Science.gov (United States)

    Rizvi, Sanam Shahla; Chung, Tae-Sun

    2010-01-01

    Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS). This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  15. A neural network device for on-line particle identification in cosmic ray experiments

    International Nuclear Information System (INIS)

    Scrimaglio, R.; Finetti, N.; D'Altorio, L.; Rantucci, E.; Raso, M.; Segreto, E.; Tassoni, A.; Cardarilli, G.C.

    2004-01-01

    On-line particle identification is one of the main goals of many experiments in space both for rare event studies and for optimizing measurements along the orbital trajectory. Neural networks can be a useful tool for signal processing and real time data analysis in such experiments. In this document we report on the performances of a programmable neural device which was developed in VLSI analog/digital technology. Neurons and synapses were accomplished by making use of Operational Transconductance Amplifier (OTA) structures. In this paper we report on the results of measurements performed in order to verify the agreement of the characteristic curves of each elementary cell with simulations and on the device performances obtained by implementing simple neural structures on the VLSI chip. A feed-forward neural network (Multi-Layer Perceptron, MLP) was implemented on the VLSI chip and trained to identify particles by processing the signals of two-dimensional position-sensitive Si detectors. The radiation monitoring device consisted of three double-sided silicon strip detectors. From the analysis of a set of simulated data it was found that the MLP implemented on the neural device gave results comparable with those obtained with the standard method of analysis confirming that the implemented neural network could be employed for real time particle identification

  16. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices

    Directory of Open Access Journals (Sweden)

    Ziyang He

    2018-04-01

    Full Text Available By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  17. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices.

    Science.gov (United States)

    He, Ziyang; Zhang, Xiaoqing; Cao, Yangjie; Liu, Zhi; Zhang, Bo; Wang, Xiaoyan

    2018-04-17

    By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG) arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  18. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  19. Management of mandated networks from a dynamic perspective

    NARCIS (Netherlands)

    Segato, Federica; Raab, J.

    2017-01-01

    The management of networks has received increasing attention in recent years in the form of systematic empirical research. The general thrust of the results seem to indicate that network management resembles what we know about general management. However, there are also specific characteristics of

  20. Strategy Scriptions: On sociomaterial devices staging strategy formulation European Management Journal

    DEFF Research Database (Denmark)

    Friis, Ole Uhrskov

    2014-01-01

    is making strategic choices, then chose a strategy and then making and action plan. Most project groups worked as expected, one group constituting a rare exception, as staging and the mobilisation of devices lead to unanticipated events, triggering extraordinary management activity. Our study shows......Strategy formulation can be viewed as an entanglement of social and material elements, developing sociomaterial strategy devices. Devices contribute to arranging and staging occasions of strategy formulation. The article investigates which arenas are staged for strategy formulation, which types...... of devices is purposely mobilised by management. and consultants. First, one central device, based on a balanced scorecard, is staging the managers as active strategists in a more traditional strategy workshop, with the employees as distanced spectators. Second, the employees are staged in an open space...

  1. Handbook of sensor networking advanced technologies and applications

    CERN Document Server

    Vacca, John R

    2015-01-01

    ""John R. Vacca has been a forward thinker in how omnipotent networks will work and envisioned many types of devices and functions that can be networked. His work in these areas is unsurpassed by other writers and visionaries.In this book, John has pulled together the knowledge that is needed for managers and developers to keep moving forward, and to do so faster, with sensor networking machines and devices that can perform both the mundane and complex tasks that are required for process management and production, which is necessary to propel enterprises and thus drive the global econom

  2. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    Science.gov (United States)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  3. AANA Journal Course: update for nurse anesthetists. Arrhythmia management devices and electromagnetic interference.

    Science.gov (United States)

    Mattingly, Emily

    2005-04-01

    The technological complexity of implantable arrhythmia management devices, specifically pacemakers and defibrillators, has increased dramatically since their introduction only a few decades ago. Patients with such devices are encountered much more frequently in hospitals and surgery centers, yet anesthesia provider knowledge of safe and proper management is often incomplete. Anesthesia textbooks and references may provide only short paragraphs on arrhythmia management devices that do not address important perioperative management strategies for this ever-growing patient population. It is no longer satisfactory to simply place a magnet over an implanted device during surgery and assume that this action protects the patient from harm due to electromagnetic interference from inappropriate device function. This AANA Journal course serves as a concise review of basic device function, the sources and effects of electromagnetic interference in the operative setting, and patient management recommendations from current literature.

  4. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  5. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Science.gov (United States)

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  6. Intelligent device management in the selfcare marketplace.

    Science.gov (United States)

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  7. The PMIPv6-Based Group Binding Update for IoT Devices

    Directory of Open Access Journals (Sweden)

    Jianfeng Guan

    2016-01-01

    Full Text Available Internet of Things (IoT has been booming with rapid increase of the various wearable devices, vehicle embedded devices, and so on, and providing the effective mobility management for these IoT devices becomes a challenge due to the different application scenarios as well as the limited energy and bandwidth. Recently, lots of researchers have focused on this topic and proposed several solutions based on the combination of IoT features and traditional mobility management protocols, in which most of these schemes take the IoT devices as mobile networks and adopt the NEtwork MObility (NEMO and its variants to provide the mobility support. However, these solutions are in face of the heavy signaling cost problem. Since IoT devices are generally combined to realize the complex functions, these devices may have similar movement behaviors. Clearly analyzing these characters and using them in the mobility management will reduce the signaling cost and improve the scalability. Motivated by this, we propose a PMIPv6-based group binding update method. In particular, we describe its group creation procedure, analyze its impact on the mobility management, and derive its reduction ratio in terms of signaling cost. The final results show that the introduction of group binding update can remarkably reduce the signaling cost.

  8. Performance Analysis of Dual-Polarized Massive MIMO System with Human-Care IoT Devices for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jun-Ki Hong

    2018-01-01

    Full Text Available The performance analysis of the dual-polarized massive multiple-input multiple-output (MIMO system with Internet of things (IoT devices is studied when outdoor human-care IoT devices are connected to a cellular network via a dual-polarized massive MIMO system. The research background of the performance analysis of dual-polarized massive MIMO system with IoT devices is that recently the data usage of outdoor human-care IoT devices has increased. Therefore, the outdoor human-care IoT devices are necessary to connect with 5G cellular networks which can expect 1000 times higher performance compared with 4G cellular networks. Moreover, in order to guarantee the safety of the patient for emergency cases, a human-care Iot device must be connected to cellular networks which offer more stable communication for outdoors compared to short-range communication technologies such as Wi-Fi, Zigbee, and Bluetooth. To analyze the performance of the dual-polarized massive MIMO system for human-care IoT devices, a dual-polarized MIMO spatial channel model (SCM is proposed which considers depolarization effect between the dual-polarized transmit-antennas and the receive-antennas. The simulation results show that the performance of the dual-polarized massive MIMO system is improved about 16% to 92% for 20 to 150 IoT devices compared to conventional single-polarized massive MIMO system for identical size of the transmit array.

  9. Research Devices Maintenance Programs and Safety Network Infrastructures in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Zainudin Jaafar; Muhammad Zahidee Taat; Ishak Mansor

    2015-01-01

    Instrumentation and Automation Center (PIA) is responsible in carrying out maintenance work for building safety infrastructure and area for nuclear scientific and research work. Care cycle and nuclear scientific tools starting from the preparation of specifications until devices disposal- to get the maximum output from devices therefore PIA has introduced Effective and Comprehensive Maintenance Plan under Management/ Trust/ Development/ Science Fund budgets and also user, Asset Management, caring and handling of the devices. This paper also discussed more on case study related to using and handling so that it can be guidance and standard when its involving mishandling, improper maintenance, inadequacy of supervision and others including improvement suggestion programs. (author)

  10. The prevention research centers' managing epilepsy well network.

    Science.gov (United States)

    DiIorio, Colleen K; Bamps, Yvan A; Edwards, Ariele L; Escoffery, Cam; Thompson, Nancy J; Begley, Charles E; Shegog, Ross; Clark, Noreen M; Selwa, Linda; Stoll, Shelley C; Fraser, Robert T; Ciechanowski, Paul; Johnson, Erica K; Kobau, Rosemarie; Price, Patricia H

    2010-11-01

    The Managing Epilepsy Well (MEW) Network was created in 2007 by the Centers for Disease Control and Prevention's (CDC) Prevention Research Centers and Epilepsy Program to promote epilepsy self-management research and to improve the quality of life for people with epilepsy. MEW Network membership comprises four collaborating centers (Emory University, University of Texas Health Science Center at Houston, University of Michigan, and University of Washington), representatives from CDC, affiliate members, and community stakeholders. This article describes the MEW Network's background, mission statement, research agenda, and structure. Exploratory and intervention studies conducted by individual collaborating centers are described, as are Network collaborative projects, including a multisite depression prevention intervention and the development of a standard measure of epilepsy self-management. Communication strategies and examples of research translation programs are discussed. The conclusion outlines the Network's role in the future development and dissemination of evidence-based epilepsy self-management programs. Copyright © 2010 Elsevier Inc. All rights reserved.

  11. Maintenance Management in Network Utilities Framework and Practical Implementation

    CERN Document Server

    Gómez Fernández, Juan F

    2012-01-01

    In order to satisfy the needs of their customers, network utilities require specially developed maintenance management capabilities. Maintenance Management information systems are essential to ensure control, gain knowledge and improve-decision making in companies dealing with network infrastructure, such as distribution of gas, water, electricity and telecommunications. Maintenance Management in Network Utilities studies specified characteristics of maintenance management in this sector to offer a practical approach to defining and implementing  the best management practices and suitable frameworks.   Divided into three major sections, Maintenance Management in Network Utilities defines a series of stages which can be followed to manage maintenance frameworks properly. Different case studies provide detailed descriptions which illustrate the experience in real company situations. An introduction to the concepts is followed by main sections including: • A Literature Review: covering the basic concepts an...

  12. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  13. Demand Side Management for Multiple Devices

    NARCIS (Netherlands)

    Molderink, Albert; Bakker, Vincent; Smit, Gerardus Johannes Maria

    Steering a heterogeneous set of devices in a Smart Grid using cost functions: Demand Side Management (DSM) is an important element in smart grids. DSM is already in operation for large consumers, but thorough research is required into DSM on a building level within the distribution grid.

  14. A Survey on Urban Traffic Management System Using Wireless Sensor Networks

    Science.gov (United States)

    Nellore, Kapileswar; Hancke, Gerhard P.

    2016-01-01

    Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs) have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT) of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research. PMID:26828489

  15. Picture this: Managed change and resistance in business network settings

    DEFF Research Database (Denmark)

    Kragh, Hanne; Andersen, Poul Houman

    2009-01-01

    This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...

  16. Programmable multi-node quantum network design and simulation

    Science.gov (United States)

    Dasari, Venkat R.; Sadlier, Ronald J.; Prout, Ryan; Williams, Brian P.; Humble, Travis S.

    2016-05-01

    Software-defined networking offers a device-agnostic programmable framework to encode new network functions. Externally centralized control plane intelligence allows programmers to write network applications and to build functional network designs. OpenFlow is a key protocol widely adopted to build programmable networks because of its programmability, flexibility and ability to interconnect heterogeneous network devices. We simulate the functional topology of a multi-node quantum network that uses programmable network principles to manage quantum metadata for protocols such as teleportation, superdense coding, and quantum key distribution. We first show how the OpenFlow protocol can manage the quantum metadata needed to control the quantum channel. We then use numerical simulation to demonstrate robust programmability of a quantum switch via the OpenFlow network controller while executing an application of superdense coding. We describe the software framework implemented to carry out these simulations and we discuss near-term efforts to realize these applications.

  17. Double network bacterial cellulose hydrogel to build a biology-device interface

    Science.gov (United States)

    Shi, Zhijun; Li, Ying; Chen, Xiuli; Han, Hongwei; Yang, Guang

    2013-12-01

    Establishing a biology-device interface might enable the interaction between microelectronics and biotechnology. In this study, electroactive hydrogels have been produced using bacterial cellulose (BC) and conducting polymer (CP) deposited on the BC hydrogel surface to cover the BC fibers. The structures of these composites thus have double networks, one of which is a layer of electroactive hydrogels combined with BC and CP. The electroconductivity provides the composites with capabilities for voltage and current response, and the BC hydrogel layer provides good biocompatibility, biodegradability, bioadhesion and mass transport properties. Such a system might allow selective biological functions such as molecular recognition and specific catalysis and also for probing the detailed genetic and molecular mechanisms of life. A BC-CP composite hydrogel could then lead to a biology-device interface. Cyclic voltammetry and electrochemical impedance spectroscopy (EIS) are used here to study the composite hydrogels' electroactive property. BC-PAni and BC-PPy respond to voltage changes. This provides a mechanism to amplify electrochemical signals for analysis or detection. BC hydrogels were found to be able to support the growth, spreading and migration of human normal skin fibroblasts without causing any cytotoxic effect on the cells in the cell culture. These double network BC-CP hydrogels are biphasic Janus hydrogels which integrate electroactivity with biocompatibility, and might provide a biology-device interface to produce implantable devices for personalized and regenerative medicine.

  18. Network position and related power : how they affect and are affected by network management and outcomes

    NARCIS (Netherlands)

    Oukes, Tamara

    2018-01-01

    In network position and related power you learn more about how network position and related power affect and are affected by network management and outcomes. First, I expand our present understanding of how startups with a fragile network position manage business relationships by taking an

  19. Urgent surgical management for embolized occluder devices in childhood: single center experience

    Directory of Open Access Journals (Sweden)

    Gokaslan Gokhan

    2012-12-01

    Full Text Available Abstract Background In this study, we sought to analyze our experience in urgent surgical management for embolized cardiac septal and ductal occluder devices resulting from trans-catheter closure of atrial septal defect, ventricular septal defect and patent ductus arteriosus in childhood patient group. Methods We retrospectively reviewed 9 patients (aged 2–15 years who underwent urgent surgery due to cardiac septal and ductal occluder embolization between January 2007 and December 2010. Congenital defects were atrial septal defect (n = 6, ventricular septal defect (n = 1, and patent ductus arteriosus (n = 2. Risk factors for device embolization and urgent surgical management techniques for embolized device removal were discussed. Results Removal of embolized devices in all cases and repair of damaged tricuspid valve in 2 patients were performed. Inevitably, all congenital defects were closed or ligated up to the primary defect. Total circulator arrest necessitated in 1 patient with ascending aortic device embolization. All operations were completed successfully and no hospital mortality or morbidity was encountered. Conclusions Although closure of left to right shunting defects by percutaneous occluder devices has a lot of advantages, device embolization is still a major complication. If embolized device retrieval fails with percutaneous intervention attempts, surgical management is the only method to remove embolized devices. In this circumstance, to provide an uneventful perioperative course, urgent management strategies should be well planned.

  20. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    DEFF Research Database (Denmark)

    Figueiras, Joao

    of the physical length of the communication links. Since these solutions do not require integration of additional hardware into the mobile nodes, they are cheap and simple to implement. As a price to pay, accuracy is typically lower in comparison to dedicated positioning systems. Thus, an important challenge...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information......Positioning of mobile devices in wireless communication networks is nowadays being intensively investigated due to the combined benefit of location information and communication. Typical solutions for such scenario rely on robust algorithms that estimate position from indirect measurements...

  1. InP monolithically integrated label swapper device for spectral amplitude coded optical packet networks

    NARCIS (Netherlands)

    Muñoz, P.; García-Olcina, R.; Doménech, J.D.; Rius, M.; Sancho, J.C.; Capmany, J.; Chen, L.R.; Habib, C.; Leijtens, X.J.M.; Vries, de T.; Heck, M.J.R.; Augustin, L.M.; Nötzel, R.; Robbins, D.J.

    2010-01-01

    In this paper a label swapping device, for spectral amplitude coded optical packet networks, fully integrated using InP technology is presented. Compared to previous demonstrations using discrete component assembly, the device footprint is reduced by a factor of 105 and the operation speed is

  2. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  3. Method and device for monitoring distortion in an optical network

    NARCIS (Netherlands)

    2012-01-01

    A method and a device for monitoring of distortion in an optical network are provided, wherein at least one reference signal and at least one data signal are conveyed via an optical link and wherein a distortion of the at least one data signal is determined based on the at least one reference

  4. Improvised explosive devices: pathophysiology, injury profiles and current medical management.

    Science.gov (United States)

    Ramasamy, A; Hill, A M; Clasper, J C

    2009-12-01

    The improvised explosive device (IED), in all its forms, has become the most significant threat to troops operating in Afghanistan and Iraq. These devices range from rudimentary home made explosives to sophisticated weapon systems containing high-grade explosives. Within this broad definition they may be classified as roadside explosives and blast mines, explosive formed pojectile (EFP) devices and suicide bombings. Each of these groups causeinjury through a number of different mechanisms and can result in vastly different injury profiles. The "Global War on Terror" has meant that incidents which were previously exclusively seen in conflict areas, can occur anywhere, and clinicians who are involved in emergency trauma care may be required to manage casualties from similar terrorist attacks. An understanding of the types of devices and their pathophysiological effects is necessary to allow proper planning of mass casualty events and to allow appropriate management of the complex poly-trauma casualties they invariably cause. The aim of this review article is to firstly describe the physics and injury profile from these different devices and secondly to present the current clinical evidence that underpins their medical management.

  5. Organization of managed clinical networking for home parenteral nutrition.

    Science.gov (United States)

    Baxter, Janet P; McKee, Ruth F

    2006-05-01

    Home parenteral nutrition (HPN) is an established treatment for intestinal failure, and organization of HPN is variable throughout the UK and Europe. Managed clinical networking is the single most important feature of the UK National Health Service strategy for acute services in Scotland and has the potential to improve the management of HPN patients. This review addresses the role of managed clinical networking in HPN and compares outcome data between centres. The Scottish HPN Managed Clinical Network has published the main body of the current literature supporting the concept of managed clinical networking in this context. The Network is responsible for the organization and quality assurance of HPN provision in Scotland, and has been established for 5 years. It has captured significant patient data for the purpose of clinical audit and illustrates that this is an effective model for the management of this patient population. This review provides advice for other areas wishing to improve equity of access, and to smooth the patient journey between primary, secondary and tertiary health care in the context of artificial nutrition support.

  6. Intelligent battery energy management and control for vehicle-to-grid via cloud computing network

    International Nuclear Information System (INIS)

    Khayyam, Hamid; Abawajy, Jemal; Javadi, Bahman; Goscinski, Andrzej; Stojcevski, Alex; Bab-Hadiashar, Alireza

    2013-01-01

    Highlights: • The intelligent battery energy management substantially reduces the interactions of PEV with parking lots. • The intelligent battery energy management improves the energy efficiency. • The intelligent battery energy management predicts the road load demand for vehicles. - Abstract: Plug-in Electric Vehicles (PEVs) provide new opportunities to reduce fuel consumption and exhaust emission. PEVs need to draw and store energy from an electrical grid to supply propulsive energy for the vehicle. As a result, it is important to know when PEVs batteries are available for charging and discharging. Furthermore, battery energy management and control is imperative for PEVs as the vehicle operation and even the safety of passengers depend on the battery system. Thus, scheduling the grid power electricity with parking lots would be needed for efficient charging and discharging of PEV batteries. This paper aims to propose a new intelligent battery energy management and control scheduling service charging that utilize Cloud computing networks. The proposed intelligent vehicle-to-grid scheduling service offers the computational scalability required to make decisions necessary to allow PEVs battery energy management systems to operate efficiently when the number of PEVs and charging devices are large. Experimental analyses of the proposed scheduling service as compared to a traditional scheduling service are conducted through simulations. The results show that the proposed intelligent battery energy management scheduling service substantially reduces the required number of interactions of PEV with parking lots and grid as well as predicting the load demand calculated in advance with regards to their limitations. Also it shows that the intelligent scheduling service charging using Cloud computing network is more efficient than the traditional scheduling service network for battery energy management and control

  7. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  8. Public management and policy networks: foundations of a network approach to governance

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)

    2006-01-01

    markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy

  9. Intelligent Resource Management for Local Area Networks: Approach and Evolution

    Science.gov (United States)

    Meike, Roger

    1988-01-01

    The Data Management System network is a complex and important part of manned space platforms. Its efficient operation is vital to crew, subsystems and experiments. AI is being considered to aid in the initial design of the network and to augment the management of its operation. The Intelligent Resource Management for Local Area Networks (IRMA-LAN) project is concerned with the application of AI techniques to network configuration and management. A network simulation was constructed employing real time process scheduling for realistic loads, and utilizing the IEEE 802.4 token passing scheme. This simulation is an integral part of the construction of the IRMA-LAN system. From it, a causal model is being constructed for use in prediction and deep reasoning about the system configuration. An AI network design advisor is being added to help in the design of an efficient network. The AI portion of the system is planned to evolve into a dynamic network management aid. The approach, the integrated simulation, project evolution, and some initial results are described.

  10. Hybrid Spintronic-CMOS Spiking Neural Network with On-Chip Learning: Devices, Circuits, and Systems

    Science.gov (United States)

    Sengupta, Abhronil; Banerjee, Aparajita; Roy, Kaushik

    2016-12-01

    Over the past decade, spiking neural networks (SNNs) have emerged as one of the popular architectures to emulate the brain. In SNNs, information is temporally encoded and communication between neurons is accomplished by means of spikes. In such networks, spike-timing-dependent plasticity mechanisms require the online programing of synapses based on the temporal information of spikes transmitted by spiking neurons. In this work, we propose a spintronic synapse with decoupled spike-transmission and programing-current paths. The spintronic synapse consists of a ferromagnet-heavy-metal heterostructure where the programing current through the heavy metal generates spin-orbit torque to modulate the device conductance. Low programing energy and fast programing times demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We perform a simulation study based on an experimentally benchmarked device-simulation framework to demonstrate the interfacing of such spintronic synapses with CMOS neurons and learning circuits operating in the transistor subthreshold region to form a network of spiking neurons that can be utilized for pattern-recognition problems.

  11. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  12. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  13. Resource Management in Broadband Communication Networks

    DEFF Research Database (Denmark)

    Hansen, Mads Stenhuus

    2003-01-01

    . The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants......This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered...

  14. Detection of Traffic Initiated by Mobile Malware Targeting Android Devices in 3GPP Networks

    OpenAIRE

    Kühnel, Marián

    2017-01-01

    Android devices have become the most popular of mobile devices; omnipresent in both business and private use. They are virtually always on and offer functionalities exceeding those of desktop computers. These properties, as well as sensitive information stored on Android devices, render them an attractive target for mobile malware authors. As the volume of mobile malware increases, analysis is becoming challenging and, sometimes, infeasible. Additionally, current network-based intrusion detec...

  15. Radio resource management scheme and outage analysis for network-assisted multi-hop D2D communications

    Directory of Open Access Journals (Sweden)

    Leila Melki

    2016-11-01

    Full Text Available In a cellular network it's very difficult to make spectrum resource more efficiently. Device-to-Device (D2D technology enables new service opportunities, and provides high throughput and reliable communication while reducing the base station load. For better total performance, short-range D2D links and cellular links share the same radio resource and the management of interference becomes a crucial task. Here we argue that single-hop D2D technology can be used to further improve cellular networks performance if the key D2D radio resource management algorithms are suitably extended to support multi-hop D2D communications. Aiming to establish a new paradigm for the analysis and design of multi-hop D2D communications, We propose a radio resource allocation for multi-hop D2D routes based on interference avoidance approach in LTE-A networks. On top of that, we investigate the outage probability of D2D communication. We first introduce a new definition of outage probability by considering the maximum distance to be allowable for single-hop transmission. Then we study and analyze the outage performance of a multi-hop D2D route. We derive the general closed form expression of outage probability of the multi-hop D2D routes. The results demonstrate that the D2D radio, sharing the same resources as the cellular network, provide higher capacity compared to pure cellular communication where all the data is transmitted through the base station. They also demonstrate that the new method of calculation of D2D multi hop outage probability has better performance than classical method defined in the literature.

  16. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  17. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    For many globally dispersed organisations, the home base (HB) is a historic locus of integrative and coordinating efforts that safeguard overall performance. However, the dynamism of global operations networks is increasingly pulling the centre of gravity away from the HB and dispersing it across...... the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  18. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  19. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  20. Re-engineering Nascom's network management architecture

    Science.gov (United States)

    Drake, Brian C.; Messent, David

    1994-01-01

    The development of Nascom systems for ground communications began in 1958 with Project Vanguard. The low-speed systems (rates less than 9.6 Kbs) were developed following existing standards; but, there were no comparable standards for high-speed systems. As a result, these systems were developed using custom protocols and custom hardware. Technology has made enormous strides since the ground support systems were implemented. Standards for computer equipment, software, and high-speed communications exist and the performance of current workstations exceeds that of the mainframes used in the development of the ground systems. Nascom is in the process of upgrading its ground support systems and providing additional services. The Message Switching System (MSS), Communications Address Processor (CAP), and Multiplexer/Demultiplexer (MDM) Automated Control System (MACS) are all examples of Nascom systems developed using standards such as, X-windows, Motif, and Simple Network Management Protocol (SNMP). Also, the Earth Observing System (EOS) Communications (Ecom) project is stressing standards as an integral part of its network. The move towards standards has produced a reduction in development, maintenance, and interoperability costs, while providing operational quality improvement. The Facility and Resource Manager (FARM) project has been established to integrate the Nascom networks and systems into a common network management architecture. The maximization of standards and implementation of computer automation in the architecture will lead to continued cost reductions and increased operational efficiency. The first step has been to derive overall Nascom requirements and identify the functionality common to all the current management systems. The identification of these common functions will enable the reuse of processes in the management architecture and promote increased use of automation throughout the Nascom network. The MSS, CAP, MACS, and Ecom projects have indicated

  1. A DRM Security Architecture for Home Networks

    NARCIS (Netherlands)

    Popescu, B.C.; Crispo, B.; Kamperman, F.L.A.J.; Tanenbaum, A.S.; Kiayias, A.; Yung, M.

    2004-01-01

    This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establish dynamic groups, so called "Authorized Domains", where legally acquired copyrighted content can seamlessly move from

  2. Efficient network resource management for multimedia-on-demand services

    Science.gov (United States)

    Kuo, Chinhwa; Chiu, Jui-Hwa; Wu, Jong-Jyh; Chen, Dxo-Shin

    1998-08-01

    A Multimedia Instruction on Demand (MID) serves the purpose of providing an environment for lecture design, lecture annotation, and lecture review over networks. In order to support real-time multimedia interactive playback for such an application, the underlying networks are required to provide network resource management mechanism to enforce the reservation policy. In our design, the MID server and MID gateway consist of the following mechanisms, namely, resource management agent, admission control agent, packet classifier, and packet scheduler. We make use of the framework of the ReSerVation Protocol to devise and implement a network resource management mechanism, which control end-to-end packet delays and bandwidth allocation for the designed MID system. In the present paper, our contributions are as follows: (1) a network resource management scheme is designed to support real-time multimedia over the Internet and (2) an experimental test bed is established to measure the system performance. The developed scheme is currently being implemented in the Multimedia Information Networking laboratory at Tamkang University.

  3. Motorized CPM/CAM physiotherapy device with sliding-mode Fuzzy Neural Network control loop.

    Science.gov (United States)

    Ho, Hung-Jung; Chen, Tien-Chi

    2009-11-01

    Continuous passive motion (CPM) and controllable active motion (CAM) physiotherapy devices promote rehabilitation of damaged joints. This paper presents a computerized CPM/CAM system that obviates the need for mechanical resistance devices such as springs. The system is controlled by a computer which performs sliding-mode Fuzzy Neural Network (FNN) calculations online. CAM-type resistance force is generated by the active performance of an electric motor which is controlled so as to oppose the motion of the patient's leg. A force sensor under the patient's foot on the device pedal provides data for feedback in a sliding-mode FNN control loop built around the motor. Via an active impedance control feedback system, the controller drives the motor to behave similarly to a damped spring by generating and controlling the amplitude and direction of the pedal force in relation to the patient's leg. Experiments demonstrate the high sensitivity and speed of the device. The PC-based feedback nature of the control loop means that sophisticated auto-adaptable CPM/CAM custom-designed physiotherapy becomes possible. The computer base also allows extensive data recording, data analysis and network-connected remote patient monitoring.

  4. Optical Networks Solutions planning - performances - management

    DEFF Research Database (Denmark)

    Fenger, Christian

    2002-01-01

    It has been a decisive goal in the compilation of this thesis to make us capable of realizing the future national and regional telecommunication networks in an efficient and resource optimal way. By future telecommunication network is assumed an all optical network where the information in transit...... are kept optical and not converted into the optical domain. The focus is on the scientific results achieved throughout the Ph.D. period. Five subjects – all increasing the understanding of optical networks – are studied. Static wavelength routed optical networks are studied. Management on terms...... of lightpath allocation and design is considered. By using statistical models (simultaneous analysis of many networks) the correspondence between parameters determining the network topology and the performance of the optical network is found. These dependencies are important knowledge in the process...

  5. Repair and managing device in nuclear power plants

    International Nuclear Information System (INIS)

    Shinzawa, Katsuo.

    1982-01-01

    Purpose: To moderate the operator's labour by automatically carrying out the managing works for the repair of nuclear power plants. Constitution: Information concerning the content of the repair works inputted from an input device is arranged and analyzed in a calculation device and judged if it is the content for a format work or not. The calculation device has a function of extracting the information regarding the format work content from the memory device and comparing the plant information from the reading device before the repair work and after the recovering work. A printer connected to the output end of the calculation device issues an information regarding the format work content extracted from the memory device, that is, written work procedures and operation inhibition TAG. The content, period, person in charge, purpose, allowed items and the likes for the works are printed on the operation inhibition TAG. After the operation for the equipments, one half of them is charged to the equipment and the other half of them is charged to the reading device and the plant information is sent to the memory device. (Kawakami, Y.)

  6. Designing and Implementing a Distributed Social Network Service for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Alexandru RADOVICI

    2011-01-01

    Full Text Available The paper presents a new paradigm for building social network services. The proposed platform is called eXtensible Social Network. As it uses the XMPP protocol for authentication and communication, it allows users from different service providers interact with each other, without having to change their accounts. Moreover, the platform provides means for users to authenticate and interact with each other while temporary disconnected from the Internet. Moreover, the platform is specially designed for mobile devices, running on their restrictive operating systems and taking advantage of the systems optimizations.

  7. Managing interdependencies in supplier networks

    OpenAIRE

    Catarina Roseira; Carlos Brito

    2010-01-01

    Building and managing a supplier base has been referred to in the literature as a key aspect of supplier management. Scholars have proposed a number of models aimed at enhancing the effectiveness of supplier network management, mainly based on a portfolio approach. In the IMP tradition of research, those models are often criticized as they ignore the interdependencies between the different existing dyadic relationships of a focal buyer company and its suppliers. Such interdependencies are the...

  8. Earth-Mars Telecommunications and Information Management System (TIMS): Antenna Visibility Determination, Network Simulation, and Management Models

    Science.gov (United States)

    Odubiyi, Jide; Kocur, David; Pino, Nino; Chu, Don

    1996-01-01

    This report presents the results of our research on Earth-Mars Telecommunications and Information Management System (TIMS) network modeling and unattended network operations. The primary focus of our research is to investigate the feasibility of the TIMS architecture, which links the Earth-based Mars Operations Control Center, Science Data Processing Facility, Mars Network Management Center, and the Deep Space Network of antennae to the relay satellites and other communication network elements based in the Mars region. The investigation was enhanced by developing Build 3 of the TIMS network modeling and simulation model. The results of several 'what-if' scenarios are reported along with reports on upgraded antenna visibility determination software and unattended network management prototype.

  9. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  10. Adapting cognitive radio technology for low-power wireless personal area network devices

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  11. Comparison of home and away-from-home physical activity using accelerometers and cellular network-based tracking devices.

    Science.gov (United States)

    Ramulu, Pradeep Y; Chan, Emilie S; Loyd, Tara L; Ferrucci, Luigi; Friedman, David S

    2012-08-01

    Measuring physical at home and away from home is essential for assessing health and well-being, and could help design interventions to increase physical activity. Here, we describe how physical activity at home and away from home can be quantified by combining information from cellular network-based tracking devices and accelerometers. Thirty-five working adults wore a cellular network-based tracking device and an accelerometer for 6 consecutive days and logged their travel away from home. Performance of the tracking device was determined using the travel log for reference. Tracking device and accelerometer data were merged to compare physical activity at home and away from home. The tracking device detected 98.6% of all away-from-home excursions, accurately measured time away from home and demonstrated few prolonged signal drop-out periods. Most physical activity took place away from home on weekdays, but not on weekends. Subjects were more physically active per unit of time while away from home, particularly on weekends. Cellular network-based tracking devices represent an alternative to global positioning systems for tracking location, and provide information easily integrated with accelerometers to determine where physical activity takes place. Promoting greater time spent away from home may increase physical activity.

  12. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  13. Privacy Management on Facebook: Do Device Type and Location of Posting Matter?

    Directory of Open Access Journals (Sweden)

    Jennifer Jiyoung Suh

    2015-10-01

    Full Text Available People’s information sharing on Facebook often happens through mobile devices allowing for posting from different locations. Despite the potential contextual differences in content sharing, the literature on online privacy management rarely takes into consideration the type of device and the type of location from which people post content. Do these aspects of Facebook use affect how people share information online? Analyzing Facebook posts young adults shared from different devices and different locations, this article examines the effectiveness of users’ privacy management. By comparing the intended audience with the actual audience of each post, we find considerable mismatch between the two despite most participants expressing confidence in their ability to manage their information on the site. Posts that are accidentally shared with “public”—potentially anyone on the web—are more likely to be shared from non-mobile devices. Interview data reveal that this happens despite the fact that most participants consider non-mobile devices more reliable and convenient to use than mobile devices.

  14. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  15. A value network development model and implications for innovation and production network management

    NARCIS (Netherlands)

    Vermeulen, B.; Kok, de A.G.

    2013-01-01

    In managing their value network, firms have to balance current and future value concerns and own and network partners’ concerns. Firms generate immediate value through manufacturing and selling the current generation of products together with other firms in its production network and generate future

  16. Mass-storage management for distributed image/video archives

    Science.gov (United States)

    Franchi, Santina; Guarda, Roberto; Prampolini, Franco

    1993-04-01

    The realization of image/video database requires a specific design for both database structures and mass storage management. This issue has addressed the project of the digital image/video database system that has been designed at IBM SEMEA Scientific & Technical Solution Center. Proper database structures have been defined to catalog image/video coding technique with the related parameters, and the description of image/video contents. User workstations and servers are distributed along a local area network. Image/video files are not managed directly by the DBMS server. Because of their wide size, they are stored outside the database on network devices. The database contains the pointers to the image/video files and the description of the storage devices. The system can use different kinds of storage media, organized in a hierarchical structure. Three levels of functions are available to manage the storage resources. The functions of the lower level provide media management. They allow it to catalog devices and to modify device status and device network location. The medium level manages image/video files on a physical basis. It manages file migration between high capacity media and low access time media. The functions of the upper level work on image/video file on a logical basis, as they archive, move and copy image/video data selected by user defined queries. These functions are used to support the implementation of a storage management strategy. The database information about characteristics of both storage devices and coding techniques are used by the third level functions to fit delivery/visualization requirements and to reduce archiving costs.

  17. Influence of TCSC Devices on Congestion Management in a Deregulated Power System Using Evolutionary Programming Technique

    Science.gov (United States)

    Ananthichristy, A., Dr.; Elanthirayan, R.; Brindha, R., Dr.; Siddhiq, M. S.; Venkatesh, N.; Harshit, M. V.; Nikhilreddy, M.

    2018-04-01

    Congestion management is one of the technical challenges in power system deregulation. In deregulated electricity market it may always not be possible to dispatch all of the contracted power transactions due to congestion of the transmission corridors. Transmission congestion occurs when there is insufficient transmission capacity to simultaneously accommodate all constraints for transmission of a line. Flexible Alternative Current Transmission System (FACTS) devices can be an alternative to reduce the flows in the heavily loaded lines, resulting in an increased loadability, low system loss, improved stability of the network, reduced cost of production and fulfilled contractual requirement by controlling the power flow in the network. A method to determine the optimal location of FACTS has been suggested based on reduction of total system VAR power losses. The simulation was done on IEEE 14 bus system and results were obtained.

  18. SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach

    Science.gov (United States)

    Colace, Francesco; de Santo, Massimo; Ferrandino, Salvatore

    The last decade has witnessed an intense spread of computer networks that has been further accelerated with the introduction of wireless networks. Simultaneously with, this growth has increased significantly the problems of network management. Especially in small companies, where there is no provision of personnel assigned to these tasks, the management of such networks is often complex and malfunctions can have significant impacts on their businesses. A possible solution is the adoption of Simple Network Management Protocol. Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network administrators to manage network performance, find and solve network problems, and plan for network growth. SNMP has a big disadvantage: its simple design means that the information it deals with is neither detailed nor well organized enough to deal with the expanding modern networking requirements. Over the past years much efforts has been given to improve the lack of Simple Network Management Protocol and new frameworks has been developed: A promising approach involves the use of Ontology. This is the starting point of this paper where a novel approach to the network management based on the use of the Slow Intelligence System methodologies and Ontology based techniques is proposed. Slow Intelligence Systems is a general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptation, elimination and concentration. Therefore, the proposed approach aims to develop a system able to acquire, according to an SNMP standard, information from the various hosts that are in the managed networks and apply solutions in order to solve problems. To check the feasibility of this model first experimental results in a real scenario are showed.

  19. Social networks in cardiovascular disease management.

    Science.gov (United States)

    Shaya, Fadia T; Yan, Xia; Farshid, Maryam; Barakat, Samer; Jung, Miah; Low, Sara; Fedder, Donald

    2010-12-01

    Cardiovascular disease remains the leading cause of death in the USA. Social networks have a positive association with obesity, smoking cessation and weight loss. This article summarizes studies evaluating the impact of social networks on the management of cardiovascular disease. The 35 studies included in the article describe the impact of social networks on a decreased incidence of cardiovascular disease, depression and mortality. In addition, having a large-sized social network is also associated with better outcomes and improved health. The role of pharmacists is beginning to play an important role in the patient-centered medical home, which needs to be incorporated into social networks. The patient-centered medical home can serve as an adaptive source for social network evolvement.

  20. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  1. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  2. Device-Centric Monitoring for Mobile Device Management

    Directory of Open Access Journals (Sweden)

    Luke Chircop

    2016-03-01

    Full Text Available The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.

  3. Network Management System for (FUTON-like) Radio-over-Fiber Infrastructure

    DEFF Research Database (Denmark)

    Santiago, Carlos; Gangopadhyay, Bodhisattwa; Ramkumar, Venkata

    2010-01-01

    by the FUTON Middleware. Although a significant amount of prior research work can be found in the literature related to RoF, there is still significant lack of technologies concerning RoF networks management. RoF Manager and its sub-systems target to fill such gap, proposing a novel concept in the form...... operational costs. The RoF Network Manager manages the network equipment on the optical front haul between the Central Unit (CU) and all Remote Antenna Units (RAU)s connected by it, as well as the communication links, while enabling end-to-end service problem resolution and service quality management...

  4. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of

  5. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.; Sorour, Sameh; Tembine, Hamidou; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  6. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed

    2016-06-29

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  7. An Implementation of a Network Configuration Management System ...

    African Journals Online (AJOL)

    The job of the network administrator becomes difficult as the number of hosts in a computer network increase. Network management requires the network administrator to have vital configuration information about hosts so as to provide viable solutions. In situations where the hosts span a large area or in several buildings as ...

  8. A Software Suite for Testing SpaceWire Devices and Networks

    Science.gov (United States)

    Mills, Stuart; Parkes, Steve

    2015-09-01

    SpaceWire is a data-handling network for use on-board spacecraft, which connects together instruments, mass-memory, processors, downlink telemetry, and other on-board sub-systems. SpaceWire is simple to implement and has some specific characteristics that help it support data-handling applications in space: high-speed, low-power, simplicity, relatively low implementation cost, and architectural flexibility making it ideal for many space missions. SpaceWire provides high-speed (2 Mbits/s to 200 Mbits/s), bi-directional, full-duplex data-links, which connect together SpaceWire enabled equipment. Data-handling networks can be built to suit particular applications using point-to-point data-links and routing switches. STAR-Dundee’s STAR-System software stack has been designed to meet the needs of engineers designing and developing SpaceWire networks and devices. This paper describes the aims of the software and how those needs were met.

  9. Value Systems Alignment Analysis in Collaborative Networked Organizations Management

    Directory of Open Access Journals (Sweden)

    Patricia Macedo

    2017-11-01

    Full Text Available The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assist managers in virtual and networked organizations management. The implementation of the assessment and analysis methods is supported by a set of software services integrated in the information system that supports the management of the networked organizations. A case study in the solar energy sector was conducted, and the data collected through this study allow us to confirm the practical applicability of the proposed methods and the software services.

  10. Spontaneous ad hoc mobile cloud computing network.

    Science.gov (United States)

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes.

  11. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  12. Left ventricular assist device management in patients chronically supported for advanced heart failure.

    Science.gov (United States)

    Cowger, Jennifer; Romano, Matthew A; Stulak, John; Pagani, Francis D; Aaronson, Keith D

    2011-03-01

    This review summarizes management strategies to reduce morbidity and mortality in heart failure patients supported chronically with implantable left ventricular assist devices (LVADs). As the population of patients supported with long-term LVADs has grown, patient selection, operative technique, and patient management strategies have been refined, leading to improved outcomes. This review summarizes recent findings on LVAD candidate selection, and discusses outpatient strategies to optimize device performance and heart failure management. It also reviews important device complications that warrant close outpatient monitoring. Managing patients on chronic LVAD support requires regular patient follow-up, multidisciplinary care teams, and frequent laboratory and echocardiographic surveillance to ensure optimal outcomes.

  13. Automatic disease diagnosis using optimised weightless neural networks for low-power wearable devices.

    Science.gov (United States)

    Cheruku, Ramalingaswamy; Edla, Damodar Reddy; Kuppili, Venkatanareshbabu; Dharavath, Ramesh; Beechu, Nareshkumar Reddy

    2017-08-01

    Low-power wearable devices for disease diagnosis are used at anytime and anywhere. These are non-invasive and pain-free for the better quality of life. However, these devices are resource constrained in terms of memory and processing capability. Memory constraint allows these devices to store a limited number of patterns and processing constraint provides delayed response. It is a challenging task to design a robust classification system under above constraints with high accuracy. In this Letter, to resolve this problem, a novel architecture for weightless neural networks (WNNs) has been proposed. It uses variable sized random access memories to optimise the memory usage and a modified binary TRIE data structure for reducing the test time. In addition, a bio-inspired-based genetic algorithm has been employed to improve the accuracy. The proposed architecture is experimented on various disease datasets using its software and hardware realisations. The experimental results prove that the proposed architecture achieves better performance in terms of accuracy, memory saving and test time as compared to standard WNNs. It also outperforms in terms of accuracy as compared to conventional neural network-based classifiers. The proposed architecture is a powerful part of most of the low-power wearable devices for the solution of memory, accuracy and time issues.

  14. Online professional networks for physicians: risk management.

    Science.gov (United States)

    Hyman, Jon L; Luks, Howard J; Sechrest, Randale

    2012-05-01

    The rapidly developing array of online physician-only communities represents a potential extraordinary advance in the availability of educational and informational resources to physicians. These online communities provide physicians with a new range of controls over the information they process, but use of this social media technology carries some risk. The purpose of this review was to help physicians manage the risks of online professional networking and discuss the potential benefits that may come with such networks. This article explores the risks and benefits of physicians engaging in online professional networking with peers and provides suggestions on risk management. Through an Internet search and literature review, we scrutinized available case law, federal regulatory code, and guidelines of conduct from professional organizations and consultants. We reviewed the OrthoMind.com site as a case example because it is currently the only online social network exclusively for orthopaedic surgeons. Existing case law suggests potential liability for orthopaedic surgeons who engage with patients on openly accessible social network platforms. Current society guidelines in both the United States and Britain provide sensible rules that may mitigate such risks. However, the overall lack of a strong body of legal opinions, government regulations as well as practical experience for most surgeons limit the suitability of such platforms. Closed platforms that are restricted to validated orthopaedic surgeons may limit these downside risks and hence allow surgeons to collaborate with one another both as clinicians and practice owners. Educating surgeons about the pros and cons of participating in these networking platforms is helping them more astutely manage risks and optimize benefits. This evolving online environment of professional interaction is one of few precedents, but the application of risk management strategies that physicians use in daily practice carries over

  15. Radio resource management for mobile traffic offloading in heterogeneous cellular networks

    CERN Document Server

    Wu, Yuan; Huang, Jianwei; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooper...

  16. Management and optimization of the CPCU network working

    Energy Technology Data Exchange (ETDEWEB)

    Silvain, D. (Compagnie Parisienne de Chauffage Urbain, 75 - Paris (FR))

    1991-10-01

    The CPCU steam distribution network is supplemented by a return network for the condensation water. The data system installed in 1988 provides, for the real time, management of the function of the two networks and a reduction in production costs. For the steam, data required in the network, the boiler houses and from external sources are processed by local network of five microprocessors and permit: - with time delay: technical and economic production optimizing calculations, or forecasts, for the following day, of the total required output and the procedure necessary for supplying this at the lowest cost; - in real time: on the basis of the forecasts for the previous day, creating the production instructions for the boiler houses and the instructions for the network remote control elements; - in case of an unexpected occurrence: immediate creation of new operating forecasts for the boiler houses for the establishing management data in real time. For the water, the system forecasts the volume to be returned to the boiler depending on the quantity of steam to be produced. Subsequently, an analysis is carried out in real time of pressures and outputs measured in the network for deriving valve movements and the pump stop/start procedure for guaranteeing the return of the water. The architecture, basic principles and software developed for this application can be used in other steam or water networks and, in a general manner, are adaptable for the management of any complex multi-supplier or multicustomer systems.

  17. Cognitive resource management for heterogeneous cellular networks

    CERN Document Server

    Liu, Yongkang

    2014-01-01

    This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in

  18. ECO INVESTMENT PROJECT MANAGEMENT THROUGH TIME APPLYING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Tamara Gvozdenović

    2007-06-01

    Full Text Available he concept of project management expresses an indispensable approach to investment projects. Time is often the most important factor in these projects. The artificial neural network is the paradigm of data processing, which is inspired by the one used by the biological brain, and it is used in numerous, different fields, among which is the project management. This research is oriented to application of artificial neural networks in managing time of investment project. The artificial neural networks are used to define the optimistic, the most probable and the pessimistic time in PERT method. The program package Matlab: Neural Network Toolbox is used in data simulation. The feed-forward back propagation network is chosen.

  19. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  20. A large interconnecting network within hybrid MEH-PPV/TiO2 nanorod photovoltaic devices

    International Nuclear Information System (INIS)

    Zeng, T-W; Lin, Y-Y; Lo, H-H; Chen, C-W; Chen, C-H; Liou, S-C; Huang, H-Y; Su, W-F

    2006-01-01

    This is a study of hybrid photovoltaic devices based on TiO 2 nanorods and poly[2-methoxy-5-(2'-ethyl-hexyloxy)-1,4-phenylene vinylene] (MEH-PPV). We use TiO 2 nanorods as the electron acceptors and conduction pathways. Here we describe how to develop a large interconnecting network within the photovoltaic device fabricated by inserting a layer of TiO 2 nanorods between the MEH-PPV:TiO 2 nanorod hybrid active layer and the aluminium electrode. The formation of a large interconnecting network provides better connectivity to the electrode, leading to a 2.5-fold improvement in external quantum efficiency as compared to the reference device without the TiO 2 nanorod layer. A power conversion efficiency of 2.2% under illumination at 565 nm and a maximum external quantum efficiency of 24% at 430 nm are achieved. A power conversion efficiency of 0.49% is obtained under Air Mass 1.5 illumination

  1. Self-management of Hybrid Networks: Introduction, Pros and Cons

    NARCIS (Netherlands)

    Fioreze, Tiago; Pras, Aiko; Lehnert, Ralf

    In the last decade ‘self-management’ has become a popular research theme within the networking community. While reading papers, one could get the impression that self-management is the obvious solution to solve many of the current network management problems. There are hardly any publications,

  2. Evaluation of constrained mobility for programmability in network management

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.

    2000-01-01

    In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While

  3. Application of the ETOM framework for defining processes in the telecommunication systems management network of the Serbian Army

    Directory of Open Access Journals (Sweden)

    Vladimir B. Suša

    2013-10-01

    resources management. Planning and development of a TMN includes development and services management processes, as well as development and resources management processes (applications and network elements. Managed telecommunication networks in the Serbian Army The managed telecommunication  system which is currently in use in the Serbian Army can be divided, considering the purpose of each element, into the following: commutation subsystem, WAN and access subsystem, radio subsystem, infrastructural subsystem (power supply, etc. and TMN subsystem. These elements represent independent managed subsystems which are controlled and overviewed by various applications. Within the Serbian Army structural organization, there has been a need for centralized management which would optimize heterogeneous TMN and administrator management functions. To achieve this, necessary TMN functions and services have to be defined. This process starts with the TMN functions and services defined for each of the subsystems. TMN end-to-end processes defining Considering TMN functions and services (ITU-T M.3050, several factors with a considerable influence on TMN functioning can be mentioned. These are the variety of installed telecommunication devices, the diversity of TMN applications, the amount of customer demands for configuration modification (new customers, new connections, new services, etc. and the quantity of system errors which demand the administrator reaction (different weight alarms  coming from the system. Each subsystem produced by a different manufacturer requires the interconnection access points between the TMN and the network equipment as well as a special group of administrators that manage that entity. Therefore, the division of the TMN functions has to depend on the characteristics of equipment to be managed. The nature of military telecommunication networks is to have a vast amount of demands for system configuration changing. The mobile component of the network is quite a

  4. Spin wave absorber generated by artificial surface anisotropy for spin wave device network

    Directory of Open Access Journals (Sweden)

    Naoki Kanazawa

    2016-09-01

    Full Text Available Spin waves (SWs have the potential to reduce the electric energy loss in signal processing networks. The SWs called magnetostatic forward volume waves (MSFVWs are advantageous for networking due to their isotropic dispersion in the plane of a device. To control the MSFVW flow in a processing network based on yttrium iron garnet, we developed a SW absorber using artificial structures. The mechanical surface polishing method presented in this work can well control extrinsic damping without changing the SW dispersion of the host material. Furthermore, enhancement of the ferromagnetic resonance linewidth over 3 Oe was demonstrated.

  5. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  6. Multipath diffuse routing over heterogeneous mesh networks of web devices and sensors

    NARCIS (Netherlands)

    Vitale, G.; Stassen, M.L.A.; Colak, S.B.; Pronk, V.; Macq, B.; Quisquater, J.-.J.

    2002-01-01

    In this paper we present a new data flow algorithm based on physical diffusion for dense device networks needed for future ubiquitous communications. This diffuse data routing concept is based on multi-path signal propagation aided with adaptive beam-forming methods. Adaptation for beam-forming at

  7. LANDMON a new integrated system for the management of landslide monitoring networks

    Science.gov (United States)

    Wrzesniak, Aleksandra; Giordan, Daniele; Allasia, Paolo

    2017-04-01

    Over the last decades, technological development has strongly increased the number of instruments that can be used to monitor landslide phenomena. Robotized Total Stations, GB-InSAR and GPS are only few examples of the devices that can be adapted to monitor the topographic changes due to mass movements. They are often organized in a complex network, aimed at controlling physical parameters related to the evolution of landslide activity. The level of complexity of these monitoring networks increases with the number of new available monitoring devices and this could generate a paradox: the source of data is so numerous and difficult to interpret that a full understanding of the phenomenon could be hampered. The Geohazard Monitoring Group (GMG) of Italian National Research Council (CNR) has a long experience in landslide monitoring. Over the years, GMG has developed a multidisciplinary approach for landslide management strategy called LANDMON (LANDslide MOnitoring Network). It is an automatic hybrid system focused not only on capturing and elaborating data from monitored site but also on web applications and on publishing bulletins aimed to disseminate monitoring results and to support decision makers. LANDMON is currently active in many landslide sites distributed in several areas in Italy and in Europe. LANDMON is derived from the previously developed systems like ADVICE (ADVanced dIsplaCement monitoring system for Early warning) and 3DA (three-dimensional Displacement Analysis). These systems are aimed to collect and to process monitoring dataset, to manage early warning application based on pre-defined thresholds, and to publish three-dimensional displacement maps in near real time. In addition, LANDMON integrates several new features, such as WebGIS application, modelling using inverse velocity method, and management of webcam monitoring system, meteorological parameters and borehole inclinometric data. Moreover, LANDMON is a communication strategy that focuses

  8. Towards Business Process Management in networked ecosystems

    NARCIS (Netherlands)

    Johan Versendaal; dr. Martijn Zoet; Jeroen Grondelle

    2014-01-01

    Managing and supporting the collaboration between different actors is key in any organizational context, whether of a hierarchical or a networked nature. In the networked context of ecosystems of service providers and other stakeholders, BPM is faced with different challenges than in a conventional

  9. The Analysis of the Relationship between Communication Skills and the Establishment of Clark's Management Network among Sport Managers

    Directory of Open Access Journals (Sweden)

    Rasool NAZARI

    2016-03-01

    Full Text Available The purpose of this study was to analyze the relationship between communication skills and the establishment of Clark's Management Network among sport managers. This applied research is a kind of correlational – survey study. Statistical population consist ed of 140 sport managers working for sport organizations in Isfahan Province, which have been selected by stratified random sampling. Measurement tools included two questionnaires of Communication Skill (91% and Establishment of Clark's Management Network (87%. Descriptive and inferential statistical methods applied for statistical analysis using SPSS software. Results show that there is a relationship between communication skills and the establishment of Clark's Management Network among sport managers. I n addition, the feedback component has greater contribution to prediction of Clark's management network (p 0.05. In general, it can acknowledge that the communication skills are effective in the establishment of Clark's management network and cause to i mprove the management process of sport organizations' managers and to achieve to the organizational goals with high level of productivity.

  10. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  11. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  12. Fiber-wireless convergence in next-generation communication networks systems, architectures, and management

    CERN Document Server

    Chang, Gee-Kung; Ellinas, Georgios

    2017-01-01

    This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint. • Addresses the Fi-Wi convergence issues at three different levels, namely at the system level, network architecture level, and network management level • Provides approaches in communication systems, network architecture, and management that are expected to steer the evolution towards fiber-wireless convergence • Contributions from leading experts in the field of...

  13. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  14. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  15. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  16. ORGANIZATION OF CLOUD COMPUTING INFRASTRUCTURE BASED ON SDN NETWORK

    Directory of Open Access Journals (Sweden)

    Alexey A. Efimenko

    2013-01-01

    Full Text Available The article presents the main approaches to cloud computing infrastructure based on the SDN network in present data processing centers (DPC. The main indexes of management effectiveness of network infrastructure of DPC are determined. The examples of solutions for the creation of virtual network devices are provided.

  17. Adaptive Learning Rule for Hardware-based Deep Neural Networks Using Electronic Synapse Devices

    OpenAIRE

    Lim, Suhwan; Bae, Jong-Ho; Eum, Jai-Ho; Lee, Sungtae; Kim, Chul-Heung; Kwon, Dongseok; Park, Byung-Gook; Lee, Jong-Ho

    2017-01-01

    In this paper, we propose a learning rule based on a back-propagation (BP) algorithm that can be applied to a hardware-based deep neural network (HW-DNN) using electronic devices that exhibit discrete and limited conductance characteristics. This adaptive learning rule, which enables forward, backward propagation, as well as weight updates in hardware, is helpful during the implementation of power-efficient and high-speed deep neural networks. In simulations using a three-layer perceptron net...

  18. Device-Centric Monitoring for Mobile Device Management

    OpenAIRE

    Chircop, Luke; Colombo, Christian; Pace, Gordon J.

    2016-01-01

    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centri...

  19. NETWORKS OF HEALTH CARE: A CHALLENGE TO SUS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Camila Dubow

    2013-09-01

    Full Text Available The article proposes a critical reflection, based on national law, scholarly, scientific, on the current development of Networks of Health Care, as a strategy for strengthening the Single Health System (SUS. Are weighted inefficiency of traditional ways of organizing care and management, the challenge of Network Health Care for comprehensive care and management mechanisms used in this process. The work provides subsidies for the care practices and health management are reflected, pointing strategies that result in disruptions of paradigms through a refocusing of attention in existing models. For networks of health care can be consolidated, is fundamental to political sensitivity of health managers with a commitment to build a new model of care, through the struggle to consolidate the SUS and the realization of the principles of universality, comprehensiveness and equity.

  20. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  1. Network resiliency through memory health monitoring and proactive management

    Science.gov (United States)

    Andrade Costa, Carlos H.; Cher, Chen-Yong; Park, Yoonho; Rosenburg, Bryan S.; Ryu, Kyung D.

    2017-11-21

    A method for managing a network queue memory includes receiving sensor information about the network queue memory, predicting a memory failure in the network queue memory based on the sensor information, and outputting a notification through a plurality of nodes forming a network and using the network queue memory, the notification configuring communications between the nodes.

  2. Mobile Device Applications for the Visualization of Functional Connectivity Networks and EEG electrodes: iBraiN and iBraiNEEG.

    Directory of Open Access Journals (Sweden)

    Gonzalo Mauricio Rojas

    2016-10-01

    Full Text Available Multiple fMRI-based functional connectivity networks were obtained by Yeo et al., and the visualization of these complex networks is a difficult task. Also, the combination of functional connectivity networks determined by fMRI with EEG data could be a very useful tool. Mobile devices are becoming increasingly common among users, and for this reason, we describe here two applications for Android and iOS mobile devices: one that shows in an interactive way the seven Yeo functional connectivity networks, and another application that shows the relative position of 10-20 EEG electrodes with Yeo’s seven functional connectivity networks.

  3. Mobile Device Applications for the Visualization of Functional Connectivity Networks and EEG Electrodes: iBraiN and iBraiNEEG.

    Science.gov (United States)

    Rojas, Gonzalo M; Fuentes, Jorge A; Gálvez, Marcelo

    2016-01-01

    Multiple functional MRI (fMRI)-based functional connectivity networks were obtained by Yeo et al. (2011), and the visualization of these complex networks is a difficult task. Also, the combination of functional connectivity networks determined by fMRI with electroencephalography (EEG) data could be a very useful tool. Mobile devices are becoming increasingly common among users, and for this reason, we describe here two applications for Android and iOS mobile devices: one that shows in an interactive way the seven Yeo functional connectivity networks, and another application that shows the relative position of 10-20 EEG electrodes with Yeo's seven functional connectivity networks.

  4. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  5. Optimal sizing and location of SVC devices for improvement of voltage profile in distribution network with dispersed photovoltaic and wind power plants

    International Nuclear Information System (INIS)

    Savić, Aleksandar; Đurišić, Željko

    2014-01-01

    Highlights: • Significant voltage variations in a distribution network with dispersed generation. • The use of SVC devices to improve the voltage profiles are an effective solution. • Number, size and location of SVC devices are optimized using genetic algorithm. • The methodology is presented on an example of a real distribution system in Serbia. - Abstract: Intermittent power generation of wind turbines and photovoltaic plants creates voltage disturbances in power distribution networks which may not be acceptable to the consumers. To control the deviations of the nodal voltages, it is necessary to use fast dynamic control of the reactive power in the distribution network. Implementation of the power electronic devices, such as Static Var Compensator (SVC), enables effective dynamic state as well as a static state of the nodal voltage control in the distribution network. This paper analyzed optimal sizing and location of SVC devices by using genetic algorithm, to improve nodal voltages profile in a distribution network with dispersed photovoltaic and wind power plants. Practical application of the developed methodology was tested on an example of a real distribution network

  6. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  7. Integrating wireless sensor networks with CE devices for health care activity tracking in the home environment

    NARCIS (Netherlands)

    Bosman, R.P.; Lukkien, J.J.; Verhoeven, R.

    2009-01-01

    Wireless sensing devices containing limited processing and communication capabilities are becoming available for all sorts of purposes. An important problem is to integrate networks of these sensors with the existing CE en IT infrastructure such that a) data coming out of the sensor network can be

  8. Dynamic spectrum management in green cognitive radio cellular networks

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2018-01-01

    In this paper, we propose a new cellular network operation scheme fulfilling the 5G requirements related to spectrum management and green communications. We focus on cognitive radio cellular networks in which both the primary network (PN

  9. Research on University Network Teaching Platform (Blackboard in Teaching Management

    Directory of Open Access Journals (Sweden)

    Gou Zhao Xia

    2016-01-01

    Full Text Available With rapid development of online education; teaching platform based on the network, as a new instructional mode has become a hot topic in online teaching. In this paper, the he teaching situation and existing problems on online was analyzed by comparing the difference between network teaching platform and traditional classroom teaching. Then the strategies of network teaching management and the case, which is focusing on the characteristics of Blackboard with the application of network teaching management was presents.

  10. Business communication in social networks: Content management and experiences

    Directory of Open Access Journals (Sweden)

    Miguel Ángel Nicolás

    2014-11-01

    Full Text Available Currently, management of communication in social networks has become an indispensable strategic activity and contributes directly to change the mode of relationship between business and its stakeholders. The first section of this paper presents a brief analysis of the results reported in different specialized national studies in social networks. We analyse the general activities that users prefer to do and activities that users value most brands on networks. If an organization wants to successfully manage their communication in social networks is very important to know the behaviour of the users and design strategies based on their status and economic activity. This paper presents a brief analysis of social branding through the classification of different corporate content posted on their networks.

  11. Wireless Sensing Node Network Management for Monitoring Landslide Disaster

    International Nuclear Information System (INIS)

    Takayama, S; Akiyama, J; Fujiki, T; Mokhtar, N A B

    2013-01-01

    This paper shows the network management and operation to monitor landslide disaster at slop of mountain and hill. Natural disasters damage a measuring system easily. It is necessary for the measuring system to be flexible and robust. The measuring network proposed in this paper is the telemetry system consisted of host system (HS) and local sensing nodes network system (LSNNS). LSNNS operates autonomously and sometimes is controlled by commands from HS. HS collects data/information of landslide disaster from LSNNS, and controls LSNNS remotely. HS and LSNNS are communicated by using 'cloud' system. The dual communication is very effective and convenient to manage a network system operation

  12. Network based control point for UPnP QoS architecture

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Wessing, Henrik; Rossello Busquet, Ana

    2011-01-01

    Enabling coexistence of non-UPnP Devices in an UPnP QoS Architecture is an important issue that might have a major impact on the deployment and usability of UPnP in future home networks. The work presented here shows potential issues of placing non-UPnP Device in the network managed by UPnP QoS. We...... address this issue by extensions to the UPnP QoS Architecture that can prevent non-UPnP Devices from degrading the overall QoS level. The obtained results show that deploying Network Based Control Point service with efficient traffic classifier, improves significantly the end-to-end packet delay...

  13. A Preliminary Survey on the Security of Software-Defined Networks

    OpenAIRE

    Akbaş, Muhammet Fatih; Karaarslan, Enis; Güngör, Cengiz

    2016-01-01

    The number of devices connected to theInternet is increasing, data centers are growing continuously and computernetworks are getting more complex. Traditional network management approach isbecoming more difficult and insufficient. Software-Defined Networks (SDN) is anew generation networking approach which is expected to take place of thetraditional computer networks. SDN architecture provides effective managementof the large and complex networks. Although SDN have benefits from the network s...

  14. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  15. Velocity-Aware Handover Management in Two-Tier Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    by network densification. Hence, user mobility imposes a nontrivial challenge to harvest capacity gains via network densification. In this paper, we propose a velocity-aware HO management scheme for two-tier downlink cellular network to mitigate the HO effect

  16. Dynamic Subsidy Method for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei

    2016-01-01

    Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion...... management in distribution networks, including the market mechanism, the mathematical formulation through a two-level optimization, and the method solving the optimization by tightening the constraints and linearization. Case studies were conducted with a one node system and the Bus 4 distribution network...... of the Roy Billinton Test System (RBTS) with high penetration of electric vehicles (EVs) and heat pumps (HPs). The case studies demonstrate the efficacy of the DS method for congestion management in distribution networks. Studies in this paper show that the DS method offers the customers a fair opportunity...

  17. Modeling for the management of peak loads on a radiology image management network

    International Nuclear Information System (INIS)

    Dwyer, S.J.; Cox, G.G.; Templeton, A.W.; Cook, L.T.; Anderson, W.H.; Hensley, K.S.

    1987-01-01

    The design of a radiology image management network for a radiology department can now be assisted by a queueing model. The queueing model requires that the designers specify the following parameters: the number of tasks to be accomplished (acquisition of image data, transmission of data, archiving of data, displaying and manipulation of data, and generation of hard copies); the average times to complete each task; the patient scheduled arrival times; and the number/type of computer nodes interfaced to the network (acquisition nodes, interactive diagnostic display stations, archiving nodes, hard copy nodes, and gateways to hospital systems). The outcomes from the queuering model include mean throughput data rates and identified bottlenecks, and peak throughput data rates and identified bottlenecks. This exhibit presents the queueing model and illustrates its use in managing peak loads on an image management network

  18. An Overview of Optical Network Bandwidth and Fault Management

    Directory of Open Access Journals (Sweden)

    J.A. Zubairi

    2010-09-01

    Full Text Available This paper discusses the optical network management issues and identifies potential areas for focused research. A general outline of the main components in optical network management is given and specific problems in GMPLS based model are explained. Later, protection and restoration issues are discussed in the broader context of fault management and the tools developed for fault detection are listed. Optical networks need efficient and reliable protection schemes that restore the communications quickly on the occurrence of faults without causing failure of real-time applications using the network. A holistic approach is required that provides mechanisms for fault detection, rapid restoration and reversion in case of fault resolution. Since the role of SDH/SONET is diminishing, the modern optical networks are poised towards the IP-centric model where high performance IP-MPLS routers manage a core intelligent network of IP over WDM. Fault management schemes are developed for both the IP layer and the WDM layer. Faults can be detected and repaired locally and also through centralized network controller. A hybrid approach works best in detecting the faults where the domain controller verifies the established LSPs in addition to the link tests at the node level. On detecting a fault, rapid restoration can perform localized routing of traffic away from the affected port and link. The traffic may be directed to pre-assigned backup paths that are established as shared or dedicated resources. We examine the protection issues in detail including the choice of layer for protection, implementing protection or restoration, backup path routing, backup resource efficiency, subpath protection, QoS traffic survival and multilayer protection triggers and alarm propagation. The complete protection cycle is described and mechanisms incorporated into RSVP-TE and other protocols for detecting and recording path errors are outlined. In addition, MPLS testbed

  19. Traffic Steering Framework for Mobile-Assisted Resource Management in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Checko, Aleksandra; Popovska Avramova, Andrijana

    2013-01-01

    With the expected growth of mobile data traffic it is essential to manage the network resources efficiently. In order to undertake this challenge, we propose a framework for network-centric, mobile-assisted resource management, which facilitates traffic offloading from mobile network to Wi-Fi...... to the network backbone. What is more, we give an overview of existing standardization activities on offloading the mobile traffic through Wi-Fi....

  20. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.

    Science.gov (United States)

    Taboun, Mohammed S; Brennan, Robert W

    2017-09-14

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  1. Emergency Communications Network for Disasters Management in Venezuela

    Science.gov (United States)

    Burguillos, C.; Deng, H.

    2018-04-01

    The integration and use of different space technology applications for disasters management, play an important role at the time of prevents the causes and mitigates the effects of the natural disasters. Nevertheless, the space technology counts with the appropriate technological resources to provide the accurate and timely information required to support in the decision making in case of disasters. Considering the aforementioned aspects, in this research is presented the design and implementation of an Emergency Communications Network for Disasters Management in Venezuela. Network based on the design of a topology that integrates the satellites platforms in orbit operation under administration of Venezuelan state, such as: the communications satellite VENESAT-1 and the remote sensing satellites VRSS-1 and VRSS-2; as well as their ground stations with the aim to implement an emergency communications network to be activated in case of disasters which affect the public and private communications infrastructures in Venezuela. In this regard, to design the network several technical and operational specifications were formulated, between them: Emergency Strategies to Maneuver the VRSS-1 and VRSS-2 satellites for optimal images capture and processing, characterization of the VENESAT-1 transponders and radiofrequencies for emergency communications services, technologies solutions formulation and communications links design for disaster management. As result, the emergency network designed allows to put in practice diverse communications technologies solutions and different scheme or media for images exchange between the areas affected for disasters and the entities involved in the disasters management tasks, providing useful data for emergency response and infrastructures recovery.

  2. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  3. The Role of Retinal Imaging and Portable Screening Devices in Tele-ophthalmology Applications for Diabetic Retinopathy Management.

    Science.gov (United States)

    DeBuc, Delia Cabrera

    2016-12-01

    In the years since its introduction, retinal imaging has transformed our capability to visualize the posterior pole of the eye. Increasing practical advances in mobile technology, regular monitoring, and population screening for diabetic retinopathy management offer the opportunity for further development of cost-effective applications through remote assessment of the diabetic eye using portable retinal cameras, smart-phone-based devices and telemedicine networks. Numerous retinal imaging methods and mobile technologies in tele-ophthalmology applications have been reported for diabetic retinopathy screening and management. They provide several advantages of automation, sensitivity, specificity, portability, and miniaturization for the development of point-of-care diagnostics for eye complications in diabetes. The aim of this paper is to review the role of retinal imaging and mobile technologies in tele-ophthalmology applications for diabetic retinopathy screening and management. At large, although improvements in current technology and telemedicine services are still needed, telemedicine has demonstrated to be a worthy tool to support health caregivers in the effective management and prevention of diabetes and its complications.

  4. Energy Storage Management in Grid Connected Solar Photovoltaic System

    OpenAIRE

    Vidhya M.E

    2015-01-01

    The penetration of renewable sources in the power system network in the power system has been increasing in the recent years. One of the solutions being proposed to improve the reliability and performance of these systems is to integrate energy storage device into the power system network. This paper discusses the modeling of photo voltaic and status of the storage device such as lead acid battery for better energy management in the system. The energy management for the grid conne...

  5. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  6. Design Management in the Textile Industry - A Network Perspective

    DEFF Research Database (Denmark)

    Christensen, Poul Rind; Bang, Anne Louise

    In this paper we explore textile design activities and textile design management from an industrial network perspective. The textile industry is probably one of the most globalized manufacturing industries in the world and thus one of the most dispersed industries on the globe. Most studies on de...... management in order to maintain the relationships in their network of customers and suppliers....

  7. METHODOLOGY OF RESEARCH AND DEVELOPMENT MANAGEMENT OF REGIONAL NETWORK ECONOMY

    Directory of Open Access Journals (Sweden)

    O.I. Botkin

    2007-06-01

    Full Text Available Information practically of all the Russian regions economy branches and development by managing subjects is information − communicative the Internet technologies render huge influence on economic attitudes development in the environment of regional business: there are new forms of interaction of managing subjects and change is information − organizational structures of regional business management. Integrated image of the set forth above innovations is the regional network economy representing the interactive environment in which on high speed and with minimal transaction (R.H.Coase’s costs are performed social economic and commodity monetary attitudes between managing subjects of region with use of Internet global network interactive opportunities. The urgency of the regional network economy phenomenon research, first of all, is caused by necessity of a substantiation of regional network economy methodology development and management mechanisms development by its infrastructure with the purpose of regional business efficiency increase. In our opinion, the decision of these problems will be the defining factor of effective economic development maintenance and russian regions economy growth in the near future.

  8. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers

    Science.gov (United States)

    Li, Fei; Zhao, Wei; Guo, Ying

    2018-01-01

    Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.

  9. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  10. Social Networking for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  11. Resource management for energy and spectrum harvesting sensor networks

    CERN Document Server

    Zhang, Deyu; Zhou, Haibo; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a ne...

  12. Design and Realization of a Condition Management System for the Gateway Electrical Energy Metering Device

    Directory of Open Access Journals (Sweden)

    Chao Tang

    2013-12-01

    Full Text Available With the construction of firm and intelligent power grid in China, it is difficult for the traditional management method of electrical energy metering device to meet the prospecting requirements. Using the computer and internet techniques to realize the information and intelligentization of the electrical energy metering management has become a necessary guarantee of improving power supply ability, marketing control, and customer service. This paper introduced a kind of large and intelligent condition management system of the gateway electrical energy metering device. The key technologies and realize process were analyzed. Moreover, a detailed description of the application modules such as the GIS smart display of metering point, the condition management of metering devices and the visual monitoring of metering point was presented. The trial operation in the selected transformer substations and the power stations of Chongqing Power Electrical Corp. indicated that, the condition management system is very open, safety and efficient. According to the data exchange with the production and scheduling platform, the system improved the efficient operation of the electrical energy metering devices. Meanwhile, combined with the real-time visual monitoring, the condition management system improved the prevention ability of electricity filching, realized the unified automatic large-scale management of electrical energy metering devices.

  13. Demo - Talk2Me: A Framework for Device–to–Device Augmented Reality Social Network

    DEFF Research Database (Denmark)

    Shu, Jiayu; Kosta, Sokol; Zheng, Rui

    2018-01-01

    –to–Device fashion. When a user looks at nearby persons through her camera–enabled wearable devices (e.g., Google Glass), the framework automatically extracts the face–signature of the person of interest, compares it with the previously captured signatures, and presents the information shared by this person......In this demo, we present Talk2Me, an augmented reality social network framework that enables users to disseminate information in a distributed way and view others’ information instantly. Talk2Me advertises users’ messages, together with their face–signatures, to every nearby device in a Device...... to the user. We design a lightweight and yet accurate face recognition algorithm, together with an efficient distributed dissemination protocol. We integrate their implementations in an Android prototype....

  14. Analysis of Cisco Open Network Environment (ONE) OpenFlow Controller Implementation

    Science.gov (United States)

    2014-08-01

    Software - Defined Networking ( SDN ), when fully realized, offer many improvements over the current rigid and...functionalities like handshake, connection setup, switch management, and security. 15. SUBJECT TERMS OpenFlow, software - defined networking , Cisco ONE, SDN ...innovating packet-forwarding technologies. Network device roles are strictly defined with little or no flexibility. In Software - Defined Networks ( SDNs ),

  15. The enhancing impact of friendship networks on sales managers' performance

    OpenAIRE

    Claro, Danny Pimentel; Laban Neto, Silvio Abrahão; Claro, Priscila Borin de Oliveira

    2013-01-01

    This paper examines how relationships with friends moderate the impact of professional networks on sales performance. Based on a sample of 204 sales managers in a professional service company, this study presents evidence that friendship networks amplify the effect of sales forces’ professional networks on new product sales as well as on prospecting and converting new deals. Our results offer important insights into the socio-cognitive perspective of sales management literature and suggest th...

  16. National information network and database system of hazardous waste management in China

    Energy Technology Data Exchange (ETDEWEB)

    Ma Hongchang [National Environmental Protection Agency, Beijing (China)

    1996-12-31

    Industries in China generate large volumes of hazardous waste, which makes it essential for the nation to pay more attention to hazardous waste management. National laws and regulations, waste surveys, and manifest tracking and permission systems have been initiated. Some centralized hazardous waste disposal facilities are under construction. China`s National Environmental Protection Agency (NEPA) has also obtained valuable information on hazardous waste management from developed countries. To effectively share this information with local environmental protection bureaus, NEPA developed a national information network and database system for hazardous waste management. This information network will have such functions as information collection, inquiry, and connection. The long-term objective is to establish and develop a national and local hazardous waste management information network. This network will significantly help decision makers and researchers because it will be easy to obtain information (e.g., experiences of developed countries in hazardous waste management) to enhance hazardous waste management in China. The information network consists of five parts: technology consulting, import-export management, regulation inquiry, waste survey, and literature inquiry.

  17. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    required by the next generation transport network to provide Quality-of-Service (QoS) guaranteed video services. Augmenting network capacity and upgrading network nodes indicate long deployment period, replacement of equipment and thus significant cost to the network service providers. This challenge may...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  18. Software Health Management with Bayesian Networks

    Science.gov (United States)

    Mengshoel, Ole; Schumann, JOhann

    2011-01-01

    Most modern aircraft as well as other complex machinery is equipped with diagnostics systems for its major subsystems. During operation, sensors provide important information about the subsystem (e.g., the engine) and that information is used to detect and diagnose faults. Most of these systems focus on the monitoring of a mechanical, hydraulic, or electromechanical subsystem of the vehicle or machinery. Only recently, health management systems that monitor software have been developed. In this paper, we will discuss our approach of using Bayesian networks for Software Health Management (SWHM). We will discuss SWHM requirements, which make advanced reasoning capabilities for the detection and diagnosis important. Then we will present our approach to using Bayesian networks for the construction of health models that dynamically monitor a software system and is capable of detecting and diagnosing faults.

  19. Microgrids in Active Network Management-Part I

    DEFF Research Database (Denmark)

    Palizban, Omid; Kauhaniemia, Kimmo; Guerrero, Josep M.

    2014-01-01

    The microgrid concept has been closely investigated and implemented by numerous experts worldwide. The first part of this paper describes the principles of microgrid design, considering the operational concepts and requirements arising from participation in active network management. Over the las......, energy storage systems, and market participation in both island and grid-connection operation. Finally, control techniques and the principles of energy-storage systems are summarized in a comprehensive flowchart.......The microgrid concept has been closely investigated and implemented by numerous experts worldwide. The first part of this paper describes the principles of microgrid design, considering the operational concepts and requirements arising from participation in active network management. Over the last...

  20. Evaluation of knowledge management performances in NULIFE network

    International Nuclear Information System (INIS)

    Nitoi, Mirela; Cojan, Mihai; Pavelescu, Margarit

    2009-01-01

    One of the objectives of Nuclear Plant Life Prediction (NULIFE) network is the identification of experts and resources which can be used in the future. The major challenge is to use these competent personnel in an efficient manner, in the network. The paper presents the necessity of developing the knowledge management strategy for networks of excellence, as the specific issues of NULIFE network. In order to highlight the progress during the project operating, the developed indicators of performance are specified. The developed questionnaires evaluate the quality of knowledge management (development, use and distribution of knowledge), type of knowledge which is considered important for organization (at present and in future) and the benefits of knowledge transfer (immediate and in perspective). The developed questionnaires permit along with the evaluation of others groups activities, an auto-evaluation for the activity of the group where the subject is involved. (authors)

  1. An Internet of Things Approach for Managing Smart Services Provided by Wearable Devices

    OpenAIRE

    Pedro Castillejo; José-Fernán Martínez; Lourdes López; Gregorio Rubio

    2013-01-01

    The Internet of Things (IoT) is growing at a fast pace with new devices getting connected all the time. A new emerging group of these devices is the wearable devices, and the wireless sensor networks are a good way to integrate them in the IoT concept and bring new experiences to the daily life activities. In this paper, we present an everyday life application involving a WSN as the base of a novel context-awareness sports scenario, where physiological parameters are measured and sent to the ...

  2. Do social networks and technological capabilities help knowledge management?

    Directory of Open Access Journals (Sweden)

    Encarnación García-Sánchez

    2017-12-01

    Full Text Available Dynamic capabilities are currently becoming an important extension of the theory of resources and capabilities that enables companies to adapt better in the current competitive environment. This paper examines how knowledge management, a dynamic function related to management or administration of a set of knowledge flows, develops thanks to the greater dynamism of social networks. It then shows how this relationship is especially strengthened by different technological capabilities. To achieve these goals, the paper examines the main tools that permit companies to develop an ability to achieve competitive advantage relative to the technological capabilities of managers and workers, social networks and knowledge management.

  3. Strategy and management of network security at KEK

    International Nuclear Information System (INIS)

    Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa

    2001-01-01

    Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy

  4. Management information system of medical equipment using mobile devices

    Science.gov (United States)

    Núñez, C.; Castro, D.

    2011-09-01

    The large numbers of technologies currently incorporated into mobile devices transform them into excellent tools for capture and to manage the information, because of the increasing computing power and storage that allow to add many miscellaneous applications. In order to obtain benefits of these technologies, in the biomedical engineering field, it was developed a mobile information system for medical equipment management. The central platform for the system it's a mobile phone, which by a connection with a web server, it's capable to send and receive information relative to any medical equipment. Decoding a type of barcodes, known as QR-Codes, the management process is simplified and improved. These barcodes identified the medical equipments in a database, when these codes are photographed and decoded with the mobile device, you can access to relevant information about the medical equipment in question. This Project in it's actual state is a basic support tool for the maintenance of medical equipment. It is also a modern alternative, competitive and economic in the actual market.

  5. Network monitoring module of BES III system environment

    International Nuclear Information System (INIS)

    Song Liwen; Zhao Jingwei; Zhang Bingyun

    2002-01-01

    In order to meet the needs of the complicated network architecture of BES III (Beijing Spectrometer III) and make sure normal online running in the future, it is necessary to develop a multi-platforms Network Monitoring Tool which can help system administrator monitor and manage BES III network. The author provides a module that can monitor not only the traffic of switch-router's ports but also the performance status of key devices in the network environment, meanwhile it can also give warning to manager and submit the related reports. the great sense, the theory basis, the implementing method and the graph in formation of this tool will be discussed

  6. Information Dynamics as Foundation for Network Management

    Science.gov (United States)

    2014-12-04

    developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design

  7. APIs for QoS configuration in Software Defined Networks

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius; Soler, José

    2015-01-01

    The OpenFlow (OF) protocol is widely used in Software Defined Networking (SDN) to realize the communication between the controller and forwarding devices. OF allows great flexibility in managing traffic flows. However, OF alone is not enough to build more complex SDN services that require complete...... such as configuration of devices, ports, queues, etc. An Application Programming Interface (API) for dynamic configuration of QoS resources in the network devices is implemented herein, by using the capabilities of OVSDB. Further, the paper demonstrates the possibility to create network services with coarse granularity...... on top of the fine granular services exposed by the QoS configuration API at the SDNC. A series of tests emphasize the capabilities and the performance of the implemented QoS configuration API....

  8. Restaurant Management System Over Private Network

    OpenAIRE

    Amanat Dhillon; Shreya Tuli

    2017-01-01

    Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated...

  9. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Science.gov (United States)

    Brennan, Robert W.

    2017-01-01

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452

  10. Facilitate generation connections on Orkney by automatic distribution network management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This report summarises the results of a study assessing the capability and limitations of the Orkney Network under a variety of conditions of demand, generation connections, network configuration, and reactive compensation). A conceptual active management scheme (AMS) suitable for the conditions on Orkney is developed and evaluated. Details are given of a proposed framework for the design and evaluation of future active management schemes, logic control sequences for managed generation units, and a proposed evaluation method for the active management scheme. Implications of introducing the proposed AMS are examined, and the commercial aspects of an AMS and system security are considered. The existing Orkney network is described; and an overview of the SHEPDL (Scottish Hydro Electric Power Distribution Ltd.) SCADA system is presented with a discussion of AMS identification, selection, and development.

  11. Professional development and human resources management in networks

    Directory of Open Access Journals (Sweden)

    Evgeniy Rudnev

    2016-05-01

    Full Text Available Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future.

  12. Physical removal of metallic carbon nanotubes from nanotube network devices using a thermal and fluidic process

    International Nuclear Information System (INIS)

    Ford, Alexandra C; Shaughnessy, Michael; Wong, Bryan M; Kane, Alexander A; Krafcik, Karen L; Léonard, François; Kuznetsov, Oleksandr V; Billups, W Edward; Hauge, Robert H

    2013-01-01

    Electronic and optoelectronic devices based on thin films of carbon nanotubes are currently limited by the presence of metallic nanotubes. Here we present a novel approach based on nanotube alkyl functionalization to physically remove the metallic nanotubes from such network devices. The process relies on preferential thermal desorption of the alkyls from the semiconducting nanotubes and the subsequent dissolution and selective removal of the metallic nanotubes in chloroform. The approach is versatile and is applied to devices post-fabrication. (paper)

  13. Display-management system for MFTF

    International Nuclear Information System (INIS)

    Nelson, D.O.

    1981-01-01

    The Mirror Fusion Test Facility (MFTF) is controlled by 65 local control microcomputers which are supervised by a local network of nine 32-bit minicomputers. Associated with seven of the nine computers are state-of-the-art graphics devices, each with extensive local processing capability. These devices provide the means for an operator to interact with the control software running on the minicomputers. It is critical that the information the operator views accurately reflects the current state of the experiment. This information is integrated into dynamically changing pictures called displays. The primary organizational component of the display system is the software-addressable segment. The segments created by the display creation software are managed by display managers associated with each graphics device. Each display manager uses sophisticated storage management mechanisms to keep the proper segments resident in the local graphics device storage

  14. Knowledge network for medical technology management in Mexico.

    Science.gov (United States)

    Licona, Fabiola Martínez; Leehan, Joaquín Azpiroz; Méndez, Miguel Cadena; Yuriar, Salvador Duarte; Salazar, Raúl Molina; Gilmore, Amador Terán

    2009-10-01

    The role of biomedical engineers (BMEs) has changed widely over the years, from managing a group of technicians to the planning of large installations and the management of medical technology countrywide. As the technology has advanced, the competence of BMEs has been challenged because it is no longer possible to be an expert in every component of the technology involved in running a hospital. Our approach has been to form a network of professionals that are experts in different fields related to medical technology, where work is coordinated to provide high quality services at the planning and execution stages of projects related to medical technology. A study of the procedures involved in the procurement of medical technology has been carried out over the years. These experiences have been compared with several case studies where the approach to problem solving in this area has been multidisciplinary. Planning and execution phases of projects involving medical technology management have been identified. After several instances of collaboration among experts from different fields, a network for management of healthcare technology has been formed at our institution that incorporates the experience from different departments that were dealing separately with projects involving medical technology. This network has led us to propose this approach to solve medical technology management projects, where the strengths of each subgroup complement each other. This structure will lead to a more integrated approach to healthcare technology management and will ensure higher quality solutions.

  15. Feature-based comparison and selection of software defined networking (SDN) controllers

    OpenAIRE

    Khondoker, Rahamatullah; Zaalouk, Adel; Marx, Ronald; Bayarou, Kpatcha

    2014-01-01

    Software Defined Networking (SDN) is seen as one way to solve some problems of the Internet including security, managing complexity, multi-casting, load balancing, and energy efficiency. SDN is an architectural paradigm that separates the control plane of a networking device (e.g., a switch / router) from its data plane, making it feasible to control, monitor, and manage a network from a centralized node (the SDN controller). However, today there exists many SDN controllers including POX, Flo...

  16. Telemetry Standards, RCC Standard 106-17, Chapter 28, RF Network Management

    Science.gov (United States)

    2017-07-01

    transmission capacity management • Handoff management • Power management - TBD • Link and RF Traffic Loading Status 28.2.3 Epoch Structure The RF network...physical media (i.e., the wireless RF network). On the transmission side, it is responsible for framing IP packets for physical transmission (adding in...Structure .................................................................................................. 28-3 28.2.4 Transmission Opportunities

  17. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  18. Relationship Management in International Strategic Alliances and networks

    DEFF Research Database (Denmark)

    Andersen, Poul

    2011-01-01

    This chapter discusses relationship management in international strategic alliances and networks, building on and synthesizing parts of the relationship management literature. The chapter provides a model linking three generic relationship management tasks with three levels of management......, identifying nine focus areas for relationship management efforts. Rather than distinguishing between the management of external and internal resources, the integration of external and internal resources is the focus, meaning that all managerial tasks have both internal and external consequences...

  19. Congestion management of distribution networks with day-ahead dynamic grid tariffs

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei

    vehicles (EV) and heat pumps (HP), will be largely deployed in electrical distribution networks. Congestion management will be important in the future active distribution networks. In the IDE4L project, work package 5 is dedicated to develop different kinds of congestion management methods. Demand response...... (DR) is one of the important methods. In this report, as one task of work package 5, the day-ahead dynamic tariff (DADT) method for congestion management in distribution networks is presented. The dynamic tariff (DT) can motivate the flexible demands (EV and HP) to shift their energy consumption...

  20. 78 FR 35940 - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Draft...

    Science.gov (United States)

    2013-06-14

    ...] Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Draft Guidance for... draft guidance entitled ``Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.'' This guidance identifies cybersecurity issues that manufacturers should consider in preparing...

  1. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  2. FY1995 optoelectronic devices and circuits for terabit class network; 1995 nendo terabit kyu network yo hikari denshi device kairo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The necessary technology realizing Terabit class optical network is the signal multiplexing both in temporal and spectral domains. Controllability of ultrafast optoelectronic systems is therefore the priority issue. Specifically we chose semiconductor lasers as the key devices. The methodology for performance improvement and the creation of novel functionality are investigated. Firstly compression of semiconductor laser pulse reached the world record of 65 femto second. Secondly a proposal was made to control mode locked semiconductor lasers via subharmonic synchronization and a substantial phase noise reduction was demonstrated. Thirdly a new technology was developed to realize broadband anti-reflection coating on semiconductor laser amplifier facet, bringing about significant performance improvement. To compensate the dispersion induced signal distortion a broadband semiconductor laser amplifier four wave mixing was analyzed and also demonstrated experimentally. (NEDO)

  3. Design and implementation of an integrated safety management system for compressed natural gas stations using ubiquitous sensor network

    International Nuclear Information System (INIS)

    Yang, Jae Mo; Ko, Byung Seok; Park, Chulhwan; Ko, Jae Wook; Yoo, Byungtae; Shin, Dongil

    2014-01-01

    To increase awareness of safety in facilities where hazards may exist, operators, managers, and executive officers on the site should be able to monitor such facilities. However, most compressed natural gas (CNG) service stations in Korea use only local-mode monitoring, with only on-site operators to monitor the facility. To complement this local-mode monitoring, an online safety management system called Ubiquitous-gas safety management system (U-GSMS) was developed. The U-GSMS consists largely of software and hardware. The software consists of systems that can manage safety and operations, while the hardware consists of sensors installed in the gas facility and wireless communication systems using a ubiquitous sensor network (USN) technology that facilitates communication between sensors as well as between sensors and other devices. As these systems are web-based, on-site operators as well as managers and executive officers at the headquarters can more effectively and efficiently perform monitoring and safety management

  4. Design and implementation of an integrated safety management system for compressed natural gas stations using ubiquitous sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Jae Mo; Ko, Byung Seok; Park, Chulhwan; Ko, Jae Wook [Kwangwoon University, Seoul (Korea, Republic of); Yoo, Byungtae [National Disaster Management Institute, Seoul (Korea, Republic of); Shin, Dongil [Myongji University, Yongin (Korea, Republic of)

    2014-03-15

    To increase awareness of safety in facilities where hazards may exist, operators, managers, and executive officers on the site should be able to monitor such facilities. However, most compressed natural gas (CNG) service stations in Korea use only local-mode monitoring, with only on-site operators to monitor the facility. To complement this local-mode monitoring, an online safety management system called Ubiquitous-gas safety management system (U-GSMS) was developed. The U-GSMS consists largely of software and hardware. The software consists of systems that can manage safety and operations, while the hardware consists of sensors installed in the gas facility and wireless communication systems using a ubiquitous sensor network (USN) technology that facilitates communication between sensors as well as between sensors and other devices. As these systems are web-based, on-site operators as well as managers and executive officers at the headquarters can more effectively and efficiently perform monitoring and safety management.

  5. Management of speech and video telephony quality in heterogeneous wireless networks

    CERN Document Server

    Lewcio, Błażej

    2014-01-01

    This book shows how networking research and quality engineering can be combined to successfully manage the transmission quality when speech and video telephony is delivered in heterogeneous wireless networks. Nomadic use of services requires intelligent management of ongoing transmission, and to make the best of available resources many fundamental trade-offs must be considered. Network coverage versus throughput and reliability of a connection is one key aspect, efficiency versus robustness of signal compression is another. However, to successfully manage services, user-perceived Quality of Experience (QoE) in heterogeneous networks must be known, and the perception of quality changes must be understood.  These issues are addressed in this book, in particular focusing on the perception of quality changes due to switching between diverse networks, speech and video codecs, and encoding bit rates during active calls.

  6. Contract Management: Organisational and Legal Form of Hotel Networks

    OpenAIRE

    Burak Tatyana V.

    2013-01-01

    Hotel business has been the most dynamic and profitable segment of economy, which is characterised with a high degree of internationalisation of capital and international character, during the recent decades. We clearly observe development of national and international hotel networks at this stage. Management contract is one of the methods of development and creation of hotel networks. The article describes theoretical basis of introduction of the contract management into the hotel business, ...

  7. Network Physics anounces first product to provide business-level management of the most complex and dynamic networks

    CERN Multimedia

    2003-01-01

    Network Physics, provider of business-level, traffic flow-based network management solutions, today announced the introduction of the Network Physics NP/BizFlow-1000. With the NP/BizFlow-1000, Fortune 1000 companies with complex and dynamic networks can analyze the flows that link business groups, critical applications, and network software and hardware (1 page).

  8. Implementation of Order-wire Functionality in IRITEL NG-SDH devices

    Directory of Open Access Journals (Sweden)

    D. Katanić

    2011-06-01

    Full Text Available This paper describes the implementation of order-wire functionality in NG-SDH devices ODS2G5 and OTS622 IRITEL. The paper also describes the operation of order-wire in networks with arbitrary topologies, as well as the configuration of order-wire functionality by using network management software SUNCE. The presented solution for order-wire functionality is compared with VoIP solutions. The paper shows that the presented solution provides fast reaction to network failures, while keeping the implementation simple.

  9. Response of asymmetric carbon nanotube network devices to sub-terahertz and terahertz radiation

    International Nuclear Information System (INIS)

    Gayduchenko, I.; Kardakova, A.; Voronov, B.; Finkel, M.; Fedorov, G.; Jiménez, D.; Morozov, S.; Presniakov, M.; Goltsman, G.

    2015-01-01

    Demand for efficient terahertz radiation detectors resulted in intensive study of the asymmetric carbon nanostructures as a possible solution for that problem. It was maintained that photothermoelectric effect under certain conditions results in strong response of such devices to terahertz radiation even at room temperature. In this work, we investigate different mechanisms underlying the response of asymmetric carbon nanotube (CNT) based devices to sub-terahertz and terahertz radiation. Our structures are formed with CNT networks instead of individual CNTs so that effects probed are more generic and not caused by peculiarities of an individual nanoscale object. We conclude that the DC voltage response observed in our structures is not only thermal in origin. So called diode-type response caused by asymmetry of the device IV characteristic turns out to be dominant at room temperature. Quantitative analysis provides further routes for the optimization of the device configuration, which may result in appearance of novel terahertz radiation detectors

  10. Identification and management of distributed data NGN, content-centric networks and the web

    CERN Document Server

    Bartolomeo, Giovanni

    2013-01-01

    Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management. With a focus on the primary problems in identifying, addressing, and

  11. Mobile Network Leader: A New Role of the Leader in Corporate Management

    Directory of Open Access Journals (Sweden)

    Haber Lesław H.

    2015-12-01

    Full Text Available The purpose of this paper was to present the management system evolution, from functional to process to network management. The network management system requires new organizational solutions associated with the fulfilment of external functions in management, directed at the acquisition of stakeholders from the environment who are treated as relational capital. That also requires new skills and competences in searching for relational capital. Possession of that type of capital indicates the importance of a company on a competitive market. The author pointed out the significance of the mobile network leaders’ personal traits, from the viewpoint of their causative power in searching for relational capital. It was pointed out that not every mobile network leader may possess specific personal capabilities to attain relevant objectives.

  12. Trends in Energy Management Technology: BCS Integration Technologies - Open Communications Networking

    Energy Technology Data Exchange (ETDEWEB)

    Webster, Tom

    2002-09-18

    Our overall purpose in writing this series of articles is to provide Federal energy managers some basic informational tools to assist their decision making process relative to energy management systems design, specification, procurement, and energy savings potential. Since Federal buildings rely on energy management systems more than their commercial counterparts, it is important for energy practitioners to have a high level of knowledge and understanding of these complex systems. This is the second article in a series and will focus on building control system (BCS) networking fundamentals and an assessment of current approaches to open communications protocols. This is important because networking is a complex subject and the networks form the basic infrastructure for energy management functions and for integrating a wide variety of OEM equipment into a complete EMCIS. The first article [1] covered enabling technologies for emerging energy management systems. Future topics will concentrate on more practical aspects including applications software, product offerings, networking strategies, and case studies of actual installations. Please refer to the first article for a more complete overview of the purpose and background for this series.

  13. Insertion algorithms for network model database management systems

    Science.gov (United States)

    Mamadolimov, Abdurashid; Khikmat, Saburov

    2017-12-01

    The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, forms partial order. When a database is large and a query comparison is expensive then the efficiency requirement of managing algorithms is minimizing the number of query comparisons. We consider updating operation for network model database management systems. We develop a new sequantial algorithm for updating operation. Also we suggest a distributed version of the algorithm.

  14. Mobile Device Management horizons for CERN Managed iOS and Mac Self-Service

    CERN Multimedia

    CERN. Geneva; MUSZKOWSKI, Maciek; BIPPUS, Vincent Nicolas

    2015-01-01

    Overview of the MDM (Mobile Device Mamagement) market in the context of the CERN needs and a discussion of technical capabilities of a range of MDM products, followed by a presentation of two new functionalities implemented using an MDM: Self-service Kiosk for Mac and delegated-management solution for professional tablets.

  15. Network approaches for understanding rainwater management from a social-ecological systems perspective

    Directory of Open Access Journals (Sweden)

    Steven D. Prager

    2015-12-01

    Full Text Available The premise of this research is to better understand how approaches to implementing rainwater management practices can be informed by understanding how the people living and working in agroecosystems are connected to one another. Because these connections are via both social interactions and functional characteristics of the landscape, a social-ecological network emerges. Using social-ecological network theory, we ask how understanding the structure of interactions can lead to improved rainwater management interventions. Using a case study situated within a small sub-basin in the Fogera area of the Blue Nile Basin of Ethiopia, we build networks of smallholders based both on the biophysical and social-institutional landscapes present in the study site, with the smallholders themselves as the common element between the networks. In turn we explore how structures present in the networks may serve to guide decision making regarding both where and with whom rainwater management interventions could be developed. This research thus illustrates an approach for constructing a social-ecological network and demonstrates how the structures of the network yield insights for tailoring the implementation of rainwater management practices to the social and ecological setting.

  16. Toward effective strategies for energy efficient network management

    NARCIS (Netherlands)

    Vreeswijk, Jacob Dirk; van Berkum, Eric C.; van Arem, Bart; van Vliet, H.; Abadi, A.; Bauer e.a., D.

    2010-01-01

    Trade-offs in efficiency, equity and acceptability arise as a central feature in traffic management. Today's urban traffic network management strategies focus on overall system performance and often overlook the interests of the individual road user. In addition, the emphasis is on travel time

  17. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  18. Actor networks in strategic niche management : insights from social network theory

    NARCIS (Netherlands)

    Caniëls, M.C.J.; Romijn, H.A.

    2008-01-01

    This paper contributes to Strategic Niche Management (SNM), an analytical technique designed to facilitate the introduction and diffusion of radically new sustainable technologies through societal experiments. According to SNM, intensive networking among social actors is a crucial process for the

  19. IEEE 802.15.4 MAC with GTS transmission for heterogeneous devices with application to wheelchair body-area sensor networks.

    Science.gov (United States)

    Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio

    2011-09-01

    In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.

  20. Advanced business process management in networked E-business scenarios

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Türetken, O.

    2017-01-01

    In the modern economy, we see a shift towards networked business scenarios. In many contemporary situations, the operation of multiple organizations is tightly coupled in collaborative business networks. To allow this tightly coupled collaboration, business process management (BPM) in these

  1. Análisis y diseño de bring your own device sobre la red inalámbrica de la Universidad Politécnica Salesiana Campus sur

    OpenAIRE

    Díaz Subia, Andrea Estefania; Lamar Tenelema, Lino Danilo

    2015-01-01

    The trend in computer networks is manage both the wireless security rules as their network equipments, in order to gain granularity in the networking by providing a better management by Information Technology department (IT) management by improving current policies or by implementing new rules. Bring your Own device (BYOD), is a networking trend design by infrastructure based on Cisco that aims to over the wireless network of Universidad Politécnica Salesiana, South Campus, giving a respon...

  2. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  3. The Dynamics of network and dyad level supply management

    DEFF Research Database (Denmark)

    Ellegaard, Chris

    -supplier relation and its immediate network context, are presented. In analysing the data, the dynamic interdependency between management of one level and management of the other, will be demonstrated. The analysis reveals a need for an alternating approach to supply management, which takes the dynamic complexity...

  4. Talk2Me: A Framework for Device–to–Device Augmented Reality Social Network

    DEFF Research Database (Denmark)

    Shu, Jiayu; Kosta, Sokol; Zheng, Rui

    2018-01-01

    , an augmented reality social network framework that enables users to disseminate information in a distributed way and view others’ information instantly. Talk2Me advertises users’ messages, together with their face–signature, to every nearby device in a Device–to–Device fashion. When a user looks at nearby...... persons through her camera–enabled wearable devices (e.g., Google Glass), the framework automatically extracts the face–signature of the person of interest, compares it with the previously captured signatures, and presents the information shared by this person to the user. We design and implement Talk2Me...... a novel face recognition algorithm for this specific scenario with a small number of face features and limited computing capability. Evaluation results of the prototype with real users and extensive simulations validate the performance and usability of our design, showing the potentials of the augmented...

  5. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  6. Managing Virtual Networks on Large-Scale Projects

    National Research Council Canada - National Science Library

    Noll, David

    2006-01-01

    The complexity of Boeing's 787 Program is too great for the formal planned information and communication network structure to fully meet the needs of companies, managers, and employees located throughout the world...

  7. Attacks on the Network Synchronization Systems Counteraction Method Implemented in the Software and Hardware Device «MARSH! 3.0»

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2013-12-01

    Full Text Available This paper proposes attacks on the network synchronization systems counteraction technique, method, algorithm and realizable aspects. The network synchronization systems are included in information technology systems or networks. This method is implemented in software and hardware device (means «MARSH! 3.0» providing trusted session.

  8. Lan Network Management System Design In PT. ABC

    OpenAIRE

    Mellviana Chandra; Drs. Lingga Hermanto, MM

    1998-01-01

    In all cases, the process of choosing what type of system and network to the appropriate network operating system relies heavily on an understanding of running a business firm (in terms of managing data and information into something meaningful). Hence thing to note is studied process data and information flow within an existing business in a way to analyze and evaluate as precisely as possible. Emphasized here that the selected network must support and reflect the ways data / information flo...

  9. The influence of social networks on self-management support: a metasynthesis.

    Science.gov (United States)

    Vassilev, Ivaylo; Rogers, Anne; Kennedy, Anne; Koetsenruijter, Jan

    2014-07-15

    There is increasing recognition that chronic illness management (CIM) is not just an individual but a collective process where social networks can potentially make a considerable contribution to improving health outcomes for people with chronic illness. However, the mechanisms (processes, activities) taking place within social networks are insufficiently understood. The aim of this review was to focus on identifying the mechanisms linking social networks with CIM. Here we consider network mechanisms as located within a broader social context that shapes practices, behaviours, and the multiplicity of functions and roles that network members fulfil. A systematic search of qualitative studies was undertaken on Medline, Embase, and Web for papers published between 1st January 2002 and 1st December 2013. Eligible for inclusion were studies dealing with diabetes, and with conditions or health behaviours relevant for diabetes management; and studies exploring the relationship between social networks, self-management, and deprivation. 25 papers met the inclusion criteria. A qualitative metasynthesis was undertaken and the review followed a line of argument synthesis. The main themes identified were: 1) sharing knowledge and experiences in a personal community; 2) accessing and mediation of resources; 3) self-management support requires awareness of and ability to deal with network relationships. These translated into line of argument synthesis in which three network mechanisms were identified. These were network navigation (identifying and connecting with relevant existing resources in a network), negotiation within networks (re-shaping relationships, roles, expectations, means of engagement and communication between network members), and collective efficacy (developing a shared perception and capacity to successfully perform behaviour through shared effort, beliefs, influence, perseverance, and objectives). These network mechanisms bring to the fore the close

  10. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Science.gov (United States)

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  11. Self-Management of Hybrid Optical and Packet Switching Networks

    NARCIS (Netherlands)

    Fioreze, Tiago

    2010-01-01

    Hybrid optical and packet switching networks are composed of multi-service hybrid devices that enable forwarding of data at multiple levels. Large IP flows at the IP level may be therefore moved to the optical level bypassing therefore the per hop routing decisions of the IP level. Such move could

  12. Logic of Biomaterial devices from CLRI for wound management

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Logic of Biomaterial devices from CLRI for wound management. Designing of biodegradable scaffolds. Designing the scaffold. Host drugs and growth factors. Design controlled drug release only to the wound area (based on pH differentials). Smartness is built in ...

  13. Multiuser Collaboration with Networked Mobile Devices

    Science.gov (United States)

    Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.

    2006-01-01

    In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings [1]. Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle [2]. Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application

  14. Supply Chain Management in Industrial Symbiosis Networks

    DEFF Research Database (Denmark)

    Herczeg, Gabor

    2016-01-01

    , as well as in policy documents from e.g. the European Union, the concepts of circular econ- omy and closed-loop supply chains have received significant attention. One of the manifestations of these developments are industrial symbiosis networks. These networks are a collaborative effort to more...... sustainable production op- erations, and are characterized by a supply chain reconfiguration that uses one company’s wastes or by-products as a raw material for another company, avoiding waste disposal while also reducing material requirements. The re- sulting networks of relationships contribute to regional...... sustainable develop- ment efforts, and emphasize synergistic relations, community, and collabora- tion. This thesis takes an operations and supply chain management perspec- tive on industrial symbiosis networks. More specifically, the thesis elaborates on the collaborative and competitive characteristics...

  15. Development of Network Devices Supporting Communication Independence In NPP I and C Systems

    International Nuclear Information System (INIS)

    Jeong, K.-I.; Suh, Y.S.; Park, G.-O.; Park, J.-Y.

    2013-06-01

    As advanced digital I and C systems of nuclear power plants or research reactors are being introduced to replace analog systems, a data communication network is necessary for data exchanges between I and C systems of nuclear power plants or research reactors. Data communication network technology may have significant impact on I and C systems. As the safety I and C system is composed of redundant channels to enhance the performance of the safety functions and data communication system is used to transmit the data generated by the digital I and C systems, communication independence is required to mitigate the risk of safety I and C system failure. Therefore this paper mainly discusses the issues related to the communication independence and the current status of network devices we designed, developed, and validated to satisfy the requirements of function, performance, and communication independence. (authors)

  16. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  17. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  18. The design and implementation of device operation and management system based on LAMP

    International Nuclear Information System (INIS)

    Liu Shuzhen; Ma Lanxin; Qi Fazhi

    2010-01-01

    In order to manage devices with high efficiency and high quality and make it more standardized, more scientific and more modern, we use the platform of LAMP (Linux-Apache-Mysql-PHP) to develop a web-based equipment operation and management system. It uses the Browser/Server mode as the system mode and Mysql as the database to complete the function, such as query, modify, add, delete, batch import, batch export user information and device information, automatic alarm, user reviews and so on. (authors)

  19. In Vitro Reconstruction of Neuronal Networks Derived from Human iPS Cells Using Microfabricated Devices.

    Directory of Open Access Journals (Sweden)

    Yuzo Takayama

    Full Text Available Morphology and function of the nervous system is maintained via well-coordinated processes both in central and peripheral nervous tissues, which govern the homeostasis of organs/tissues. Impairments of the nervous system induce neuronal disorders such as peripheral neuropathy or cardiac arrhythmia. Although further investigation is warranted to reveal the molecular mechanisms of progression in such diseases, appropriate model systems mimicking the patient-specific communication between neurons and organs are not established yet. In this study, we reconstructed the neuronal network in vitro either between neurons of the human induced pluripotent stem (iPS cell derived peripheral nervous system (PNS and central nervous system (CNS, or between PNS neurons and cardiac cells in a morphologically and functionally compartmentalized manner. Networks were constructed in photolithographically microfabricated devices with two culture compartments connected by 20 microtunnels. We confirmed that PNS and CNS neurons connected via synapses and formed a network. Additionally, calcium-imaging experiments showed that the bundles originating from the PNS neurons were functionally active and responded reproducibly to external stimuli. Next, we confirmed that CNS neurons showed an increase in calcium activity during electrical stimulation of networked bundles from PNS neurons in order to demonstrate the formation of functional cell-cell interactions. We also confirmed the formation of synapses between PNS neurons and mature cardiac cells. These results indicate that compartmentalized culture devices are promising tools for reconstructing network-wide connections between PNS neurons and various organs, and might help to understand patient-specific molecular and functional mechanisms under normal and pathological conditions.

  20. Contribution to the Management of Traffic in Networks

    Directory of Open Access Journals (Sweden)

    Filip Chamraz

    2014-01-01

    Full Text Available The paper deals with Admission control methods (AC in IMS networks (IP multimedia subsystem as one of the elements that help ensure QoS (Quality of service. In the paper we are trying to choose the best AC method for selected IMS network to allow access to the greatest number of users. Of the large number of methods that were tested and considered good we chose two. The paper compares diffusion method and one of the measurement based method, specifically „Simple Sum“. Both methods estimate effective bandwidth to allow access for the greatest number of users/devices and allow them access to prepaid services or multimedia content.

  1. A new era for cardiac rhythm management devices : Solutions for transvenous lead complications

    NARCIS (Netherlands)

    Knops, R.E.

    2017-01-01

    Both pacemakers and cardiac defibrillators (ICD) have been designed to treat cardiac arrhythmias. These arrhythmias often lead to life-threatening conditions. Numerous studies have shown the benefits on survival and quality of life of these cardiac rhythm management (CRM) devices. These devices rely

  2. Resource Management in Tactical Military Networks

    Science.gov (United States)

    2006-12-01

    FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION Resource Management in Tactical Military Networks...Martin Lies, Peter Sevenich, Christoph Karg, Christoph Barz Nr: 2 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE ...Communication with IPSec in Tunnelmode Nr: 3 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION IPSec in

  3. Management of seismic data on network

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Bu Heung [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    KIGAM has managed magnetic tapes written in seismic data acquired in Korea offshore and abroad since 1979. For now, it amounts about 13,000 tapes and other documents of seismic data are reserved by KIGAM also. For handling with them, FOX-PRO database management system has been used since 1993. In case of one user, it seems useful and convenient because the program is very easy to use and many well done utility was provided. In contrast with that, it has many problems also. For example, a user who wants to query information of these magnetic tapes must go magnetic tape room where the system is installed and he must know how to use the utilities of the FOX-PRO database management system. For the reason of above, the seismic data processing team attempted to change the FOX-PRO system with other client-server system supports networking on internet. After many testing and considering, they selected like as following hardware and software( System: PC with networking, OS: Linux and Unix, Software: Just Logic/SQL). The main reasons for selecting above system, first, any kinds of personal computer are available and easy to get. Secondly, Linux and Unix OS are good for using network. Especially, Linux is free and easy to get on many internet ftp sites. Lastly Just Logic/SQL is for client-server system, supports Linux OS and the programming style is very similar to C language. The contents of this report are as follows. In chapter 2, the Just Logic/SQL system structure and existing files through the sub-directories are showed and commented. In chapter 3, the statements using in Just Logic/SQL are explained and some examples are showed. In chapter 4, shows two example programs making seismic database including rack list, optical disk table respectively. The rack list table is the database of magnetic tapes managed by KIGAM. The optical disk table is the information record about how many, what tapes are converted to optical disk. (author). 4 tabs.

  4. Nanomaterials for LightManagement in Electro-Optical Devices

    Energy Technology Data Exchange (ETDEWEB)

    Truong, Vo-Van [Concordia University, Montréal, Québec, H4B 1R6, Canada; Singh, Jai [Charles Darwin University, Darwin, Australia; Tanemura, Sakae [Japan Fine Ceramics Center, Nagoya, Japan; Hu, Michael Z. [ORNL

    2012-01-01

    In the past decade, nanostructured materials and nanoparticles have emerged as the necessary ingredients for electrooptical applications and enhancement of device performance, in particular by making use of the light management aspects of the nanomaterials. The application areas that are being transformed profoundly include smart coating devices (e.g., electrochromic, photochromic, and thermochromic devices), solar energy, and sensing. Despite the large volume of work in the past on smart coating devices, and in particular on electrochromic devices and thermochromic fenestrations, for optical transmission or reflection control, applications remain limited because of slow response time and nonuniformity in the case of large surfaces. Recent works in the field indicate that nanostructured electrochromic coatings would be an integral part of the solution to the above problem. One aspect that can thus be focused on would be the fabrication and characterization of the nanostructured smart coating materials and their compatibility with other layers in the overall smart coating device. In the area of solar photovoltaics, nanomaterials have been used in designing light-trapping schemes for inorganic as well as organic solar cells. One particular category of solar cells that has attracted much interest is the plasmonic solar cells in which metallic nanoparticles are incorporated, helping in enhancing their energy conversion efficiency. Nanostructured solar cells would eventually develop into a 'game changing' technology for making solar cells that are affordable and highly efficient, providing a sizeable alternative energy source for our ever-increasing energy needs. Sensors based on the optical properties of constituting nanostructures and nanoparticles also form a most interesting class of bio- and electrochemical sensing devices. The possibility of synthetizing nanoparticles and structures of specifically desired sizes and shapes has indeed opened a whole new

  5. Multi-Radio Mobile Device in Role of Hybrid Node Between WiFi and LTE networks

    Directory of Open Access Journals (Sweden)

    Pavel Masek

    2015-05-01

    Full Text Available With the ubiquitous wireless network coverage, Machine-Type Communications (MTC is emerging to enable data transfers using devices/sensors without need for human interaction. In this paper we, we introduce a comprehensive simulation scenario for modeling and analysis for heterogeneous MTC. We demonstrate the most expected scenario of MTC communication using the IEEE 802.11 standard for direct communication between sensors and for transmitting data between individual sensor and Machine-Type Communication Gateway (MTCG. The MTCG represents the hybrid node serving as bridge between two heterogeneous networks (WiFi and LTE. Following the idea of hybrid node, two active interfaces must be implemented on this node together with mechanism for handling the incoming traffic (from WiFi network to LTE network. As a simulation tool, the Network Simulator 3 (NS-3 with implemented LTE/EPC Network Simulator (LENA framework was used. The major contribution of this paper therefore lies in the implementation of logic for interconnection of two heterogeneous networks in simulation environment NS-3.

  6. Management issues during HeartWare left ventricular assist device implantation and the role of transesophageal echocardiography

    Directory of Open Access Journals (Sweden)

    Sanjay Orathi Patangi

    2013-01-01

    Full Text Available Left ventricular assist devices (LVAD are increasingly used for mechanical circulatory support of patients with severe heart failure, primarily as a bridge to heart transplantation. Transesophageal echocardiography (TEE plays a major role in the clinical decision making during insertion of the devices and in the post-operative management of these patients. The detection of structural and device-related mechanical abnormalities is critical for optimal functioning of assist device. In this review article, we describe the usefulness of TEE for optimal perioperative management of patients presenting for HeartWare LVAD insertion.

  7. Universal data access for run-time resource management in resource constrained wireless networks

    OpenAIRE

    Rerkrai, Krisakorn

    2012-01-01

    Resource-constrainedwireless networks, e.g.wireless sensor networks (WSNs), small embedded devices with limited computational power and energy, have been the subject of intense research in the past decade. Moreover, recent technological advances and growing demand for better efficiency have led to a great number of link and network protocols for WSNs. The protocols depend on specific interfaces to exchange necessary information. Unfortunately these interfaces are often proprietary and highly ...

  8. Secure data exchange between intelligent devices and computing centers

    Science.gov (United States)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  9. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  10. Model Integrating Fuzzy Argument with Neural Network Enhancing the Performance of Active Queue Management

    Directory of Open Access Journals (Sweden)

    Nguyen Kim Quoc

    2015-08-01

    Full Text Available The bottleneck control by active queue management mechanisms at network nodes is essential. In recent years, some researchers have used fuzzy argument to improve the active queue management mechanisms to enhance the network performance. However, the projects using the fuzzy controller depend heavily on professionals and their parameters cannot be updated according to changes in the network, so the effectiveness of this mechanism is not high. Therefore, we propose a model combining the fuzzy controller with neural network (FNN to overcome the limitations above. Results of the training of the neural networks will find the optimal parameters for the adaptive fuzzy controller well to changes of the network. This improves the operational efficiency of the active queue management mechanisms at network nodes.

  11. Leveraging network utility management practices for regulatory purposes

    International Nuclear Information System (INIS)

    2009-11-01

    Electric utilities around the globe are entering a phase where they must modernize and implement smart grid technologies. In order to optimize system architecture, asset replacement, and future operating costs, it the utilities must implement robust and flexible asset management structures. This report discussed the ways in which regulators assess investment plans. It focused on the implicit or explicit use of an asset management approach, including principles; processes; input and outputs; decision-making criteria and prioritization methods. The Ontario Energy Board staff were familiarized with the principles and objectives of established and emerging asset management processes and underlying analytic processes, systems and tools in order to ensure that investment information provided by network utilities regarding rates and other applications could be evaluated effectively. Specifically, the report discussed the need for and importance of asset management and provided further details of international markets and their regulatory approaches to asset management. The report also discussed regulatory approaches for review of asset management underlying investment plans as well as an overview of international regulatory practice for review of network utility asset management. It was concluded that options for strengthening regulatory guidance and assessment included utilizing appropriate and effective benchmarking to assess, promote and provide incentives for best practices and steer clear of the potential perverse incentives. 21 tabs., 17 figs., 1 appendix.

  12. 2nd International Conference on Intelligent Computing, Communication & Devices

    CERN Document Server

    Popentiu-Vladicescu, Florin

    2017-01-01

    The book presents high quality papers presented at 2nd International Conference on Intelligent Computing, Communication & Devices (ICCD 2016) organized by Interscience Institute of Management and Technology (IIMT), Bhubaneswar, Odisha, India, during 13 and 14 August, 2016. The book covers all dimensions of intelligent sciences in its three tracks, namely, intelligent computing, intelligent communication and intelligent devices. intelligent computing track covers areas such as intelligent and distributed computing, intelligent grid and cloud computing, internet of things, soft computing and engineering applications, data mining and knowledge discovery, semantic and web technology, hybrid systems, agent computing, bioinformatics, and recommendation systems. Intelligent communication covers communication and network technologies, including mobile broadband and all optical networks that are the key to groundbreaking inventions of intelligent communication technologies. This covers communication hardware, soft...

  13. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  14. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández

    2014-01-01

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678

  15. Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command

    Science.gov (United States)

    2017-11-22

    ARL-TN-0859 ● NOV 2017 US Army Research Laboratory Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled...Applied Knowledge Management to Mitigate Cognitive Load in Network-Enabled Mission Command by John K Hawley Human Research and Engineering...REPORT TYPE Technical Note 3. DATES COVERED (From - To) 1 May 2016–20 April 2017 4. TITLE AND SUBTITLE Applied Knowledge Management to Mitigate

  16. A Data Scheduling and Management Infrastructure for the TEAM Network

    Science.gov (United States)

    Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.

    2009-04-01

    currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the

  17. Using social-network research to improve outcomes in natural resource management.

    Science.gov (United States)

    Groce, Julie E; Farrelly, Megan A; Jorgensen, Bradley S; Cook, Carly N

    2018-05-08

    The conservation and management of natural resources operates within social-ecological systems, in which resource users are embedded in social and environmental contexts that influence their management decisions. Characterizing social networks of resource users has received growing interest as an approach for understanding social influences on decision-making, and social network analysis (SNA) has emerged as a useful technique to explore these relationships. In this review, we synthesize how SNA has been used in studies of natural resource management. To present our findings, we developed a theory of change which outlines the influence between social networks and social processes (e.g., interactions between individuals), which in turn influence social outcomes (e.g., decisions or actions) that impact environmental outcomes (e.g., improved condition). Our review of 85 studies demonstrate frequent use of descriptive methods to characterize social processes, yet few studies considered social outcomes or examined network structure relative to environmental outcomes. Only 4 studies assessed network interventions intended to impact relevant processes or outcomes. The heterogeneity in case studies, methods, and analyses preclude general lessons. Thus, we offer a typology of appropriate measures for each stage of our theory of change, to structure and progress our learning about the role of social networks in achieving environmental outcomes. In addition, we suggest shifts in research foci towards intervention studies, to aid in understanding causality and inform the design of conservation initiatives. We also identify the need for developing clearer justification and guidance around the proliferation of network measures. The use of SNA in natural resource management is expanding rapidly, thus now is the ideal time for the conservation community to build a more rigorous evidence base to demonstrate the extent to which social networks can play a role in achieving desired

  18. Construction of Network Management Information System of Agricultural Products Supply Chain Based on 3PLs

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain.Network management information system structure of agricultural products supply chain based on 3PLs is constructed,including the four layers (the network communication layer,the hardware and software environment layer,the database layer,and the application layer) and 7 function modules (centralized control,transportation process management,material and vehicle scheduling,customer relationship,storage management,customer inquiry,and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward.The management of 3PLs mainly includes purchasing management,supplier relationship management,planning management,customer relationship management,storage management and distribution management.Thus,a management system of internal and external integrated agricultural enterprises is obtained.The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes,establishing a long-term partnership revolving around the 3PLs core enterprise,as well as a supply chain with stable relationship based on the supply chain network system,so as to improve the circulation efficiency of agricultural products,and to explore the sales market for agricultural products.

  19. Do Director Networks Help Manager Plan and Forecast Better?

    NARCIS (Netherlands)

    Schabus, M.

    I examine whether directors' superior access to information and resources through their board network improves the quality of firms' planning and forecasting. Managers may benefit from well-connected directors as, even though managers have firm specific knowledge, they may have only limited insight

  20. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    KAUST Repository

    Elrasad, Amr Elsayed M.

    2016-05-15

    The increasing bandwidth demands in access networks motivates network operators, networking devices manufacturers, and standardization institutions to search for new approaches for access networks. These approaches should support higher bandwidth, longer distance between end user and network operator, and less energy consumption. Ethernet Passive Optical Network (EPON) is a favorable choice for broadband access networks. EPONs support transmission rates up to 10 Gbps. EPONs also support distance between end users and central office up to 20 Km. Moreover, optical networks have the least energy consumption among all types of networks. In this dissertation, we focus on reducing delay and saving energy in EPONs. Reducing delay is essential for delay-sensitive traffic, while minimizing energy consumption is an environmental necessity and also reduces the network operating costs. We identify five challenges, namely excess bandwidth allocation, frame delineation, congestion resolution, large round trip time delay in long-reach EPONs (LR-EPONs), and energy saving. We provide a Dynamic Bandwidth Allocation (DBA) approach for each challenge. We also propose a novel scheme that combines the features of the proposed approaches in one highly performing scheme. Our approach is to design novel DBA protocols that can further reduce the delay and be simultaneously simple and fair. We also present a dynamic bandwidth allocation scheme for Green EPONs taking into consideration maximizing energy saving under target delay constraints. Regarding excess bandwidth allocation, we develop an effective DBA scheme called Delayed Excess Scheduling (DES). DES achieves significant delay and jitter reduction and is more suitable for industrial deployment due to its simplicity. Utilizing DES in hybrid TDM/WDM EPONs (TWDM-EPONs) is also investigated. We also study eliminating the wasted bandwidth due to frame delineation. We develop an interactive DBA scheme, Efficient Grant Sizing Interleaved

  1. Processes in construction of failure management expert systems from device design information

    Science.gov (United States)

    Malin, Jane T.; Lance, Nick

    1987-01-01

    This paper analyzes the tasks and problem solving methods used by an engineer in constructing a failure management expert system from design information about the device to te diagnosed. An expert test engineer developed a trouble-shooting expert system based on device design information and experience with similar devices, rather than on specific expert knowledge gained from operating the device or troubleshooting its failures. The construction of the expert system was intensively observed and analyzed. This paper characterizes the knowledge, tasks, methods, and design decisions involved in constructing this type of expert system, and makes recommendations concerning tools for aiding and automating construction of such systems.

  2. Value of monitoring in road network management

    NARCIS (Netherlands)

    Zouch, M.; Courage, W.; Napoles-Morales, O.

    2014-01-01

    We present a framework for road network management to assist road authorities in maintenance budget estimations and long-term maintenance strategies definition. Information about road conditions is obtained from monitoring. Available data are used to estimate and update prediction of degradation

  3. Reducing domestic heating demand: Managing the impact of behavior-changing feedback devices via marketing.

    Science.gov (United States)

    Jensen, Thorben; Chappin, Émile J L

    2017-07-15

    Feedback devices can be used to inform households about their energy-consumption behavior. This may persuade them to practice energy conservation. The use of feedback devices can also-via word of mouth-spread among households and thereby support the spread of the incentivized behavior, e.g. energy-efficient heating behavior. This study investigates how to manage the impact of these environmental innovations via marketing. Marketing activities can support the diffusion of devices. This study aims to identify the most effective strategies of marketing feedback devices. We did this by adapting an agent-based model to simulate the roll-out of a novel feedback technology and heating behavior within households in a virtual city. The most promising marketing strategies were simulated and their impacts were analyzed. We found it particularly effective to lend out feedback devices to consumers, followed by leveraging the social influence of well-connected individuals, and giving away the first few feedback devices for free. Making households aware of the possibility of purchasing feedback devices was found to be least effective. However, making households aware proved to be most cost-efficient. This study shows that actively managing the roll-out of feedback devices can increase their impacts on energy-conservation both effectively and cost-efficiently. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Distributed processing and network of data acquisition and diagnostics control for Large Helical Device (LHD)

    International Nuclear Information System (INIS)

    Nakanishi, H.; Kojima, M.; Hidekuma, S.

    1997-11-01

    The LHD (Large Helical Device) data processing system has been designed in order to deal with the huge amount of diagnostics data of 600-900 MB per 10-second short-pulse experiment. It prepares the first plasma experiment in March 1998. The recent increase of the data volume obliged to adopt the fully distributed system structure which uses multiple data transfer paths in parallel and separates all of the computer functions into clients and servers. The fundamental element installed for every diagnostic device consists of two kinds of server computers; the data acquisition PC/Windows NT and the real-time diagnostics control VME/VxWorks. To cope with diversified kinds of both device control channels and diagnostics data, the object-oriented method are utilized wholly for the development of this system. It not only reduces the development burden, but also widen the software portability and flexibility. 100Mbps EDDI-based fast networks will re-integrate the distributed server computers so that they can behave as one virtual macro-machine for users. Network methods applied for the LHD data processing system are completely based on the TCP/IP internet technology, and it provides the same accessibility to the remote collaborators as local participants can operate. (author)

  5. Network and System Management of ICEbox Through SNMP

    National Research Council Canada - National Science Library

    Lee, Daniel

    1997-01-01

    .... Then, this report presents the design and implementation of the experimental network management system's software modules and the proxy agent that provide the interface between ICEbox and the SNMP...

  6. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    Science.gov (United States)

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  7. Reference Architecture for Multi-Layer Software Defined Optical Data Center Networks

    Directory of Open Access Journals (Sweden)

    Casimer DeCusatis

    2015-09-01

    Full Text Available As cloud computing data centers grow larger and networking devices proliferate; many complex issues arise in the network management architecture. We propose a framework for multi-layer; multi-vendor optical network management using open standards-based software defined networking (SDN. Experimental results are demonstrated in a test bed consisting of three data centers interconnected by a 125 km metropolitan area network; running OpenStack with KVM and VMW are components. Use cases include inter-data center connectivity via a packet-optical metropolitan area network; intra-data center connectivity using an optical mesh network; and SDN coordination of networking equipment within and between multiple data centers. We create and demonstrate original software to implement virtual network slicing and affinity policy-as-a-service offerings. Enhancements to synchronous storage backup; cloud exchanges; and Fibre Channel over Ethernet topologies are also discussed.

  8. The Uncertainties of Risk Management

    DEFF Research Database (Denmark)

    Vinnari, Eija; Skærbæk, Peter

    2014-01-01

    for expanding risk management. More generally, such uncertainties relate to the professional identities and responsibilities of operational managers as defined by the framing devices. Originality/value – The paper offers three contributions to the extant literature: first, it shows how risk management itself......Purpose – The purpose of this paper is to analyse the implementation of risk management as a tool for internal audit activities, focusing on unexpected effects or uncertainties generated during its application. Design/methodology/approach – Public and confidential documents as well as semi......-structured interviews are analysed through the lens of actor-network theory to identify the effects of risk management devices in a Finnish municipality. Findings – The authors found that risk management, rather than reducing uncertainty, itself created unexpected uncertainties that would otherwise not have emerged...

  9. Energy management and multi-layer control of networked microgrids

    Science.gov (United States)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  10. Using Web-Based Technologies for Network Management Tools

    National Research Council Canada - National Science Library

    Agami, Arie

    1997-01-01

    .... New solutions to current network management tools problems may be found in the increasingly popular World Wide Web, Internet tools such as Java, and remote database access through the Internet...

  11. Critical appraisal of cardiac implantable electronic devices: complications and management

    Directory of Open Access Journals (Sweden)

    Padeletti L

    2011-09-01

    Full Text Available Luigi Padeletti1, Giosuè Mascioli2, Alessandro Paoletti Perini1, Gino Grifoni1, Laura Perrotta1, Procolo Marchese3, Luca Bontempi3, Antonio Curnis31Istituto di Clinica Medica e Cardiologia, Università degli Studi di Firenze, Italia; 2Elettrofisiologia, Istituto Humanitas Gavazzeni, Bergamo, Italia; 3Elettrofisiologia, Spedali Civili, Brescia, ItaliaAbstract: Population aging and broader indications for the implant of cardiac implantable electronic devices (CIEDs are the main reasons for the continuous increase in the use of pacemakers (PMs, implantable cardioverter-defibrillators (ICDs and devices for cardiac resynchronization therapy (CRT-P, CRT-D. The growing burden of comorbidities in CIED patients, the greater complexity of the devices, and the increased duration of procedures have led to an augmented risk of infections, which is out of proportion to the increase in implantation rate. CIED infections are an ominous condition, which often implies the necessity of hospitalization and carries an augmented risk of in-hospital death. Their clinical presentation may be either at pocket or at endocardial level, but they can also manifest themselves with lone bacteremia. The management of these infections requires the complete removal of the device and subsequent, specific, antibiotic therapy. CIED failures are monitored by competent public authorities, that require physicians to alert them to any failures, and that suggest the opportune strategies for their management. Although the replacement of all potentially affected devices is often suggested, common practice indicates the replacement of only a minority of devices, as close follow-up of the patients involved may be a safer strategy. Implantation of a PM or an ICD may cause problems in the patients' psychosocial adaptation and quality of life, and may contribute to the development of affective disorders. Clinicians are usually unaware of the psychosocial impact of implanted PMs and ICDs. The

  12. Management of Tactical Ad Hoc Networks With C2 Data Models

    National Research Council Canada - National Science Library

    Brand, John

    2002-01-01

    The U.S. Army Research Laboratory is investigating the exploitation of preloaded reference data to solve problems in tactical network management By closely evaluating how communications networks are described...

  13. Networking in Sport Management: Ideas and Activities to Enhance Student Engagement and Career Development

    Directory of Open Access Journals (Sweden)

    Alan S. Kornspan

    2013-01-01

    Full Text Available The primary purpose of this paper is to present information regarding the development of networking skills to enhance the career development of sport management students. Specifically, literature is reviewed which supports the importance of networking in the attainment of employment and career advancement in the sport industry. This is followed by an overview of emerging networking activities that allow opportunities for sport management students to expand their network. Sport industry career fairs and career conferences that students can attend are discussed. Additionally, sport industry professional associations that students can become involved with are presented. This is then followed with information related to the development of sport management clubs and various events that can be promoted to enhance the networking process. Specifically, activities provided by university faculty to enhance the educational experience of sport management students are detailed. Finally, a sample schedule of semester activities focused on student engagement and networking activities is provided.

  14. Framework for implementation of maintenance management in distribution network service providers

    International Nuclear Information System (INIS)

    Gomez Fernandez, Juan Francisco; Crespo Marquez, Adolfo

    2009-01-01

    Distribution network service providers (DNSP) are companies dealing with network infrastructure, such as distribution of gas, water, electricity or telecommunications, and they require the development of special maintenance management (MM) capabilities in order to satisfy the needs of their customers. In this sector, maintenance management information systems are essential to ensure control, gain knowledge and improve decision making. The aim of this paper is the study of specific characteristics of maintenance in these types of companies. We will investigate existing standards and best management practices with the scope of defining a suitable ad-hoc framework for implementation of maintenance management. The conclusion of the work supports the proposition of a framework consisting on a processes framework based on a structure of systems, integrated for continuous improvement of maintenance activities. The paper offers a very practical approach to the problem, as a result of more of 10 years of professional experience within this sector, and specially focused to network maintenance.

  15. A multi-agent system architecture for sensor networks.

    Science.gov (United States)

    Fuentes-Fernández, Rubén; Guijarro, María; Pajares, Gonzalo

    2009-01-01

    The design of the control systems for sensor networks presents important challenges. Besides the traditional problems about how to process the sensor data to obtain the target information, engineers need to consider additional aspects such as the heterogeneity and high number of sensors, and the flexibility of these networks regarding topologies and the sensors in them. Although there are partial approaches for resolving these issues, their integration relies on ad hoc solutions requiring important development efforts. In order to provide an effective approach for this integration, this paper proposes an architecture based on the multi-agent system paradigm with a clear separation of concerns. The architecture considers sensors as devices used by an upper layer of manager agents. These agents are able to communicate and negotiate services to achieve the required functionality. Activities are organized according to roles related with the different aspects to integrate, mainly sensor management, data processing, communication and adaptation to changes in the available devices and their capabilities. This organization largely isolates and decouples the data management from the changing network, while encouraging reuse of solutions. The use of the architecture is facilitated by a specific modelling language developed through metamodelling. A case study concerning a generic distributed system for fire fighting illustrates the approach and the comparison with related work.

  16. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  17. Quality management status of national radiation environmental monitoring network and strategy for development

    International Nuclear Information System (INIS)

    Huang Renjie; Zhang Rongsuo; Ni Shiying; Shen Gang

    2009-01-01

    During the period of 10th five-year plan, MEP has constructed a national radiation environmental monitoring network. In the running of the network, quality management on monitoring data is of vital importance. So all the members of the radiation environmental monitoring network are required to ensure the quality of monitoring method, equipment, reagent,quality of personnel, data processing and information management and so on. Thus the monitoring result would be typical and accuracy in science. The article introduced in detail the quality management status of the National Radiation Environmental Monitoring Network and put forward the strategy for development from the institutionalized and large-scale point of view of radioactive environmental monitoring work. (authors)

  18. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  19. Bayesian network as a modelling tool for risk management in agriculture

    DEFF Research Database (Denmark)

    Rasmussen, Svend; Madsen, Anders L.; Lund, Mogens

    . In this paper we use Bayesian networks as an integrated modelling approach for representing uncertainty and analysing risk management in agriculture. It is shown how historical farm account data may be efficiently used to estimate conditional probabilities, which are the core elements in Bayesian network models....... We further show how the Bayesian network model RiBay is used for stochastic simulation of farm income, and we demonstrate how RiBay can be used to simulate risk management at the farm level. It is concluded that the key strength of a Bayesian network is the transparency of assumptions......, and that it has the ability to link uncertainty from different external sources to budget figures and to quantify risk at the farm level....

  20. Analysis of Informationization Construction of Business Financial Management under the Network Economy

    Science.gov (United States)

    Dong, Yahui; Zhang, Pengwei; Li, Wei

    To strengthen the informationization construction of the financial management has great significance to the achievement of business management informationization, and under the network economic environment, it is an important task of the financial management that how to conduct informationization construction of traditional financial management to provide true, reliable and complete financial information system for the business managers. This paper thoroughly researches the problem of financial information orientation management (FIOM) by taking the method of combining theory with practice. This paper puts forward the thinking method of financial information management, makes the new contents of E-finance. At last, this paper rebuilds the system of finance internal control from four aspects such as control of organization and management, system development control and safety control of network system.

  1. Inhalation device options for the management of chronic obstructive pulmonary disease.

    Science.gov (United States)

    DePietro, Michael; Gilbert, Ileen; Millette, Lauren A; Riebe, Michael

    2018-01-01

    Chronic obstructive pulmonary disease (COPD) is characterized by chronic respiratory symptoms and airflow limitation, resulting from abnormalities in the airway and/or damage to the alveoli. Primary care physicians manage the healthcare of a large proportion of patients with COPD. In addition to determining the most appropriate medication regimen, which usually includes inhaled bronchodilators with or without inhaled corticosteroids, physicians are charged with optimizing inhalation device selection to facilitate effective drug delivery and patient adherence. The large variety of inhalation devices currently available present numerous challenges for physicians that include: (1) gaining knowledge of and proficiency with operating different device classes; (2) identifying the most appropriate inhalation device for the patient; and (3) providing the necessary education and training for patients on device use. This review provides an overview of the inhalation device types currently available in the United States for delivery of COPD medications, including information on their successful operation and respective advantages and disadvantages, factors to consider in matching a device to an individual patient, the need for device training for patients and physicians, and guidance for improving treatment adherence. Finally, the review will discuss established and novel tools and technology that may aid physicians in improving education and promoting better adherence to therapy.

  2. NOSArmor: Building a Secure Network Operating System

    Directory of Open Access Journals (Sweden)

    Hyeonseong Jo

    2018-01-01

    Full Text Available Software-Defined Networking (SDN, controlling underlying network devices (i.e., data plane in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS, also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB, into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight with secureness of network assets.

  3. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Directory of Open Access Journals (Sweden)

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  4. An electronic regulatory document management system for a clinical trial network.

    Science.gov (United States)

    Zhao, Wenle; Durkalski, Valerie; Pauls, Keith; Dillon, Catherine; Kim, Jaemyung; Kolk, Deneil; Silbergleit, Robert; Stevenson, Valerie; Palesch, Yuko

    2010-01-01

    A computerized regulatory document management system has been developed as a module in a comprehensive Clinical Trial Management System (CTMS) designed for an NIH-funded clinical trial network in order to more efficiently manage and track regulatory compliance. Within the network, several institutions and investigators are involved in multiple trials, and each trial has regulatory document requirements. Some of these documents are trial specific while others apply across multiple trials. The latter causes a possible redundancy in document collection and management. To address these and other related challenges, a central regulatory document management system was designed. This manuscript shares the design of the system as well as examples of it use in current studies. Copyright (c) 2009 Elsevier Inc. All rights reserved.

  5. Using Blockchain Technology and Smart Contracts for Access Management in IoT devices

    OpenAIRE

    Bagchi, Rupsha

    2017-01-01

    The Internet of Things is a proliferating industry, which is transforming many homes and businesses, making them smart. However, the rapid growth of these devices and the interactions between these devices, introduces many challenges including that of a secure management system for the identities and interactions of the devices. While the centralized model has worked well for many years, there is a risk of the servers becoming bottlenecks and a single point of failure, thereby making them vul...

  6. A Distributed Routing Scheme for Energy Management in Solar Powered Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.; Shamma, Jeff S.; Claudel, Christian G.

    2017-01-01

    Energy management is critical for solar-powered sensor networks. In this article, we consider data routing policies to optimize the energy in solar powered networks. Motivated by multipurpose sensor networks, the objective is to find the best

  7. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  8. Space Network Devices Developed

    Science.gov (United States)

    Jones, Robert E.

    2004-01-01

    The NASA Glenn Research Center through a contract with Spectrum Astro, Inc., has been developing space network hardware as an enabling technology using open systems interconnect (OSI) standards for space-based communications applications. The OSI standard is a well-recognized layered reference model that specifies how data should be sent node to node in a communications network. Because of this research and technology development, a space-qualifiable Ethernet-based network interface card (similar to the type found in a networked personal computer) and the associated four-port hub were designed and developed to flight specifications. During this research and development, there also have been many lessons learned for determining approaches for migrating existing spacecraft architectures to an OSI-network-based platform. Industry has recognized the benefits of targeting hardware developed around OSI standards such as Transmission Control Protocol/Internet Protocol (TCP/IP) or similar protocols for use in future generations of space communication systems. Some of these tangible benefits include overall reductions in mission schedule and cost and in system complexity. This development also brings us a step closer to the realization of a principal investigator on a terrestrial Internet site being able to interact with space platform assets in near real time. To develop this hardware, Spectrum Astro first conducted a technology analysis of alternatives study. For this analysis, they looked at the features of three protocol specifications: Ethernet (IEEE 802.3), Firewire (IEEE 1394), and Spacewire (IEEE 1355). A thorough analysis was performed on the basis of criteria such as current protocol performance and suitability for future space applications. Spectrum Astro also projected future influences such as cost, hardware and software availability, throughput performance, and integration procedures for current and transitive space architectures. After a thorough analysis

  9. OWL Ontologies and SWRL Rules Applied to Energy Management

    DEFF Research Database (Denmark)

    Rossello Busquet, Ana; Brewka, Lukasz Jerzy; Soler, José

    2011-01-01

    Energy consumption has increased considerably in the last years. How to reduce and make energy consumption more efficient in home environments has become of great interest for researchers. This could be achieved by introducing a Home Energy Management System (HEMS) into user residences. This system...... might allow the user to control the devices in the home network through an interface and apply energy management strategies to reduce and optimize their consumption. Furthermore, the number of devices and appliances found in users residences is increasing and these devices are usually manufactured...

  10. Seamless Data Services for Real Time Communication in a Heterogeneous Networks using Network Tracking and Management

    OpenAIRE

    T, Adiline Macriga.; Kumar, Dr. P. Anandha

    2010-01-01

    Heterogeneous Networks is the integration of all existing networks under a single environment with an understanding between the functional operations and also includes the ability to make use of multiple broadband transport technologies and to support generalized mobility. It is a challenging feature for Heterogeneous networks to integrate several IP-based access technologies in a seamless way. The focus of this paper is on the requirements of a mobility management scheme for multimedia real-...

  11. The Optimization Based Dynamic and Cyclic Working Strategies for Rechargeable Wireless Sensor Networks with Multiple Base Stations and Wireless Energy Transfer Devices

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-01-01

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating “bottleneck” sensor nodes is also developed in this paper. PMID:25785305

  12. The optimization based dynamic and cyclic working strategies for rechargeable wireless sensor networks with multiple base stations and wireless energy transfer devices.

    Science.gov (United States)

    Ding, Xu; Han, Jianghong; Shi, Lei

    2015-03-16

    In this paper, the optimal working schemes for wireless sensor networks with multiple base stations and wireless energy transfer devices are proposed. The wireless energy transfer devices also work as data gatherers while charging sensor nodes. The wireless sensor network is firstly divided into sub networks according to the concept of Voronoi diagram. Then, the entire energy replenishing procedure is split into the pre-normal and normal energy replenishing stages. With the objective of maximizing the sojourn time ratio of the wireless energy transfer device, a continuous time optimization problem for the normal energy replenishing cycle is formed according to constraints with which sensor nodes and wireless energy transfer devices should comply. Later on, the continuous time optimization problem is reshaped into a discrete multi-phased optimization problem, which yields the identical optimality. After linearizing it, we obtain a linear programming problem that can be solved efficiently. The working strategies of both sensor nodes and wireless energy transfer devices in the pre-normal replenishing stage are also discussed in this paper. The intensive simulations exhibit the dynamic and cyclic working schemes for the entire energy replenishing procedure. Additionally, a way of eliminating "bottleneck" sensor nodes is also developed in this paper.

  13. Development of a prototype solid state fault current limiting and interrupting device for low voltage distribution networks.

    OpenAIRE

    Ahmed, M.; Putrus, G. A.; Ran, L.; Penlington, R.

    2006-01-01

    This paper describes the development of a solid-state Fault Current Limiting and Interrupting Device (FCLID) suitable for low voltage distribution networks. The main components of the FCLID are a bidirectional semiconductor switch that can disrupt the short-circuit current, and a voltage clamping element that helps in controlling the current and absorbing the inductive energy stored in the network during current interruption. Using a hysteresis type control algorithm, the short-circuit curren...

  14. Virtualized Networks and Virtualized Optical Line Terminal (vOLT)

    Science.gov (United States)

    Ma, Jonathan; Israel, Stephen

    2017-03-01

    The success of the Internet and the proliferation of the Internet of Things (IoT) devices is forcing telecommunications carriers to re-architecture a central office as a datacenter (CORD) so as to bring the datacenter economics and cloud agility to a central office (CO). The Open Network Operating System (ONOS) is the first open-source software-defined network (SDN) operating system which is capable of managing and controlling network, computing, and storage resources to support CORD infrastructure and network virtualization. The virtualized Optical Line Termination (vOLT) is one of the key components in such virtualized networks.

  15. Supraglottic devices as alternative equipment to airway management in state of sudden cardiac arrest

    Directory of Open Access Journals (Sweden)

    Rafał Czyż

    2017-08-01

    All of supraglottic devices are characterized by easiness in applying without experience in use them. Additionally time need to airway management in use of them is many times shorter than with traditional endotracheal intubation. Fundamental defect in these devices is a fact that they don’t provide total safety before aspiration for chime. Current literature shows us that supraglottic airway devices are perfect alternative to endotracheal intubation.

  16. Load management in electrical networks. Objectives, methods, prospects

    International Nuclear Information System (INIS)

    Gabioud, D.

    2008-01-01

    This illustrated article takes up the problems related to the variation of the load in electricity networks. How to handle the peak load? Different solutions in the energy demand management are discussed. Method based on the price, method based on the reduction of the load by electric utilities. Information systems are presented which gives the consumer the needed data to participate in the local load management.

  17. Agent-based Personal Network (PN) service architecture

    DEFF Research Database (Denmark)

    Jiang, Bo; Olesen, Henning

    2004-01-01

    In this paper we proposte a new concept for a centralized agent system as the solution for the PN service architecture, which aims to efficiently control and manage the PN resources and enable the PN based services to run seamlessly over different networks and devices. The working principle...

  18. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Science.gov (United States)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  19. Software Defined Networks in Wireless Sensor Architectures

    Directory of Open Access Journals (Sweden)

    Jesús Antonio Puente Fernández

    2018-03-01

    Full Text Available Nowadays, different protocols coexist in Internet that provides services to users. Unfortunately, control decisions and distributed management make it hard to control networks. These problems result in an inefficient and unpredictable network behaviour. Software Defined Networks (SDN is a new concept of network architecture. It intends to be more flexible and to simplify the management in networks with respect to traditional architectures. Each of these aspects are possible because of the separation of control plane (controller and data plane (switches in network devices. OpenFlow is the most common protocol for SDN networks that provides the communication between control and data planes. Moreover, the advantage of decoupling control and data planes enables a quick evolution of protocols and also its deployment without replacing data plane switches. In this survey, we review the SDN technology and the OpenFlow protocol and their related works. Specifically, we describe some technologies as Wireless Sensor Networks and Wireless Cellular Networks and how SDN can be included within them in order to solve their challenges. We classify different solutions for each technology attending to the problem that is being fixed.

  20. Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Neeli R.

    2007-01-01

    Abstract — Personal Networks (PNs) have been focused on in order to support the user’s business and private activities without jeopardizing privacy and security of the users and their data. In such a network, it is necessary to produce a proper key agreement method according to the feature...... of the network. One of the features of the network is that the personal devices have deferent capabilities such as computational ability, memory size, transmission power, processing speed and implementation cost. Therefore an adaptive security mechanism should be contrived for such a network of various device...... combinations based on user’s location and device’s capability. The paper proposes new adaptive security architecture with three levels of asymmetric key agreement scheme by using context-aware security manager (CASM) based on elliptic curve cryptosystem (EC-MQV)....

  1. Towards an autonomous self-tuning vibration energy harvesting device for wireless sensor network applications

    International Nuclear Information System (INIS)

    Challa, Vinod R; Prasad, M G; Fisher, Frank T

    2011-01-01

    Future deployment of wireless sensor networks will ultimately require a self-sustainable local power source for each sensor, and vibration energy harvesting is a promising approach for such applications. A requirement for efficient vibration energy harvesting is to match the device and source frequencies. While techniques to tune the resonance frequency of an energy harvesting device have recently been described, in many applications optimization of such systems will require the energy harvesting device to be able to autonomously tune its resonance frequency. In this work a vibration energy harvesting device with autonomous resonance frequency tunability utilizing a magnetic stiffness technique is presented. Here a piezoelectric cantilever beam array is employed with magnets attached to the free ends of cantilever beams to enable magnetic force resonance frequency tuning. The device is successfully tuned from − 27% to + 22% of its untuned resonance frequency while outputting a peak power of approximately 1 mW. Since the magnetic force tuning technique is semi-active, energy is only consumed during the tuning process. The developed prototype consumed maximum energies of 3.3 and 3.9 J to tune to the farthest source frequencies with respect to the untuned resonance frequency of the device. The time necessary for this prototype device to harvest the energy expended during its most energy-intensive (largest resonant frequency adjustment) tuning operation is 88 min in a low amplitude 0.1g vibration environment, which could be further optimized using higher efficiency piezoelectric materials and system components

  2. The Marketing Plan: An Integrative Device for Teaching Marketing Management.

    Science.gov (United States)

    Berdine, W. R.; Petersen, James C.

    1980-01-01

    The importance of the marketing plan is stressed as an integrative device for teaching marketing management, and a structure is presented to assist students in designing a marketing plan. Components of this plan include marketing objectives, targeting market and buying motives, external environment and competition, product, price, and promotion.…

  3. Impact of stand-by energy losses in electronic devices on smart network performance

    OpenAIRE

    Mandić-Lukić Jasmina S.; Pantović Vladan S.; Vasiljević Željko S.

    2012-01-01

    Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic dev...

  4. Anesthetic management of Amplatzer atrial septal defect closure device embolization to right ventricular outflow tract

    Directory of Open Access Journals (Sweden)

    S Das

    2016-01-01

    Full Text Available Percutaneous device closure of atrial septal defect (ASD is an alternative treatment to surgery with advantages of avoidance of surgery, short procedure time, early discharge from hospital, and lower rates of complications. However, percutaneous device closure is associated with infrequent life-threatening complications such as device embolization. We report a case device embolization of the ASD occlude device into right ventricular outflow tract resulting progressive hypoxia. The role of anesthesiologist as a team leader in managing such emergency is discussed.

  5. Performance Evaluation of Distributed Mobility Management Protocols: Limitations and Solutions for Future Mobile Networks

    Directory of Open Access Journals (Sweden)

    J. Carmona-Murillo

    2017-01-01

    Full Text Available Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM solutions. Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting applications, the DMM approaches incur high signaling cost and long handover latency.

  6. Load balancing in 5G Networks

    Directory of Open Access Journals (Sweden)

    Tsirakis Christos

    2017-01-01

    Full Text Available The expected huge increase of mobile devices and user data demand by 2020 will stress the current mobile network in an unprecedented way. The future mobile networks must meet several strong requirements regarding the data rate, latency, quality of service and experience, mobility, spectrum and energy efficiency. Therefore, efforts for more efficient mobile network solutions have been recently initiated. To this direction, load balancing has attracted much attention as a promising solution for higher resource utilization, improved system performance and decreased operational cost. It is an effective method for balancing the traffic and alleviating the congestion among heterogeneous networks in the upcoming 5G networks. In this paper, we focus on an offloading scenario for load balancing among LTE and Wi-Fi networks. Additionally, network graphs methodology and its abstracted parameters are investigated in order to better manage wireless resource allocation among multiple connections. The COHERENT architectural framework, which consists of two main control components, makes use of such abstracted network graphs for controlling or managing various tasks such as traffic steering, load balancing, spectrum sharing and RAN sharing. As a result, the COHERENT project eventually develops a unified programmable control framework used to efficiently coordinate the underlying heterogeneous mobile networks as a whole.

  7. Electromechanically Actuated Multifunctional Wireless Auxetic Device for Wound Management.

    Science.gov (United States)

    Mir, Mariam; Ansari, Umar; Ali, Murtaza Najabat; Iftikhar, Muhammad Hassan Ul; Qayyum, Faisal

    2017-01-01

    The design and fabrication of a wound healing device for chronic wounds, with multiple functions for controlled drug delivery and exudate removal, has been described in this paper. The structural features have been machined and modified through laser cutting in a biocompatible polymer cast. Miniaturized versions of electronically actuated (lead-screw and pulley) mechanisms are used for the specific purpose of controlled drug delivery. These mechanisms have been studied and tested, being controlled through a microcontroller setup. An auxetic polymeric barrier membrane has been used for restricting the drug quantities administered. Drug delivery mechanisms are powered wirelessly, through an external, active RF component; this communicates with a passive component that is buried inside the wound healing device. The exudate removal efficiency of the device has been assessed through several simple tests using simulated wound exudate. It has been found that reasonably precise quantities of drug dosages to be administered to the wound site can be controlled through both drug delivery mechanisms; however, the lead-screw mechanism provides a better control of auxetic barrier membrane actuation and hence controlled drug delivery. We propose that this device can have potential clinical significance in controlled drug delivery and exudate removal in the management of chronic wounds.

  8. Energetic Performance of Service-oriented Multi-radio Networks: Issues and Perspectives

    OpenAIRE

    Caporuscio , Mauro; Charlet , Damien; Issarny , Valérie; Navarra , Alfredo

    2006-01-01

    Wireless devices now hold multiple radio interfaces, allowing to switch from one network to another according to required connectivity and related quality. Still, the selection of the best radio interface for a specific connection is under the responsibility of the end-user in most cases. Integrated multi-radio network management so as to improve the overall performance of the network(s) has led to a number of research efforts over the last few years. However, several challenges remain due to...

  9. A Framework for Joint Optical-Wireless Resource Management in Multi-RAT, Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann

    2013-01-01

    Mobile networks are constantly evolving: new Radio Access Technologies (RATs) are being introduced, and backhaul architectures like Cloud-RAN (C-RAN) and distributed base stations are being proposed. Furthermore, small cells are being deployed to enhance network capacity. The end-users wish...... to be always connected to a high-quality service (high bit rates, low latency), thus causing a very complex network control task from an operator’s point of view. We thus propose a framework allowing joint overall network resource management. This scheme covers different types of network heterogeneity (multi......-RAT, multi-layer, multi-architecture) by introducing a novel, hierarchical approach to network resource management. Self-Organizing Networks (SON) and cognitive network behaviors are covered as well as more traditional mobile network features. The framework is applicable to all phases of network operation...

  10. Managing Trust in Online Social Networks

    Science.gov (United States)

    Bhuiyan, Touhid; Josang, Audun; Xu, Yue

    In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations

  11. Multidimensional Risk Management for Underground Electricity Networks

    Directory of Open Access Journals (Sweden)

    Garcez Thalles V.

    2014-08-01

    Full Text Available In the paper we consider an electricity provider company that makes decision on allocating resources on electric network maintenance. The investments decrease malfunction rate of network nodes. An accidental event (explosion, fire, etc. or a malfunctioning on underground system can have various consequences and in different perspectives, such as deaths and injuries of pedestrians, fires in nearby locations, disturbances in the flow of vehicular traffic, loss to the company image, operating and financial losses, etc. For this reason it is necessary to apply an approach of the risk management that considers the multidimensional view of the consequences. Furthermore an analysis of decision making should consider network dependencies between the nodes of the electricity distribution system. In the paper we propose the use of the simulation to assess the network effects (such as the increase of the probability of other accidental event and the occurrence of blackouts of the dependent nodes in the multidimensional risk assessment in electricity grid. The analyzed effects include node overloading due to malfunction of adjacent nodes and blackouts that take place where there is temporarily no path in the grid between the power plant and a node. The simulation results show that network effects have crucial role for decisions in the network maintenance – outcomes of decisions to repair a particular node in the network can have significant influence on performance of other nodes. However, those dependencies are non-linear. The effects of network connectivity (number of connections between nodes on its multidimensional performance assessment depend heavily on the overloading effect level. The simulation results do not depend on network type structure (random or small world – however simulation outcomes for random networks have shown higher variance compared to small-world networks.

  12. Possibilities of radiation sterilization for re-usage of medical devices in the medical management

    International Nuclear Information System (INIS)

    Tabei, Masae; Kudo, Hisaaki; Katsumura, Yosuke

    2004-01-01

    The rule for re-usage of medical single-use devices was established in US in 2000 based on the concept of Managed Care (total management of medicare on cost, quality and patients' satisfaction) and 20-30% of those devices are re-used at present. The re-usage is conducted in not only US but also Canada, Denmark, UK, India, China etc. Standing on the viewpoint, this paper described and discussed the possibility of re-usage of the single-use devices now prohibited in Japan, possible re-sterilization, possible re-usage of hollow fiber-type hemodialyzer following γ-ray sterilization with consideration for D-values against bacteria and viruses, cost estimation of electron beam sterilization for re-usage, and radiation sterilization of waste water and plastic materials. Radiation sterilization for re-usage of medical devices was concluded possible if their materials and records for their usage processes are proper, and should be conducted in a large scale after sufficient examinations by industries/government/academia. (N.I.)

  13. Smart Devices for Older Adults Managing Chronic Disease: A Scoping Review.

    Science.gov (United States)

    Kim, Ben Yb; Lee, Joon

    2017-05-23

    The emergence of smartphones and tablets featuring vastly advancing functionalities (eg, sensors, computing power, interactivity) has transformed the way mHealth interventions support chronic disease management for older adults. Baby boomers have begun to widely adopt smart devices and have expressed their desire to incorporate technologies into their chronic care. Although smart devices are actively used in research, little is known about the extent, characteristics, and range of smart device-based interventions. We conducted a scoping review to (1) understand the nature, extent, and range of smart device-based research activities, (2) identify the limitations of the current research and knowledge gap, and (3) recommend future research directions. We used the Arksey and O'Malley framework to conduct a scoping review. We identified relevant studies from MEDLINE, Embase, CINAHL, and Web of Science databases using search terms related to mobile health, chronic disease, and older adults. Selected studies used smart devices, sampled older adults, and were published in 2010 or after. The exclusion criteria were sole reliance on text messaging (short message service, SMS) or interactive voice response, validation of an electronic version of a questionnaire, postoperative monitoring, and evaluation of usability. We reviewed references. We charted quantitative data and analyzed qualitative studies using thematic synthesis. To collate and summarize the data, we used the chronic care model. A total of 51 articles met the eligibility criteria. Research activity increased steeply in 2014 (17/51, 33%) and preexperimental design predominated (16/50, 32%). Diabetes (16/46, 35%) and heart failure management (9/46, 20%) were most frequently studied. We identified diversity and heterogeneity in the collection of biometrics and patient-reported outcome measures within and between chronic diseases. Across studies, we found 8 self-management supporting strategies and 4 distinct

  14. Using Social Network Analysis to Examine the Effect of Care Management Structure on Chronic Disease Management Communication Within Primary Care.

    Science.gov (United States)

    Holtrop, Jodi Summers; Ruland, Sandra; Diaz, Stephanie; Morrato, Elaine H; Jones, Eric

    2018-05-01

    Care management and care managers are becoming increasingly prevalent in primary care medical practice as a means of improving population health and reducing unnecessary care. Care managers are often involved in chronic disease management and associated transitional care. In this study, we examined the communication regarding chronic disease care within 24 primary care practices in Michigan and Colorado. We sought to answer the following questions: Do care managers play a key role in chronic disease management in the practice? Does the prominence of the care manager's connectivity within the practice's communication network vary by the type of care management structure implemented? Individual written surveys were given to all practice members in the participating practices. Survey questions assessed demographics as well as practice culture, quality improvement, care management activities, and communication regarding chronic disease care. Using social network analysis and other statistical methods, we analyzed the communication dynamics related to chronic disease care for each practice. The structure of chronic disease communication varies greatly from practice to practice. Care managers who were embedded in the practice or co-located were more likely to be in the core of the communication network than were off-site care managers. These care managers also had higher in-degree centrality, indicating that they acted as a hub for communication with team members in many other roles. Social network analysis provided a useful means of examining chronic disease communication in practice, and highlighted the central role of care managers in this communication when their role structure supported such communication. Structuring care managers as embedded team members within the practice has important implications for their role in chronic disease communication within primary care.

  15. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  16. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  17. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  18. Network Physics - the only company to provide physics-based network management - secures additional funding and new executives

    CERN Multimedia

    2003-01-01

    "Network Physics, the only provider of physics-based network management products, today announced an additional venture round of $6 million in funding, as well as the addition of David Jones as president and CEO and Tom Dunn as vice president of sales and business development" (1 page).

  19. 网络管理中的建模技术%Modeling Technologies in Network Management

    Institute of Scientific and Technical Information of China (English)

    张鹏; 李钢; 李增智

    2000-01-01

    Modeling is an effective approach during science research or engineering development. Based on the brief introduction to basic structure of network management systems ,this paper discusses the application scope of modeling method. Subsequently, related to the development work in the project of HiTMN, a local telephone network management system, two kinds of model are built for telephone switching network. They are mathematical model and object-oriented model, built using mathematical modeling method and object modeling technology respectively. Finally ,the importance of using modeling technologies in network management is emphasized.

  20. Apple IOS Devices for Network Administrators

    OpenAIRE

    Mirzoev, Timur; Gingo, Gerard; Stawchansky, Mike; White, Tracy

    2014-01-01

    As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform significant amounts of their daily work on tablet devices, some even abandoning the ubiquitous laptop or desktop entirely. Operating exclusively from a tablet device, specifically Apple I...

  1. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    Directory of Open Access Journals (Sweden)

    Seung-Man Chun

    2017-01-01

    Full Text Available Under unreliable constrained wireless networks for Internet of Things (IoT environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6 and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF Constrained Application Protocol (CoAP retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  2. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    Science.gov (United States)

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  3. Hierarchical Brokering with Feedback Control Framework in Mobile Device-Centric Clouds

    Directory of Open Access Journals (Sweden)

    Chao-Lieh Chen

    2016-01-01

    Full Text Available We propose a hierarchical brokering architecture (HiBA and Mobile Multicloud Networking (MMCN feedback control framework for mobile device-centric cloud (MDC2 computing. Exploiting the MMCN framework and RESTful web-based interconnection, each tier broker probes resource state of its federation for control and management. Real-time and seamless services were developed. Case studies including intrafederation energy-aware balancing based on fuzzy feedback control and higher tier load balancing are further demonstrated to show how HiBA with MMCN relieves the embedding of algorithms when developing services. Theoretical performance model and real-world experiments both show that an MDC2 based on HiBA features better quality in terms of resource availability and network latency if it federates devices with enough resources distributed in lower tier hierarchy. The proposed HiBA realizes a development platform for MDC2 computing which is a feasible solution to User-Centric Networks (UCNs.

  4. Active local distribution network management for embedded generation

    Energy Technology Data Exchange (ETDEWEB)

    White, S.

    2005-07-01

    With the newer electric power transmission networks, there is a requirement for power to flow in two different directions and this calls for more intelligent forms of management. To satisfy these demands, GENEVAC has produced a controller that aims to increase the energy that power plants can feed to the distribution networks. The software and hardware have undergone trials at two 33/11 kV substations in England. The hardware was designed to monitor voltage, current and phase angle at various points in the network. The software estimates the value of the voltages at every node in the network. The results showed good correlation between estimated and measured voltages: other findings are reported. Recommendations for further work are made including development of a full commercial system. The study was conducted by Econnect Ltd under contract to the DTI.

  5. A Holistic Management Architecture for Large-Scale Adaptive Networks

    National Research Council Canada - National Science Library

    Clement, Michael R

    2007-01-01

    This thesis extends the traditional notion of network management as an indicator of resource availability and utilization into a systemic model of resource requirements, capabilities, and adaptable...

  6. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  7. 78 FR 14359 - Verizon Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet...

    Science.gov (United States)

    2013-03-05

    ... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And... Management, Voice Over Internet Protocol, Small And Medium Business, San Antonio, TX; Amended Certification... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...

  8. Telecommunications energy and greenhouse gas emissions management for future network growth

    International Nuclear Information System (INIS)

    Chan, Chien Aun; Gygax, André F.; Leckie, Christopher; Wong, Elaine; Nirmalathas, Ampalavanapillai; Hinton, Kerry

    2016-01-01

    Highlights: • Model to evaluate key interdependencies of a fast growing telecommunications network. • Network growth analysis using real data and Monte Carlo simulation. • Importance of both operational and embodied energy efficiency improvements. • Embodied energy expected to dominate in the future under current energy efficiency trends. • Carbon footprint and energy management through optimum network replacement cycle. - Abstract: A key aspect of greener network deployment is how to achieve sustainable growth of a telecommunications network, both in terms of operational and embodied energy. Hence, in this paper we investigate how the overall energy consumption and greenhouse gas emissions of a fast growing telecommunications network can be minimized. Due to the complexities in modeling the embodied energy of networks, this aspect of energy consumption has received limited attention by network operators. Here, we present the first model to evaluate the interdependencies of the four main contributing factors in managing the sustainable growth of a telecommunications network: (i) the network’s operational energy consumption; (ii) the embodied energy of network equipment; (iii) network traffic growth; and (iv) the expected energy efficiency improvements in both the operational and embodied phases. Using Monte Carlo techniques with real network data, our results demonstrate that under the current trends in overall energy efficiency improvements the network embodied energy will account for over 40% of the total network energy in 2025 compared to 20% in 2015. Further, we find that the optimum equipment replacement cycle, which will result in the lowest total network life cycle energy, is directly dependent on the technological progress in energy efficiency improvements of both operational and embodied phases. Our model and analysis highlight the need for a comprehensive approach to better understand the interactions between network growth, technological

  9. Network and Service Monitoring in Heterogeneous Home Networks

    NARCIS (Netherlands)

    Delphinanto, A.

    2012-01-01

    Home networks are becoming dynamic and technologically heterogeneous. They consist of an increasing number of devices which offer several functionalities and can be used for many different services. In the home, these devices are interconnected using a mixture of networking technologies (for

  10. Distributed Optimization based Dynamic Tariff for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei; Zhao, Haoran

    2017-01-01

    This paper proposes a distributed optimization based dynamic tariff (DDT) method for congestion management in distribution networks with high penetration of electric vehicles (EVs) and heat pumps (HPs). The DDT method employs a decomposition based optimization method to have aggregators explicitly...... is able to minimize the overall energy consumption cost and line loss cost, which is different from previous decomposition-based methods such as multiagent system methods. In addition, a reconditioning method and an integral controller are introduced to improve convergence of the distributed optimization...... where challenges arise due to multiple congestion points, multiple types of flexible demands and network constraints. The case studies demonstrate the efficacy of the DDT method for congestion management in distribution networks....

  11. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Directory of Open Access Journals (Sweden)

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  12. ISO 13485 a complete guide to quality management in the medical device industry

    CERN Document Server

    Abuhav, Itay

    2011-01-01

    Although complex and lengthy, the process of certification for the ISO 13485 can be easily mastered using the simple method outlined in ISO 13485: A Complete Guide to Quality Management in the Medical Device Industry. Written by an experienced industry professional, this practical book provides a complete guide to the ISO 13485 Standard certification for medical device manufacturing. Filled with examples drawn from the author's experience and spanning different sectors and fields of the medical device industry, the book translates the extra ordinary requirements and objectives of the standard

  13. Beyond the edge: Linking agricultural landscapes, stream networks, and best management practices

    Science.gov (United States)

    Kreiling, Rebecca M.; Thoms, Martin C.; Richardson, William B.

    2018-01-01

    Despite much research and investment into understanding and managing nutrients across agricultural landscapes, nutrient runoff to freshwater ecosystems is still a major concern. We argue there is currently a disconnect between the management of watershed surfaces (agricultural landscape) and river networks (riverine landscape). These landscapes are commonly managed separately, but there is limited cohesiveness between agricultural landscape-focused research and river science, despite similar end goals. Interdisciplinary research into stream networks that drain agricultural landscapes is expanding but is fraught with problems. Conceptual frameworks are useful tools to order phenomena, reveal patterns and processes, and in interdisciplinary river science, enable the joining of multiple areas of understanding into a single conceptual–empirical structure. We present a framework for the interdisciplinary study and management of agricultural and riverine landscapes. The framework includes components of an ecosystems approach to the study of catchment–stream networks, resilience thinking, and strategic adaptive management. Application of the framework is illustrated through a study of the Fox Basin in Wisconsin, USA. To fully realize the goal of nutrient reduction in the basin, we suggest that greater emphasis is needed on where best management practices (BMPs) are used within the spatial context of the combined watershed–stream network system, including BMPs within the river channel. Targeted placement of BMPs throughout the riverine landscape would increase the overall buffering capacity of the system to nutrient runoff and thus its resilience to current and future disturbances.

  14. Electronic devices and circuits

    CERN Document Server

    Pridham, Gordon John

    1972-01-01

    Electronic Devices and Circuits, Volume 3 provides a comprehensive account on electronic devices and circuits and includes introductory network theory and physics. The physics of semiconductor devices is described, along with field effect transistors, small-signal equivalent circuits of bipolar transistors, and integrated circuits. Linear and non-linear circuits as well as logic circuits are also considered. This volume is comprised of 12 chapters and begins with an analysis of the use of Laplace transforms for analysis of filter networks, followed by a discussion on the physical properties of

  15. Interconnection Structures, Management and Routing Challenges in Cloud-Service Data Center Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Ahmad Nahar Quttoum

    2018-01-01

    Full Text Available Today’s data center networks employ expensive networking equipments in associated structures that were not designed to meet the increasing requirements of the current large-scale data center services. Limitations that vary between reliability, resource utilization, and high costs are challenging. The era of cloud computing represents a promise to enable large-scale data centers. Computing platforms of such cloud service data centers consist of large number of commodity low-price servers that, with a theme of virtualization on top, can meet the performance of the expensive high-level servers at only a fraction of the price. Recently, the research in data center networks started to evolve rapidly. This opened the path for addressing many of its design and management challenges, these like scalability, reliability, bandwidth capacities, virtual machines’ migration, and cost. Bandwidth resource fragmentation limits the network agility, and leads to low utilization rates, not only for the bandwidth resources, but also for the servers that run the applications. With Traffic Engineering methods, managers of such networks can adapt for rapid changes in the network traffic among their servers, this can help to provide better resource utilization and lower costs. The market is going through exciting changes, and the need to run demanding-scale services drives the work toward cloud networks. These networks that are enabled by the notation of autonomic management, and the availability of commodity low-price network equipments. This work provides the readers with a survey that presents the management challenges, design and operational constraints of the cloud-service data center networks

  16. Satellite ATM Networks: Architectures and Guidelines Developed

    Science.gov (United States)

    vonDeak, Thomas C.; Yegendu, Ferit

    1999-01-01

    An important element of satellite-supported asynchronous transfer mode (ATM) networking will involve support for the routing and rerouting of active connections. Work published under the auspices of the Telecommunications Industry Association (http://www.tiaonline.org), describes basic architectures and routing protocol issues for satellite ATM (SATATM) networks. The architectures and issues identified will serve as a basis for further development of technical specifications for these SATATM networks. Three ATM network architectures for bent pipe satellites and three ATM network architectures for satellites with onboard ATM switches were developed. The architectures differ from one another in terms of required level of mobility, supported data rates, supported terrestrial interfaces, and onboard processing and switching requirements. The documentation addresses low-, middle-, and geosynchronous-Earth-orbit satellite configurations. The satellite environment may require real-time routing to support the mobility of end devices and nodes of the ATM network itself. This requires the network to be able to reroute active circuits in real time. In addition to supporting mobility, rerouting can also be used to (1) optimize network routing, (2) respond to changing quality-of-service requirements, and (3) provide a fault tolerance mechanism. Traffic management and control functions are necessary in ATM to ensure that the quality-of-service requirements associated with each connection are not violated and also to provide flow and congestion control functions. Functions related to traffic management were identified and described. Most of these traffic management functions will be supported by on-ground ATM switches, but in a hybrid terrestrial-satellite ATM network, some of the traffic management functions may have to be supported by the onboard satellite ATM switch. Future work is planned to examine the tradeoffs of placing traffic management functions onboard a satellite as

  17. Using Personal Portable Devices as Learning Tools in the English Class

    Directory of Open Access Journals (Sweden)

    Luz Edith Herrera Díaz

    2014-10-01

    Full Text Available A group of university students used a variety of personal portable devices (cellphones, tablets, laptops, and netbooks which distracted them in English class. This qualitative action research aimed to implement activities entailing the use of such devices and to learn their impact on students’ learning and the use of English in class. Thus, a series of applications was used to promote the use of these devices for the benefit of the English as a Foreign Language class. These applications included a learning management system that resembled a social network, a live interaction application, and an online dictionary. It was found that students were able to productively use these devices as learning tools plus they expressed comfort and interest in using them.

  18. Self-Organized Governance Networks for Ecosystem Management: Who Is Accountable?

    Directory of Open Access Journals (Sweden)

    Thomas Hahn

    2011-06-01

    Full Text Available Governance networks play an increasingly important role in ecosystem management. The collaboration within these governance networks can be formalized or informal, top-down or bottom-up, and designed or self-organized. Informal self-organized governance networks may increase legitimacy if a variety of stakeholders are involved, but at the same time, accountability becomes blurred when decisions are taken. Basically, democratic accountability refers to ways in which citizens can control their government and the mechanisms for doing so. Scholars in ecosystem management are generally positive to policy/governance networks and emphasize its potential for enhancing social learning, adaptability, and resilience in social-ecological systems. Political scientists, on the other hand, have emphasized the risk that the public interest may be threatened by governance networks. I describe and analyze the multilevel governance network of Kristianstads Vattenrike Biosphere Reserve (KVBR in Southern Sweden, with the aim of understanding whether and how accountability is secured in the governance network and its relation to representative democracy. The analysis suggests that the governance network of KVBR complements representative democracy. It deals mainly with "low politics"; the learning and policy directions are developed in the governance network, but the decisions are embedded in representative democratic structures. Because several organizations and agencies co-own the process and are committed to the outcomes, there is a shared or extended accountability. A recent large investment in KVBR caused a major crisis at the municipal level, fueled by the financial crisis. The higher levels of the governance network, however, served as a social memory and enhanced resilience of the present biosphere development trajectory. For self-organized networks, legitimacy is the bridge between adaptability and accountability; accountability is secured as long as the

  19. A Multi-Agent System Architecture for Sensor Networks

    Directory of Open Access Journals (Sweden)

    María Guijarro

    2009-12-01

    Full Text Available The design of the control systems for sensor networks presents important challenges. Besides the traditional problems about how to process the sensor data to obtain the target information, engineers need to consider additional aspects such as the heterogeneity and high number of sensors, and the flexibility of these networks regarding topologies and the sensors in them. Although there are partial approaches for resolving these issues, their integration relies on ad hoc solutions requiring important development efforts. In order to provide an effective approach for this integration, this paper proposes an architecture based on the multi-agent system paradigm with a clear separation of concerns. The architecture considers sensors as devices used by an upper layer of manager agents. These agents are able to communicate and negotiate services to achieve the required functionality. Activities are organized according to roles related with the different aspects to integrate, mainly sensor management, data processing, communication and adaptation to changes in the available devices and their capabilities. This organization largely isolates and decouples the data management from the changing network, while encouraging reuse of solutions. The use of the architecture is facilitated by a specific modelling language developed through metamodelling. A case study concerning a generic distributed system for fire fighting illustrates the approach and the comparison with related work.

  20. Enhancing Lifelong Competence Development and Management Systems with Social Network-based Concepts and Tools

    NARCIS (Netherlands)

    Cheak, Alicia; Angehrn, Albert; Sloep, Peter

    2006-01-01

    This paper addresses the challenge of enhancing the social dimension of lifelong Competence Development and Management Systems with social network-based concepts and tools. Our premise is that through a combination of social network visualization tools, simulations, stimulus agents and management