WorldWideScience

Sample records for network device management

  1. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  2. Resource Management for Device-to-Device Communications in Heterogeneous Networks Using Stackelberg Game

    Directory of Open Access Journals (Sweden)

    Yinuo He

    2014-01-01

    Full Text Available Device-to-device (D2D communications and femtocell systems can bring significant benefits to users’ throughput. However, the complicated three-tier interference among macrocell, femtocell, and D2D systems is a challenging issue in heterogeneous networks. As D2D user equipment (UE can cause interference to cellular UE, scheduling and allocation of channel resources and power of D2D communication need elaborate coordination. In this paper, we propose a joint scheduling and resource allocation scheme to improve the performance of D2D communication. We take UE rate and UE fairness into account by performing interference management. First, we construct a Stackelberg game framework in which we group a macrocellular UE, a femtocellular UE, and a D2D UE to form a two-leader one-follower pair. The cellular UE are leaders, and D2D UE is the follower who buys channel resources from the leaders. We analyze the equilibrium of the game and obtain solutions to the equilibrium. Second, we propose an algorithm for joint scheduling of D2D pairs based on their utility. Finally, we perform computer simulations to study the performance of the proposed scheme.

  3. Mobile Device Management in the DOD Enterprise Network: Factors for Risk Management, Integration, and It Acquisition

    Science.gov (United States)

    2013-03-01

    Administration NFC Near Field Communications NIST National Institute of Standards and Technology NPRST Navy Personnel Research, Studies, and Technology ...information technology (IT) system acquisition process to acquire a mobile device management (MDM) toolset to mitigate information assurance (IA) risks...method study to understand the concerns of federal information technology professionals who are knowledgeable on MDM and the acquisition

  4. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  5. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  6. Method and system for mesh network embedded devices

    Science.gov (United States)

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  7. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  8. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  9. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies....

  10. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  12. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  13. Growing pains: medical device interoperability. Regulators and new standards are helping to bring about the convergence of medical devices and information management systems on IT networks.

    Science.gov (United States)

    Degaspari, John

    2011-07-01

    Both provider organizations and medical device vendors have made significant, if slow-going, progress over the last several years to network their digitally-enabled medical devices. Recent strides in both the regulatory and standards arenas have provided renewed impetus on the part of both stakeholder groups to bring more interoperability to disparate medical devices, resulting in better security and quality of patient data.

  14. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Directory of Open Access Journals (Sweden)

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  15. Space Network Devices Developed

    Science.gov (United States)

    Jones, Robert E.

    2004-01-01

    The NASA Glenn Research Center through a contract with Spectrum Astro, Inc., has been developing space network hardware as an enabling technology using open systems interconnect (OSI) standards for space-based communications applications. The OSI standard is a well-recognized layered reference model that specifies how data should be sent node to node in a communications network. Because of this research and technology development, a space-qualifiable Ethernet-based network interface card (similar to the type found in a networked personal computer) and the associated four-port hub were designed and developed to flight specifications. During this research and development, there also have been many lessons learned for determining approaches for migrating existing spacecraft architectures to an OSI-network-based platform. Industry has recognized the benefits of targeting hardware developed around OSI standards such as Transmission Control Protocol/Internet Protocol (TCP/IP) or similar protocols for use in future generations of space communication systems. Some of these tangible benefits include overall reductions in mission schedule and cost and in system complexity. This development also brings us a step closer to the realization of a principal investigator on a terrestrial Internet site being able to interact with space platform assets in near real time. To develop this hardware, Spectrum Astro first conducted a technology analysis of alternatives study. For this analysis, they looked at the features of three protocol specifications: Ethernet (IEEE 802.3), Firewire (IEEE 1394), and Spacewire (IEEE 1355). A thorough analysis was performed on the basis of criteria such as current protocol performance and suitability for future space applications. Spectrum Astro also projected future influences such as cost, hardware and software availability, throughput performance, and integration procedures for current and transitive space architectures. After a thorough analysis

  16. Risk management communication system between a local government and residents using several network systems and terminal devices

    Science.gov (United States)

    Ohyama, Takashi; Enomoto, Hiroyuki; Takei, Yuichiro; Maeda, Yuji

    2009-05-01

    Most of Japan's local governments utilize municipal disaster-management radio communications systems to communicate information on disasters or terrorism to residents. The national government is progressing in efforts toward digitalization by local governments of these systems, but only a small number (approx. 10%) have introduced such equipment due to its requiring large amounts of investment. On the other hand, many local governments are moving forward in installation of optical fiber networks for the purpose of eliminating the "digital divide." We herein propose a communication system as an alternative or supplement to municipal disaster-management radio communications systems, which utilizes municipal optical fiber networks, the internet and similar networks and terminals. The system utilizes the multiple existing networks and is capable of instantly distributing to all residents, and controlling, risk management information. We describe the system overview and the field trials conducted with a local government using this system.

  17. Resource management for device-to-device underlay communication

    CERN Document Server

    Song, Lingyang; Xu, Chen

    2013-01-01

    Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication.This

  18. Networked Attached Devices at SNS

    CERN Document Server

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  19. Device configuration-management system

    International Nuclear Information System (INIS)

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information

  20. Network management, status and directions

    International Nuclear Information System (INIS)

    Cottrell, R.L.A.; Streater, T.C.

    1992-09-01

    It has been said that the ''network is the system''. This implies providing levels of service, reliability, predictability and availability that are commensurate with or better than those that individual computers provide today. To provide this requires integrated network management for interconnected networks of heterogeneous devices covering both the local campus and across the world and spanning many administrative domains. This talk will review the status of existing tools to address management for networks. It draws on experience from both within and outside the HEP community

  1. Role of management devices in enacting strategy

    DEFF Research Database (Denmark)

    Harritz, Daniel

    2016-01-01

    the SSC’s creation. Originality/value - This study is the first to use a performative method to highlight the temporary and local nature of enacting strategic decisions to construct an SSC in the public sector. Keywords: Management control, SSC, strategic change, actor-network theory, organizational......Purpose - This study illustrates the role of management devices in enacting strategy and strategic decisions, resulting in the development of a Shared Service Centre (SSC) in a Danish municipality. It shows how devices interact in defending, rejecting and reframing strategy, leading to the closure...... the active role of non-human entities, such as management devices, in enacting and reformulating strategy. Findings - Different devices have become key actants in shaping and formulating the new strategy in the municipality and the strategic decision to construct a SSC. However, different devices mobilise...

  2. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically as...

  3. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  4. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... organisation theories and theories about strategic management....

  5. Joint interference management and resource allocation for device-to-device (D2D) communications underlying downlink/uplink decoupled (DUDe) heterogeneous networks

    KAUST Repository

    Celik, Abdulkadir

    2017-07-31

    In this paper, resource allocation and co-tier/cross-tier interference management are investigated for D2D-enabled heterogeneous networks (HetNets) where tiers 1, 2, and 3 consist of macrocells, smallcells, and D2D pairs, respectively. We first propose a D2D-enabled fractional frequency reuse scheme for uplink (UL) HetNets where macrocell subregions are preassigned to different subbands (SBs) in order to mitigate the tier-1↔tier-1 interference. Nevertheless, cell-edge macrocell user equipments (MUEs) with high transmission powers still form dead-zones for nearby smallcell UEs (SUEs) and D2D UEs (DUEs). One of the simple but yet novel means of the dead-zone alleviation is associating the cell-edge MUEs with nearby smallcells, which is also known as downlink (DL)/UL decoupling (DUDe). Subject to quality of service (QoS) requirements and power constraints, we formulate a joint SB assignment and resource block (RB) allocation optimization as a mixed integer non-linear programming (MINLP) problem to maximize the D2D sum rate and minimize the co-tier/cross-tier interference. Based on tolerable interference limit, we propose a fast yet high-performance suboptimal solution to jointly assign available SBs and RBs to smallcells. A D2D mode selection and resource allocation framework is then developed for DUEs. As traditional DL/UL Coupled (DUCo) scheme generates significant interference proportional to cellular user density and user association bias factor, results obtained from the combination of proposed methods and developed algorithms reveal the potential of DUDe for co-tier/cross-tier interference mitigation which opens more room for spectrum reuse of DUEs.

  6. Network resource management

    NARCIS (Netherlands)

    2009-01-01

    The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth,

  7. Managing the Cooperative Network.

    Science.gov (United States)

    Segal, JoAn S.

    1983-01-01

    Discussion of the management of not-for-profit corporations which provide computerized library networks highlights marketing, nonprofit constraints, multiple goals, consumer demands, professional commitment, external influences, motivation and control, dependence on charisma, management and altruism, hybrid organizations, and rational management.…

  8. Temporal Databases in Network Management

    National Research Council Canada - National Science Library

    Gupta, Ajay

    1998-01-01

    .... This thesis discusses issues involved with performing network management, specifically with means of reducing and storing the large quantity of data that networks management tools and systems generate...

  9. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  10. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  11. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  12. Networked business process management

    NARCIS (Netherlands)

    Grefen, P.W.P.J.

    2013-01-01

    In the current economy, a shift can be seen from stand-alone business organizations to networks of tightly collaborating business organizations. To allow this tight collaboration, business process management in these collaborative networks is becoming increasingly important. This paper discusses

  13. Managing collaborative innovation networks

    DEFF Research Database (Denmark)

    Stevens, Vidar; Agger, Annika

    2017-01-01

    Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...... steps. Such a management approach allows actors to get to know each other and from thereon expand, with more background and appreciation for the others’ goals, behaviors, and intentions, their group activities concerning the formulation of a radical and innovative policy plan....

  14. A Scalable Policy and SNMP Based Network Management Framework

    Institute of Scientific and Technical Information of China (English)

    LIU Su-ping; DING Yong-sheng

    2009-01-01

    Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management. However,cross-vendor hardware compatibility is one of the limitations in policy-based management. Devices existing in current network mostly support SNMP rather than Common Open Policy Service (COPS) protocol. By analyzing traditional network management and policy-based network management, a scalable network management framework is proposed. It is combined with Internet Engineering Task Force (IETF) framework for policybased management and SNMP-based network management. By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.

  15. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Directory of Open Access Journals (Sweden)

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  16. Knowledge management in international networks

    NARCIS (Netherlands)

    Man, de A.P.

    2006-01-01

    Networks and knowledge are intimately connected. Networks are believed to be innovative because of the smooth transfer, combination and creation of knowledge that can take place in them. Interestingly however, knowledge management research has hardly studied knowledge management techniques in

  17. Nominal Device Support for ATCA Shelf Manager

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Bruno; Carvalho, Paulo F.; Rodrigues, A.P.; Carvalho, Bernardo B.; Sousa, Jorge; Batista, Antonio J.N.; Combo, Alvaro M.; Cruz, Nuno; Correia, Carlos M.B.A.; Goncalves, Bruno [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Correia, Miguel [Centro de Instrumentacao, Departamento de Fisica, Universidade de Coimbra, 3004-516 Coimbra (Portugal)

    2015-07-01

    The ATCA standard specifies a mandatory Shelf Manager (ShM) unit which is a key element for the system operation. It includes the Intelligent Platform Management Controller (IPMC) which monitors the system health, retrieves inventory information and controls the Field Replaceable Units (FRUs). These elements enable the intelligent health monitoring, providing high-availability and safety operation, ensuring the correct system operation. For critical systems like ones of tokamak ITER these features are mandatory to support the long pulse operation. The Nominal Device Support (NDS) was designed and developed for the ITER CODAC Core System (CCS), which will be the responsible for plant Instrumentation and Control (I and C), supervising and monitoring on ITER. It generalizes the Enhanced Physics and Industrial Control System (EPICS) device support interface for Data Acquisition (DAQ) and timing devices. However the support for health management features and ATCA ShM are not yet provided. This paper presents the implementation and test of a NDS for the ATCA ShM, using the ITER Fast Plant System Controller (FPSC) prototype environment. This prototype is fully compatible with the ITER CCS and uses the EPICS Channel Access (CA) protocol as the interface with the Plant Operation Network (PON). The implemented solution running in an EPICS Input / Output Controller (IOC) provides Process Variables (PV) to the PON network with the system information. These PVs can be used for control and monitoring by all CA clients, such as EPICS user interface clients and alarm systems. The results are presented, demonstrating the fully integration and the usability of this solution. (authors)

  18. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    , such as limited wireless bandwidth operation, routing, scheduling, network control, etc. Currently Bluetooth specification particularly does not describe in details about how to implement Quality of Service and Resource Management in Bluetooth protocol stacks. These issues become significant, when the number...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... capacity allocation, network traffic control, inter-piconet scheduling, and buffer management. First, after a short presentation about Bluetooth technology, and QoS issues, queueing models and a simulation-based buffer management have been constructed. Then by using analysis and simulation, it shows some...

  19. Social networking and ecomobility through nomadic devices

    OpenAIRE

    PAUZIE, Annie

    2012-01-01

    Widespread among population of sophisticated nomadic devices such as smart phones is a possibility to be connected to social networks 'Anytime', 'Anywhere'. It can constitute a potential to support ecomobility with information on real time of location of danger/risky zones identified by drivers belonging to community members: potential to avoid traffic jams and to optimise the trip, ridesharing through connections between drivers and travellers belonging to the same community: potential to de...

  20. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  1. Semantic Technologies for User-Centric Home Network Management

    OpenAIRE

    Ibrahim Rana, Annie

    2015-01-01

    Home area network (HAN) management is problematic for ordinary home users. Lack of user expertise, potential complexity of administration tasks, extreme diversity of network devices, price pressures producing devices with minimal feature sets, and highly dynamic requirements of user applications are some of the main challenges in HANs. As networking becomes enabled in many more HAN devices, these problems are set to increase. A viable solution to address these challenges lie...

  2. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.; Sorour, Sameh; Al-Naffouri, Tareq Y.; Yang, Hong-Chuan; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost

  3. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  4. Cable networks, services, and management

    CERN Document Server

    2015-01-01

    Cable Networks, Services, and Management is the first book to cover cable networks, services, and their management, in-depth, for network operators, engineers, researchers, and students. Thirteen experts in various fields have contributed their knowledge of network architectures and services, Operations, Administration, Maintenance, Provisioning, Troubleshooting (OAMPT) for residential and business services, cloud, Software Defined Networks (SDN), as well as virtualization concepts and their applications as part of the future directions of cable networks. The book begins by introducing architecture and services for Data Over Cable Service Interface Specification (DOCSIS) 3.0/ 3.1, Converged Cable Access Platform (CCAP), Content Distribution Networks (CDN, IP TV, and Packet Cable and Wi-Fi for Residential Services. Topics that are discussed in proceeding chapters include: operational systems and management architectures, service orders, provisioning, fault manageme t, performance management, billing systems a...

  5. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  6. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  7. Network Resource Awareness and Prediction on Mobile Devices

    NARCIS (Netherlands)

    Peddemors, A.J.H.

    2009-01-01

    In the past several years, personal mobile devices have developed rapidly as versatile computing platforms, capable of installing and running many different applications. Often, these devices are equipped with multiple (wireless) network interfaces supporting internet access through one or more

  8. MANAGING WITHIN DISTRIBUTED INNOVATION NETWORKS

    OpenAIRE

    LAWRENCE DOOLEY; DAVID O'SULLIVAN

    2007-01-01

    Business competitiveness and sustainability depends on the effective management of innovation. To be effective, innovation needs to take place within every area of an organisation and by association within organisational networks that include key suppliers, customers and other strategic partners. Distributed innovation management is the process of managing innovation both within and across networks of organisations that have come together to co-design, co-produce and co-service the needs of c...

  9. Cloud services, networking, and management

    CERN Document Server

    da Fonseca, Nelson L S

    2015-01-01

    Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content. Self-contained chapters for readers with specific interests. Includes commercial applications on Cloud (video services and games).

  10. Multiuser Collaboration with Networked Mobile Devices

    Science.gov (United States)

    Tso, Kam S.; Tai, Ann T.; Deng, Yong M.; Becks, Paul G.

    2006-01-01

    In this paper we describe a multiuser collaboration infrastructure that enables multiple mission scientists to remotely and collaboratively interact with visualization and planning software, using wireless networked personal digital assistants(PDAs) and other mobile devices. During ground operations of planetary rover and lander missions, scientists need to meet daily to review downlinked data and plan science activities. For example, scientists use the Science Activity Planner (SAP) in the Mars Exploration Rover (MER) mission to visualize downlinked data and plan rover activities during the science meetings [1]. Computer displays are projected onto large screens in the meeting room to enable the scientists to view and discuss downlinked images and data displayed by SAP and other software applications. However, only one person can interact with the software applications because input to the computer is limited to a single mouse and keyboard. As a result, the scientists have to verbally express their intentions, such as selecting a target at a particular location on the Mars terrain image, to that person in order to interact with the applications. This constrains communication and limits the returns of science planning. Furthermore, ground operations for Mars missions are fundamentally constrained by the short turnaround time for science and engineering teams to process and analyze data, plan the next uplink, generate command sequences, and transmit the uplink to the vehicle [2]. Therefore, improving ground operations is crucial to the success of Mars missions. The multiuser collaboration infrastructure enables users to control software applications remotely and collaboratively using mobile devices. The infrastructure includes (1) human-computer interaction techniques to provide natural, fast, and accurate inputs, (2) a communications protocol to ensure reliable and efficient coordination of the input devices and host computers, (3) an application

  11. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  12. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  13. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  14. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  15. Network-Assisted Distributed Fairness-Aware Interference Coordination for Device-to-Device Communication Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Francis Boabang

    2017-01-01

    Full Text Available Device-to-device (D2D communication underlaid cellular network is considered a key integration feature in future cellular network. However, without properly designed interference management, the interference from D2D transmission tends to degrade the performance of cellular users and D2D pairs. In this work, we proposed a network-assisted distributed interference mitigation scheme to address this issue. Specifically, the base station (BS acts as a control agent that coordinates the cross-tier interference from D2D transmission through a taxation scheme. The cotier interference is controlled by noncooperative game amongst D2D pairs. In general, the outcome of noncooperative game is inefficient due to the selfishness of each player. In our game formulation, reference user who is the victim of cotier interference is factored into the payoff function of each player to obtain fair and efficient outcome. The existence, uniqueness of the Nash Equilibrium (NE, and the convergence of the proposed algorithm are characterized using Variational Inequality theory. Finally, we provide simulation results to evaluate the efficiency of the proposed algorithm.

  16. Managing Innovation Networks

    DEFF Research Database (Denmark)

    Awate, Snehal Suyash; Møller Larsen, Marcus; Mudambi, Ram

    In this article, we treat innovation as a multidimensional construct spanning people, technologies, and geographies. We study how these dimensions interact and impact firms' inventor networks and the ultimate innovation performance. We identify five distinct planes in which inventor networks reside....... Specifically, we distinguish between the types of ties that are possible between any two inventor nodes with respect to (i) co-located inventors; (ii) technology cohort; (iii) co-located technology cohort; (iv) distant co-inventors; and (v) co-located coinventors. We build a simple, yet parsimonious model...... distribution of ties deteriorates rather than enhances innovation performance....

  17. Managing interdependencies in supplier networks

    OpenAIRE

    Catarina Roseira; Carlos Brito

    2010-01-01

    Building and managing a supplier base has been referred to in the literature as a key aspect of supplier management. Scholars have proposed a number of models aimed at enhancing the effectiveness of supplier network management, mainly based on a portfolio approach. In the IMP tradition of research, those models are often criticized as they ignore the interdependencies between the different existing dyadic relationships of a focal buyer company and its suppliers. Such interdependencies are the...

  18. Management Concepts and the Navigation of Interessement Devices

    DEFF Research Database (Denmark)

    Hansen, Per Richard; Clausen, Christian

    2017-01-01

    principle) and how the concepts configured change in mutual learning processes characterized by conflict, trial and error. This paper contributes to a new understanding of the role of management concepts in change informed by actor-network theory and the concept of interessement devices, and how management......Management concepts are increasingly defining the way we perceive the needs, possibilities and potential outcomes of organizational change. While management concepts such as business process reengineering (BPR), lean manufacturing and stage gate models have been subject to study and debate......, keyconcerns centre on outcomes (or the lack thereof) and the translation of concepts as they are spread and adopted. However, their role in shaping actual organizational change is poorly understood. Very little has been said about how management concepts are used in organizations, and what managers actually...

  19. On Managed Services Lanes and their Use in Home Networks

    NARCIS (Netherlands)

    Hartog, F.T.H. den; Nooren, P.A.; Delphinanto, A.; Fledderus, E.R

    2013-01-01

    Home networks show an increasing level of heterogeneity regarding the devices connected, network technologies used, and services supported. Heterogeneity inhibits quality assurance for new services, such as online gaming, energy management, and health care. This paper focuses on the role that the

  20. Composing Networks: Writing Practices on Mobile Devices

    Science.gov (United States)

    Swarts, Jason

    2016-01-01

    This article is an investigation of composing practices through which people create networks with mobile phones. By looking through the lens of actor-network theory, the author portrays the networking activity of mobile phone users as translation, what Latour describes as an infralanguage to which different disciplinary perspectives can be…

  1. Network Connection Management

    CERN Document Server

    IT Department, Communication Systems and Network Group

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure a smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions....

  2. Network Connection Management

    CERN Multimedia

    IT Department

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions. Thank ...

  3. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    For many globally dispersed organisations, the home base (HB) is a historic locus of integrative and coordinating efforts that safeguard overall performance. However, the dynamism of global operations networks is increasingly pulling the centre of gravity away from the HB and dispersing it across...... the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  4. Apple IOS Devices for Network Administrators

    OpenAIRE

    Mirzoev, Timur; Gingo, Gerard; Stawchansky, Mike; White, Tracy

    2014-01-01

    As tablet devices continue to gain market share at the expense of the traditional PC, they become a more integral part of the corporate landscape. Tablets are no longer being utilized only by sales executives for presentation purposes, or as addition to the traditional laptop. Users are attempting to perform significant amounts of their daily work on tablet devices, some even abandoning the ubiquitous laptop or desktop entirely. Operating exclusively from a tablet device, specifically Apple I...

  5. Demand Side Management for Multiple Devices

    NARCIS (Netherlands)

    Molderink, Albert; Bakker, Vincent; Smit, Gerardus Johannes Maria

    Steering a heterogeneous set of devices in a Smart Grid using cost functions: Demand Side Management (DSM) is an important element in smart grids. DSM is already in operation for large consumers, but thorough research is required into DSM on a building level within the distribution grid.

  6. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  7. [Design and application of implantable medical device information management system].

    Science.gov (United States)

    Cao, Shaoping; Yin, Chunguang; Zhao, Zhenying

    2013-03-01

    Through the establishment of implantable medical device information management system, with the aid of the regional joint sharing of resources, we further enhance the implantable medical device traceability management level, strengthen quality management, control of medical risk.

  8. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  9. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  10. BAKNET - Communication network for radiation monitoring devices

    International Nuclear Information System (INIS)

    Cohen, Y.; Wengrowicz, U.; Tirosh, D.; Barak, D.

    1997-01-01

    A system, based on a new concept of controlling and monitoring distributed radiation monitors, has been developed and approved at the NRCN. The system, named B AKNET Network , consists of a series of communication adapters connected to a main PC via an RS-485 communication network (see Fig. 1). The network's maximal length is 1200 meters and it enables connection of up to 128 adapters. The BAKNET adapters are designed to interface output signals of different types of stationary radiation monitors to a main PC. The BAKNET adapters' interface type includes: digital, analog, RS-232, and mixed output signals. This allows versatile interfacing of different stationary radiation monitors to the main computer. The connection to the main computer is via an RS-485 network, utilizing an identical communication protocol. The PC software, written in C ++ under MS-Windows, consists of two main programs. The first is the data collection program and the second is the Human Machine Interface (HMI). (authors)

  11. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  12. Intelligent device management in the selfcare marketplace.

    Science.gov (United States)

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  13. Development of a safety case for the use of current limiting devices to manage short circuit currents on electrical distribution networks. Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    The original objective of this study was to review the safety issues associated with the use of current limiting devices and to write a risk assessment in accordance with good practice. But, when legislative procedures became apparent, the scope was changed to include involvement with the HSE, the DTI and Ofgem. It turned out that it would have been very difficult to write a safety case that would satisfy all of the agencies, or a risk assessment that would cover all applications. The scope of the study was therefore changed to focus on how the existing barriers should be tackled and the implications of the existing legislation. The approach to the study is described; it included reviews of background information and literature, questionnaires to manufacturers, a review of the reliability and hazards of the devices, and a review of UK safety legislation. The Final Report describes all this and includes discussion on the consequences of failure of fault current limiting devices, control measures which could be used to minimise risk, and recommendations for a way forward.

  14. Device-Centric Monitoring for Mobile Device Management

    OpenAIRE

    Chircop, Luke; Colombo, Christian; Pace, Gordon J.

    2016-01-01

    The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centri...

  15. Accessing ANSA Objects from OSI Network Management

    OpenAIRE

    Berrah, Karrim; Gay, David; Genilloud, Guy

    1994-01-01

    OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...

  16. VNML: Virtualized Network Management Laboratory for Educational ...

    African Journals Online (AJOL)

    VNML: Virtualized Network Management Laboratory for Educational Purposes. ... Journal of Fundamental and Applied Sciences ... In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college ...

  17. Residual Network Data Structures in Android Devices

    Science.gov (United States)

    2011-09-01

    particular cellular tower that can be physically geolocated . Wireless routers, commonly found in businesses and homes share their unique Media Access...commercial acquisition tool. The method was compiled with standard Symbian APIs to access the file system and only tested on Symbian mobile devices [20

  18. An approach for management of mobile devices in pharmaceutical company

    OpenAIRE

    Prešeren, Tadej

    2008-01-01

    The areas of the mobile device management is developing very fast. Hence, the thesis “An approach for management of mobile devices in pharmaceutical company” introduces all key directives that should be considered when implementing mobile device management. A survey of standards and recommendations on the mobile device security has been elaborated. Relevant guidelines for security policy definition are presented with the risk analysis for mobile device usage. Furthermore, the model for mana...

  19. Implantable Medical Devices; Networking Security Survey

    OpenAIRE

    Siamak Aram; Rouzbeh A. Shirvani; Eros G. Pasero; Mohamd F. Chouikha

    2016-01-01

    The industry of implantable medical devices (IMDs) is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable dev...

  20. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  1. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  2. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  3. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  4. An Architectural Modelfor Intelligent Network Management

    Institute of Scientific and Technical Information of China (English)

    罗军舟; 顾冠群; 费翔

    2000-01-01

    Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries. In this paper, an architectural model for Intelligent Network Management (INM) is presented. The INM system includes a manager system, which controls all subsystems and coordinates different management tasks; an expert system, which is responsible for handling particularly difficult problems, and intelligent agents, which bring the management closer to applications and user requirements by spreading intelligent agents through network segments or domain. In the expert system model proposed, especially an intelligent fault management system is given.The architectural model is to build the INM system to meet the need of managing modern network systems.

  5. SAFETY ON UNTRUSTED NETWORK DEVICES (SOUND)

    Science.gov (United States)

    2017-10-10

    and LSD-41 labs to show how it can work at scale to protect a ship network. 15. SUBJECT TERMS Communities of trust, SAFE architecture, adaptable... environment . Then, SOUND development would extend the SAFE implementation from the CRASH program to allow SAFE hosts to operate in a heterogeneous...hardware level on a SAFE processor (developed under the DARPA CRASH program). This section summarizes our work ; more details can be found in [K+14

  6. Device-Centric Monitoring for Mobile Device Management

    Directory of Open Access Journals (Sweden)

    Luke Chircop

    2016-03-01

    Full Text Available The ubiquity of computing devices has led to an increased need to ensure not only that the applications deployed on them are correct with respect to their specifications, but also that the devices are used in an appropriate manner, especially in situations where the device is provided by a party other than the actual user. Much work which has been done on runtime verification for mobile devices and operating systems is mostly application-centric, resulting in global, device-centric properties (e.g. the user may not send more than 100 messages per day across all applications being difficult or impossible to verify. In this paper we present a device-centric approach to runtime verify the device behaviour against a device policy with the different applications acting as independent components contributing to the overall behaviour of the device. We also present an implementation for Android devices, and evaluate it on a number of device-centric policies, reporting the empirical results obtained.

  7. Signal Processing Device (SPD) for networked radiation monitoring system

    International Nuclear Information System (INIS)

    Dharmapurikar, A.; Bhattacharya, S.; Mukhopadhyay, P.K.; Sawhney, A.; Patil, R.K.

    2010-01-01

    A networked radiation and parameter monitoring system with three tier architecture is being developed. Signal Processing Device (SPD) is a second level sub-system node in the network. SPD is an embedded system which has multiple input channels and output communication interfaces. It acquires and processes data from first level parametric sensor devices, and sends to third level devices in response to request commands received from host. It also performs scheduled diagnostic operations and passes on the information to host. It supports inputs in the form of differential digital signals and analog voltage signals. SPD communicates with higher level devices over RS232/RS422/USB channels. The system has been designed with main requirements of minimal power consumption and harsh environment in radioactive plants. This paper discusses the hardware and software design details of SPD. (author)

  8. Wearable Device Control Platform Technology for Network Application Development

    Directory of Open Access Journals (Sweden)

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  9. Managing ANSA Objects with OSI Network Management Tools

    OpenAIRE

    Polizzi, Marc; Genilloud, Guy

    1995-01-01

    OSI Network Management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, as this model is not well-adapted for the management of software components, distributed programming environments (e.g. DCE, CORBA, ANSAware) essentially ignore the OSI Network Management model. We assume nevertheless that OSI Network managers will want to have some control of a distributed infrastructure and application. We examine how access to some of ...

  10. Low-cost Augmented Reality prototype for controlling network devices

    OpenAIRE

    Nguyen, Anh; Banic, Amy

    2014-01-01

    With the evolution of mobile devices, and smart-phones in particular, comes the ability to create new experiences that enhance the way we see, interact, and manipulate objects, within the world that surrounds us. It is now possible to blend data from our senses and our devices in numerous ways that simply were not possible before using Augmented Reality technology. In a near future, when all of the office devices as well as your personal electronic gadgets are on a common wireless network, op...

  11. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  12. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  13. Next generation network performance management: a business perspective

    CSIR Research Space (South Africa)

    Harding, C

    2010-08-01

    Full Text Available multitude of transport and access technologies on almost any user device. The most important and integral component of the NGCN NGN Architectural Framework is the physical and logical management of the network elements and services to provide maximum utility...

  14. Implementation and role of device management Solutions to the end users

    OpenAIRE

    Egbeni, Victor Kanayo

    2009-01-01

    This research is based on consumer complaints with respect to recently purchased consumer electronics. This research document will investigate the instances of development and device management as a tool used to aid consumer and manage consumer’s mobile products in order to resolve issues in or before the consumers is aware one exists. The problem at the present time is that mobile devices are becoming very advanced pieces of technology, and not all manufacturers and network providers have ke...

  15. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Science.gov (United States)

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  16. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  17. Method and device for monitoring distortion in an optical network

    NARCIS (Netherlands)

    2012-01-01

    A method and a device for monitoring of distortion in an optical network are provided, wherein at least one reference signal and at least one data signal are conveyed via an optical link and wherein a distortion of the at least one data signal is determined based on the at least one reference

  18. Communication devices for network-hopping communications and methods of network-hopping communications

    Science.gov (United States)

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  19. CERN tests reveal security flaws with industrial network devices

    CERN Document Server

    Lüders, Stefan

    2006-01-01

    The CERN high energy particle physics facility at Geneva, Switzerland will incorporate a wide range of COTS industrial control systems within its next generation particle collider, the LHC. In particular, the Internet will be used to facilitate the remote access for accelerator and particle physicists and system experts based at several hundred locations around the globe. The integration of Industrial Ethernet and COTS PLCs within the LHC program focuses extreme attention on the industrial network cyber-security requirement. CERN's response has been to conduct operational research on the security resilience of networked industrial devices. As test team lead Stefan Lüders reports here, industrial networked devices put through the organisation's test procedures have generally shown up unexpected vulnerabilities.

  20. Using Bayesian belief networks in adaptive management.

    Science.gov (United States)

    J.B. Nyberg; B.G. Marcot; R. Sulyma

    2006-01-01

    Bayesian belief and decision networks are relatively new modeling methods that are especially well suited to adaptive-management applications, but they appear not to have been widely used in adaptive management to date. Bayesian belief networks (BBNs) can serve many purposes for practioners of adaptive management, from illustrating system relations conceptually to...

  1. Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Popovski, Petar

    2015-01-01

    ) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which......Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii......, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while...

  2. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  3. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  4. Adaptive Capacity Management in Bluetooth Networks

    OpenAIRE

    Son, L.T.

    2004-01-01

    With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low power, and low cost mobile ad hoc solution for the global interconnection of all mobile devices. To implement Bluetooth network as a true mobile ad hoc wireless network operating in short radio range, h...

  5. Impact of stand-by energy losses in electronic devices on smart network performance

    Directory of Open Access Journals (Sweden)

    Mandić-Lukić Jasmina S.

    2012-01-01

    Full Text Available Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic devices is needed to operate or to be in their stand-by mode. The consumption of these devices is added to the consumption of many other electronic devices already in use in households and offices, thus giving rise to the overall power consumption and threatening to counteract the primary function of smart networks. This paper addresses the consumption of particular electronic devices, with an emphasis placed on their thermal losses when in stand-by mode and their total share in the overall power consumption in certain countries. The thermal losses of electronic devices in their stand-by mode are usually neglected, but it seems theoretically possible that a massive increase in their number can impact net performance of the future smart networks considerably so that above an optimum level of energy savings achieved by their penetration, total consumption begins to increase. Based on the current stand-by energy losses from the existing electronic devices, we propose that the future penetration of smart networks be optimized taking also into account losses from their own electronic devices, required to operate in stand-by mode.

  6. Real-Time Network Management

    National Research Council Canada - National Science Library

    Riolo, Joseph

    1998-01-01

    .... According to our Phase I research, it is possible to collect data on the network and morph it into queuing models to produce information about the network and physical layers of nodes on a network...

  7. Network device interface for digitally interfacing data channels to a controller via a network

    Science.gov (United States)

    Ellerbrock, Philip J. (Inventor); Grant, Robert L. (Inventor); Konz, Daniel W. (Inventor); Winkelmann, Joseph P. (Inventor)

    2009-01-01

    A communications system and method are provided for digitally connecting a plurality of data channels, such as sensors, actuators, and subsystems, to a controller using a network bus. The network device interface interprets commands and data received from the controller and polls the data channels in accordance with these commands. Specifically, the network device interface receives digital commands and data from the controller, and based on these commands and data, communicates with the data channels to either retrieve data in the case of a sensor or send data to activate an actuator. Data retrieved from the sensor is converted into digital signals and transmitted to the controller. Network device interfaces associated with different data channels can coordinate communications with the other interfaces based on either a transition in a command message sent by the bus controller or a synchronous clock signal.

  8. Network management in motion. Part 1. Network management in perspective. Transition or paradox?

    International Nuclear Information System (INIS)

    Van Beuge, M.

    2010-01-01

    In a series of articles various legal aspects of network management are discussed from a European and a Dutch perspective. In this first part a general introduction is given on network management and related topics, such as developing local networks to international networks, the integration to unbundling the energy market in Europe, the development of centralized to decentralized, and from conventional to sustainable. [nl

  9. Network-Embedded Management and Applications Understanding Programmable Networking Infrastructure

    CERN Document Server

    Wolter, Ralf

    2013-01-01

    Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...

  10. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  11. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  12. Tunable photonic bandgap fiber based devices for optical networks

    DEFF Research Database (Denmark)

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    In future all optical networks one of the enabling technologies is tunable elements including reconfigurable routers, switches etc. Thus, the development of a technology platform that allows construction of tuning components is critical. Lately, microstructured optical fibers, filled with liquid......, for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...... crystals, have proven to be a candidate for such a platform. Microstructured optical fibers offer unique wave-guiding properties that are strongly related to the design of the air holes in the cladding of the fiber. These wave-guiding properties may be altered by filling the air holes with a material...

  13. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  14. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2017-01-01

    , this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore......, a first objective of this work is to assess the operating regions where employing cooperation results in higher throughput and/or energy savings. We consider multicast scenarios with network coded mechanisms employing Random Linear Network Coding (RLNC). However, although RLNC is good for low amount...... of transmissions in multicast, it has an inherent overhead from extreme high or low field related caveats. Thus, as a second objective, we review and propose the application of new network codes that posses low overhead for multicasting, by having a short representation and low dependence probability. We provide...

  15. Group handoff management in low power microcell-femtocell network

    Directory of Open Access Journals (Sweden)

    Debashis De

    2017-02-01

    Full Text Available This paper presents an analytical model of group based hand-off management based on bird flocking behavior. In the proposed scheme, a number of mobile devices form a group if these devices move together for a long time duration. Although call delivery or call generation are performed individually, hand-off is performed in a group. Dynamic group formation, group division and group merging methods are proposed in this paper. From the simulation results it is demonstrated that approximately 75%, 65% and 90% reduction in power, cost and latency consumption can be obtained respectively using group hand-off management. Thus the proposed scheme is referred as green, economic and fast hand-off strategy. In this paper instead of a macrocell network, a microcell-femtocell network is considered as the transmission power of a microcell or a femtocell base station is much less than a macrocell base station. Simulation results present that the microcell-femtocell network achieves approximately 25–55% and 35–55% reduction in power transmission, and 50–65% and 15–45% reduction in path loss than only a macrocell network and macrocell-femtocell network respectively. Thus microcell-femtocell network is a power-efficient network.

  16. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  17. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    KAUST Repository

    Elrasad, Amr

    2016-01-01

    The increasing bandwidth demands in access networks motivates network operators, networking devices manufacturers, and standardization institutions to search for new approaches for access networks. These approaches should support higher bandwidth

  18. A Single-Walled Carbon Nanotube Network Gas Sensing Device

    Directory of Open Access Journals (Sweden)

    I-Ju Teng

    2011-08-01

    Full Text Available The goal of this research was to develop a chemical gas sensing device based on single-walled carbon nanotube (SWCNT networks. The SWCNT networks are synthesized on Al2O3-deposted SiO2/Si substrates with 10 nm-thick Fe as the catalyst precursor layer using microwave plasma chemical vapor deposition (MPCVD. The development of interconnected SWCNT networks can be exploited to recognize the identities of different chemical gases by the strength of their particular surface adsorptive and desorptive responses to various types of chemical vapors. The physical responses on the surface of the SWCNT networks cause superficial changes in the electric charge that can be converted into electronic signals for identification. In this study, we tested NO2 and NH3 vapors at ppm levels at room temperature with our self-made gas sensing device, which was able to obtain responses to sensitivity changes with a concentration of 10 ppm for NO2 and 24 ppm for NH3.

  19. The Concept of the Remote Devices Content Management

    Directory of Open Access Journals (Sweden)

    Miroslav Behan

    2012-01-01

    Full Text Available Modern mobile communication devices which are often used as remote access to information systems bring up many advantages for user. Unfortunately in some cases when user has several different mobile devices for the same remote access, a problem of multiplatform and multivendor environment fragments productivity by user knowledge in principals of approach to possible services, controlling or management of devices as well as features is available. The customizable interface of remote device management benefits by the control of all owned, authorized, or publically accessible devices from single point of user perspective. We propose a concept of such information system which takes into account mobile devices and their content. Concept is suitable not only for Apple iOS or Google Android, but also it covers all mobile platforms as well as the sensors capabilities of mobile devices which can turn such mobile Smart Device to Smart and mobile sensor concentrator.

  20. Instantly decodable network coding for real-time device-to-device communications

    KAUST Repository

    Douik, Ahmed

    2016-01-04

    This paper studies the delay reduction problem for instantly decodable network coding (IDNC)-based device-to-device (D2D) communication-enabled networks. Unlike conventional point-to-multipoint (PMP) systems in which the wireless base station has the sufficient computation abilities, D2D networks rely on battery-powered operations of the devices. Therefore, a particular emphasis on the computation complexity needs to be addressed in the design of delay reduction algorithms for D2D networks. While most of the existing literature on IDNC directly extend the delay reduction PMP schemes, known to be NP-hard, to the D2D setting, this paper proposes to investigate and minimize the complexity of such algorithms for battery-powered devices. With delay minimization problems in IDNC-based systems being equivalent to a maximum weight clique problems in the IDNC graph, the presented algorithms, in this paper, can be applied to different delay aspects. This paper introduces and focuses on the reduction of the maximum value of the decoding delay as it represents the most general solution. The complexity of the solution is reduced by first proposing efficient methods for the construction, the update, and the dimension reduction of the IDNC graph. The paper, further, shows that, under particular scenarios, the problem boils down to a maximum clique problem. Due to the complexity of discovering such maximum clique, the paper presents a fast selection algorithm. Simulation results illustrate the performance of the proposed schemes and suggest that the proposed fast selection algorithm provides appreciable complexity gain as compared to the optimal selection one, with a negligible degradation in performance. In addition, they indicate that the running time of the proposed solution is close to the random selection algorithm.

  1. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  2. A Process Management System for Networked Manufacturing

    Science.gov (United States)

    Liu, Tingting; Wang, Huifen; Liu, Linyan

    With the development of computer, communication and network, networked manufacturing has become one of the main manufacturing paradigms in the 21st century. Under the networked manufacturing environment, there exist a large number of cooperative tasks susceptible to alterations, conflicts caused by resources and problems of cost and quality. This increases the complexity of administration. Process management is a technology used to design, enact, control, and analyze networked manufacturing processes. It supports efficient execution, effective management, conflict resolution, cost containment and quality control. In this paper we propose an integrated process management system for networked manufacturing. Requirements of process management are analyzed and architecture of the system is presented. And a process model considering process cost and quality is developed. Finally a case study is provided to explain how the system runs efficiently.

  3. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  4. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-05-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  5. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-01-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  6. Five Tips for Managing Mobile Devices

    Science.gov (United States)

    Tucker, Catlin

    2015-01-01

    The author, an outspoken advocate for using technology in the classroom, knows how important it is to establish expectations for responsible use of mobile devices. She's found that five strategies help ensure that mobile devices enhance, rather than distract from, learning. Teachers need to establish new norms that clarify responsible use,…

  7. Optical Networks Solutions planning - performances - management

    DEFF Research Database (Denmark)

    Fenger, Christian

    2002-01-01

    It has been a decisive goal in the compilation of this thesis to make us capable of realizing the future national and regional telecommunication networks in an efficient and resource optimal way. By future telecommunication network is assumed an all optical network where the information in transit...... are kept optical and not converted into the optical domain. The focus is on the scientific results achieved throughout the Ph.D. period. Five subjects – all increasing the understanding of optical networks – are studied. Static wavelength routed optical networks are studied. Management on terms...... of lightpath allocation and design is considered. By using statistical models (simultaneous analysis of many networks) the correspondence between parameters determining the network topology and the performance of the optical network is found. These dependencies are important knowledge in the process...

  8. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices.

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  9. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2017-10-01

    Full Text Available In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU devices to convolutional neural networks (CNNs. We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  10. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures. PMID:29066942

  11. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  12. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  13. Transmitting patient and device data via GSM--central management for decentral mobile medical devices.

    Science.gov (United States)

    Bachmor, T; Schöchlin, J; Bolz, A

    2002-01-01

    Equipping medical devices with long range telemetry opens completely new possibilities for emergency response, home care and remote diagnosis. Mobile communications nowadays seem to be a generally accepted part of our modern world, but bridging the gap between new (consumer-) technologies and medical devices still is a challenge today. Providing a telemetry link (GSM) is just the trivial part--ensuring security, reliability and service management are the more critical tasks that need to be addressed. Therefore, a complete system concept consists of an automatic fleet management (e.g. periodic device-initiated service calls) as well as customer relationship management (CRM), including technical service and a trouble-ticket system.

  14. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  15. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  16. Towards Business Process Management in networked ecosystems

    NARCIS (Netherlands)

    Johan Versendaal; dr. Martijn Zoet; Jeroen Grondelle

    2014-01-01

    Managing and supporting the collaboration between different actors is key in any organizational context, whether of a hierarchical or a networked nature. In the networked context of ecosystems of service providers and other stakeholders, BPM is faced with different challenges than in a conventional

  17. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  18. Cognitive resource management for heterogeneous cellular networks

    CERN Document Server

    Liu, Yongkang

    2014-01-01

    This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in

  19. Methods, media and systems for managing a distributed application running in a plurality of digital processing devices

    Science.gov (United States)

    Laadan, Oren; Nieh, Jason; Phung, Dan

    2012-10-02

    Methods, media and systems for managing a distributed application running in a plurality of digital processing devices are provided. In some embodiments, a method includes running one or more processes associated with the distributed application in virtualized operating system environments on a plurality of digital processing devices, suspending the one or more processes, and saving network state information relating to network connections among the one or more processes. The method further include storing process information relating to the one or more processes, recreating the network connections using the saved network state information, and restarting the one or more processes using the stored process information.

  20. Reactive power management of power networks with wind generation

    CERN Document Server

    Amaris, Hortensia; Ortega, Carlos Alvarez

    2012-01-01

    As the energy sector shifts and changes to focus on renewable technologies, the optimization of wind power becomes a key practical issue. Reactive Power Management of Power Networks with Wind Generation brings into focus the development and application of advanced optimization techniques to the study, characterization, and assessment of voltage stability in power systems. Recent advances on reactive power management are reviewed with particular emphasis on the analysis and control of wind energy conversion systems and FACTS devices. Following an introduction, distinct chapters cover the 5 key

  1. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    required by the next generation transport network to provide Quality-of-Service (QoS) guaranteed video services. Augmenting network capacity and upgrading network nodes indicate long deployment period, replacement of equipment and thus significant cost to the network service providers. This challenge may...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  2. Social networks in cardiovascular disease management.

    Science.gov (United States)

    Shaya, Fadia T; Yan, Xia; Farshid, Maryam; Barakat, Samer; Jung, Miah; Low, Sara; Fedder, Donald

    2010-12-01

    Cardiovascular disease remains the leading cause of death in the USA. Social networks have a positive association with obesity, smoking cessation and weight loss. This article summarizes studies evaluating the impact of social networks on the management of cardiovascular disease. The 35 studies included in the article describe the impact of social networks on a decreased incidence of cardiovascular disease, depression and mortality. In addition, having a large-sized social network is also associated with better outcomes and improved health. The role of pharmacists is beginning to play an important role in the patient-centered medical home, which needs to be incorporated into social networks. The patient-centered medical home can serve as an adaptive source for social network evolvement.

  3. Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Jun Huang

    2015-08-01

    Full Text Available Device-to-Device (D2D communication has recently emerged as a promising technology to improve the capacity and coverage of cellular systems. To successfully implement D2D communications underlaying a cellular network, resource allocation for D2D links plays a critical role. While most of prior resource allocation mechanisms for D2D communications have focused on interference within a single-cell system, this paper investigates the resource allocation problem for a multicell cellular network in which a D2D link reuses available spectrum resources of multiple cells. A repeated game theoretic approach is proposed to address the problem. In this game, the base stations (BSs act as players that compete for resource supply of D2D, and the utility of each player is formulated as revenue collected from both cellular and D2D users using resources. Extensive simulations are conducted to verify the proposed approach and the results show that it can considerably enhance the system performance in terms of sum rate and sum rate gain.

  4. Managing resources through stakeholder networks

    NARCIS (Netherlands)

    Ogada, Job Ochieng; Krhoda, George Okoye; Veen, Van Der Anne; Marani, Martin; Oel, van Pieter Richards

    2017-01-01

    Stakeholder analysis and social network analysis were used to analyze stakeholders’ social and structural characteristics based on their interests, influence and interactions in Lake Naivasha basin, Kenya. Even though the Kenyan government and its agencies seem to command higher influence and

  5. Networking of integrated pest management

    NARCIS (Netherlands)

    Lamichhane, Jay Ram; Aubertot, Jean Noël; Begg, Graham; Birch, Andrew Nicholas E.; Boonekamp, Piet; Dachbrodt-Saaydeh, Silke; Hansen, Jens Grønbech; Hovmøller, Mogens Støvring; Jensen, Jens Erik; Jørgensen, Lise Nistrup; Kiss, Jozsef; Kudsk, Per; Moonen, Anna Camilla; Rasplus, Jean Yves; Sattin, Maurizio; Streito, Jean Claude; Messéan, Antoine

    2016-01-01

    Integrated pest management (IPM) is facing both external and internal challenges. External challenges include increasing needs to manage pests (pathogens, animal pests and weeds) due to climate change, evolution of pesticide resistance as well as virulence matching host resistance. The complexity

  6. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  7. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Directory of Open Access Journals (Sweden)

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  8. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  9. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  10. Information Dynamics as Foundation for Network Management

    Science.gov (United States)

    2014-12-04

    developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design

  11. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  12. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  13. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Science.gov (United States)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  14. Network Congestion and Performance Management

    OpenAIRE

    Shewmaker, Andrew Glenn

    2016-01-01

    We increasingly depend on well-behaved networks in the course of every-day activities for business, community, government, science, and recreation. And with more people demanding a greater variety of services comes sharp disagreement about which needs are most important. Unfortunately, today’s technology is inadequate to guarantee the performance of dynamic and diverse workloads in such a way that we are prevented from hurting each other’s goals.No one likes waiting in traffic, whether on a r...

  15. Management continuity in local health networks

    Directory of Open Access Journals (Sweden)

    Mylaine Breton

    2012-04-01

    Full Text Available Introduction: Patients increasingly receive care from multiple providers in a variety of settings. They expect management continuity that crosses boundaries and bridges gaps in the healthcare system. To our knowledge, little research has been done to assess coordination across organizational and professional boundaries from the patients' perspective. Our objective was to assess whether greater local health network integration is associated with management continuity as perceived by patients. Method: We used the data from a research project on the development and validation of a generic and comprehensive continuity measurement instrument that can be applied to a variety of patient conditions and settings. We used the results of a cross-sectional survey conducted in 2009 with 256 patients in two local health networks in Quebec, Canada. We compared four aspects of management continuity between two contrasting network types (highly integrated vs. poorly integrated. Results: The scores obtained in the highly integrated network are better than those of the poorly integrated network on all dimensions of management continuity (coordinator role, role clarity and coordination between clinics, and information gaps between providers except for experience of care plan. Conclusion: Some aspects of care coordination among professionals and organizations are noticed by patients and may be valid indicators to assess care coordination.

  16. FY1995 optoelectronic devices and circuits for terabit class network; 1995 nendo terabit kyu network yo hikari denshi device kairo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The necessary technology realizing Terabit class optical network is the signal multiplexing both in temporal and spectral domains. Controllability of ultrafast optoelectronic systems is therefore the priority issue. Specifically we chose semiconductor lasers as the key devices. The methodology for performance improvement and the creation of novel functionality are investigated. Firstly compression of semiconductor laser pulse reached the world record of 65 femto second. Secondly a proposal was made to control mode locked semiconductor lasers via subharmonic synchronization and a substantial phase noise reduction was demonstrated. Thirdly a new technology was developed to realize broadband anti-reflection coating on semiconductor laser amplifier facet, bringing about significant performance improvement. To compensate the dispersion induced signal distortion a broadband semiconductor laser amplifier four wave mixing was analyzed and also demonstrated experimentally. (NEDO)

  17. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  18. Resource Management in Broadband Communication Networks

    DEFF Research Database (Denmark)

    Hansen, Mads Stenhuus

    2003-01-01

    . The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants......This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered...

  19. [The Development of Information Centralization and Management Integration System for Monitors Based on Wireless Sensor Network].

    Science.gov (United States)

    Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin

    2015-07-01

    Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.

  20. Applications of Graph Spectral Techniques to Water Distribution Network Management

    Directory of Open Access Journals (Sweden)

    Armando di Nardo

    2018-01-01

    Full Text Available Cities depend on multiple heterogeneous, interconnected infrastructures to provide safe water to consumers. Given this complexity, efficient numerical techniques are needed to support optimal control and management of a water distribution network (WDN. This paper introduces a holistic analysis framework to support water utilities on the decision making process for an efficient supply management. The proposal is based on graph spectral techniques that take advantage of eigenvalues and eigenvectors properties of matrices that are associated with graphs. Instances of these matrices are the adjacency matrix and the Laplacian, among others. The interest for this application is to work on a graph that specifically represents a WDN. This is a complex network that is made by nodes corresponding to water sources and consumption points and links corresponding to pipes and valves. The aim is to face new challenges on urban water supply, ranging from computing approximations for network performance assessment to setting device positioning for efficient and automatic WDN division into district metered areas. It is consequently created a novel tool-set of graph spectral techniques adapted to improve main water management tasks and to simplify the identification of water losses through the definition of an optimal network partitioning. Two WDNs are used to analyze the proposed methodology. Firstly, the well-known network of C-Town is investigated for benchmarking of the proposed graph spectral framework. This allows for comparing the obtained results with others coming from previously proposed approaches in literature. The second case-study corresponds to an operational network. It shows the usefulness and optimality of the proposal to effectively manage a WDN.

  1. Online professional networks for physicians: risk management.

    Science.gov (United States)

    Hyman, Jon L; Luks, Howard J; Sechrest, Randale

    2012-05-01

    The rapidly developing array of online physician-only communities represents a potential extraordinary advance in the availability of educational and informational resources to physicians. These online communities provide physicians with a new range of controls over the information they process, but use of this social media technology carries some risk. The purpose of this review was to help physicians manage the risks of online professional networking and discuss the potential benefits that may come with such networks. This article explores the risks and benefits of physicians engaging in online professional networking with peers and provides suggestions on risk management. Through an Internet search and literature review, we scrutinized available case law, federal regulatory code, and guidelines of conduct from professional organizations and consultants. We reviewed the OrthoMind.com site as a case example because it is currently the only online social network exclusively for orthopaedic surgeons. Existing case law suggests potential liability for orthopaedic surgeons who engage with patients on openly accessible social network platforms. Current society guidelines in both the United States and Britain provide sensible rules that may mitigate such risks. However, the overall lack of a strong body of legal opinions, government regulations as well as practical experience for most surgeons limit the suitability of such platforms. Closed platforms that are restricted to validated orthopaedic surgeons may limit these downside risks and hence allow surgeons to collaborate with one another both as clinicians and practice owners. Educating surgeons about the pros and cons of participating in these networking platforms is helping them more astutely manage risks and optimize benefits. This evolving online environment of professional interaction is one of few precedents, but the application of risk management strategies that physicians use in daily practice carries over

  2. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  3. Medical device risk management and its economic impact

    Directory of Open Access Journals (Sweden)

    Katerina Krsteva Jakimovska

    2013-10-01

    Full Text Available The importance of medical devices in everyday users/patients lives is imensse. This is the reason why emphasis must be put on safety during their use. Satisfactory safety level can be achived by implementation of quality and risk management standards. Medical device manufacturers must learn to deal with the potential risks by using theoretical and practical examples and measures in order to protect their users/patients and themselves from suffering huge losses arising from adverse events or recall of their products. The best moment for implementation of risk management methods and analysis begins from the device design and development through manufacturing, sales and distribution. These way medical device manufacturers will succseed in protecting their users/patients from serious adverse events and at the same time protect their brand and society status, while minimizing economic losses.

  4. Repair and managing device in nuclear power plants

    International Nuclear Information System (INIS)

    Shinzawa, Katsuo.

    1982-01-01

    Purpose: To moderate the operator's labour by automatically carrying out the managing works for the repair of nuclear power plants. Constitution: Information concerning the content of the repair works inputted from an input device is arranged and analyzed in a calculation device and judged if it is the content for a format work or not. The calculation device has a function of extracting the information regarding the format work content from the memory device and comparing the plant information from the reading device before the repair work and after the recovering work. A printer connected to the output end of the calculation device issues an information regarding the format work content extracted from the memory device, that is, written work procedures and operation inhibition TAG. The content, period, person in charge, purpose, allowed items and the likes for the works are printed on the operation inhibition TAG. After the operation for the equipments, one half of them is charged to the equipment and the other half of them is charged to the reading device and the plant information is sent to the memory device. (Kawakami, Y.)

  5. Analysis and Tools for Improved Management of Connectionless and Connection-Oriented BLE Devices Coexistence.

    Science.gov (United States)

    Del Campo, Antonio; Cintioni, Lorenzo; Spinsante, Susanna; Gambi, Ennio

    2017-04-07

    With the introduction of low-power wireless technologies, like Bluetooth Low Energy (BLE), new applications are approaching the home automation, healthcare, fitness, automotive and consumer electronics markets. BLE devices are designed to maximize the battery life, i.e., to run for long time on a single coin-cell battery. In typical application scenarios of home automation and Ambient Assisted Living (AAL), the sensors that monitor relatively unpredictable and rare events should coexist with other sensors that continuously communicate health or environmental parameter measurements. The former usually work in connectionless mode, acting as advertisers, while the latter need a persistent connection, acting as slave nodes. The coexistence of connectionless and connection-oriented networks, that share the same central node, can be required to reduce the number of handling devices, thus keeping the network complexity low and limiting the packet's traffic congestion. In this paper, the medium access management, operated by the central node, has been modeled, focusing on the scheduling procedure in both connectionless and connection-oriented communication. The models have been merged to provide a tool supporting the configuration design of BLE devices, during the network design phase that precedes the real implementation. The results highlight the suitability of the proposed tool: the ability to set the device parameters to allow us to keep a practical discovery latency for event-driven sensors and avoid undesired overlaps between scheduled scanning and connection phases due to bad management performed by the central node.

  6. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  7. Multidimensional Risk Management for Underground Electricity Networks

    Directory of Open Access Journals (Sweden)

    Garcez Thalles V.

    2014-08-01

    Full Text Available In the paper we consider an electricity provider company that makes decision on allocating resources on electric network maintenance. The investments decrease malfunction rate of network nodes. An accidental event (explosion, fire, etc. or a malfunctioning on underground system can have various consequences and in different perspectives, such as deaths and injuries of pedestrians, fires in nearby locations, disturbances in the flow of vehicular traffic, loss to the company image, operating and financial losses, etc. For this reason it is necessary to apply an approach of the risk management that considers the multidimensional view of the consequences. Furthermore an analysis of decision making should consider network dependencies between the nodes of the electricity distribution system. In the paper we propose the use of the simulation to assess the network effects (such as the increase of the probability of other accidental event and the occurrence of blackouts of the dependent nodes in the multidimensional risk assessment in electricity grid. The analyzed effects include node overloading due to malfunction of adjacent nodes and blackouts that take place where there is temporarily no path in the grid between the power plant and a node. The simulation results show that network effects have crucial role for decisions in the network maintenance – outcomes of decisions to repair a particular node in the network can have significant influence on performance of other nodes. However, those dependencies are non-linear. The effects of network connectivity (number of connections between nodes on its multidimensional performance assessment depend heavily on the overloading effect level. The simulation results do not depend on network type structure (random or small world – however simulation outcomes for random networks have shown higher variance compared to small-world networks.

  8. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.; Sorour, Sameh; Tembine, Hamidou; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  9. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed

    2016-06-29

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  10. Restaurant Management System Over Private Network

    OpenAIRE

    Amanat Dhillon; Shreya Tuli

    2017-01-01

    Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated...

  11. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices

    OpenAIRE

    Beyene, Yordanos

    2014-01-01

    In this dissertation, we attempt to understand and predict the performance of security devices. More specifically, we examine the following types of questions: (a) Given a security device, and a traffic load, can we predict the performance of the device? (b) Given a traffic load and a security device, how can we tune the performance of the device to achieve the desired trade-off between security and performance? We consider both stateful firewalls and Network Intrusion Prevention systems (NIP...

  12. Bring Your Own Device and Nurse Managers' Decision Making.

    Science.gov (United States)

    Martinez, Karen; Borycki, Elizabeth; Courtney, Karen L

    2017-02-01

    The Bring Your Own Device phenomenon is important in the healthcare environment because this trend is changing the workplace in healthcare organizations, such as British Columbia. At present, there is little research that exists in Canada to provide a distinct understanding of the complexities and difficulties unique to this phenomenon within the nursing practice. This study focused on the experiences and perceptions of nurse managers regarding how they make decisions on the use of personal handheld devices in the workplace. Telephone interviews (N = 10) and qualitative descriptive analysis were used. Four major themes emerged: (1) management perspective, (2) opportunities, (3) disadvantages, and (4) solutions. Nurse managers and other executives in healthcare organizations and health information technology departments need to be aware of the practice and organizational implications of the Bring Your Own Device movement.

  13. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  14. Resource Management in Tactical Military Networks

    Science.gov (United States)

    2006-12-01

    FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION Resource Management in Tactical Military Networks...Martin Lies, Peter Sevenich, Christoph Karg, Christoph Barz Nr: 2 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE ...Communication with IPSec in Tunnelmode Nr: 3 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION IPSec in

  15. Value of monitoring in road network management

    NARCIS (Netherlands)

    Zouch, M.; Courage, W.; Napoles-Morales, O.

    2014-01-01

    We present a framework for road network management to assist road authorities in maintenance budget estimations and long-term maintenance strategies definition. Information about road conditions is obtained from monitoring. Available data are used to estimate and update prediction of degradation

  16. Mobility management in satellite networks

    Science.gov (United States)

    Johanson, Gary A.

    1995-01-01

    This paper addresses the methods used or proposed for use in multi-beam and/or multi-satellite networks designed to provide Mobile Satellite Services (MSS). Specific topics include beam crossover in the North American Mobile Satellite (MSAT) system as well as registration and live call hand-off for a multi-regional geosynchronous (GEO) satellite based system and a global coverage Low Earth Orbiting (LEO) system. In the MSAT system, the individual satellite beams cover very large geographic areas so the need for live call hand-off was not anticipated. This paper discusses the methods used to keep track of the beam location of the users so that incoming call announcements or other messages may be directed to them. Proposed new GEO systems with large numbers of beams will provide much smaller geographic coverage in individual beams and thus the need arises to keep track of the user's location as well as to provide live call hand-off as the user traverses from beam to beam. This situation also occurs in proposed LEO systems where the problems are worsened by the need for satellite to satellite hand-off as well as beam to beam hand-off within a single satellite. The paper discusses methods to accomplish these handoffs and proposes system architectures to address the various hand-off scenarios.

  17. Supply Chain Management in Industrial Symbiosis Networks

    DEFF Research Database (Denmark)

    Herczeg, Gabor

    2016-01-01

    , as well as in policy documents from e.g. the European Union, the concepts of circular econ- omy and closed-loop supply chains have received significant attention. One of the manifestations of these developments are industrial symbiosis networks. These networks are a collaborative effort to more...... sustainable production op- erations, and are characterized by a supply chain reconfiguration that uses one company’s wastes or by-products as a raw material for another company, avoiding waste disposal while also reducing material requirements. The re- sulting networks of relationships contribute to regional...... sustainable develop- ment efforts, and emphasize synergistic relations, community, and collabora- tion. This thesis takes an operations and supply chain management perspec- tive on industrial symbiosis networks. More specifically, the thesis elaborates on the collaborative and competitive characteristics...

  18. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  19. ATCA Shelf Manager EPICS device support for ITER CODAC Core System

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Bruno, E-mail: bsantos@ipfn.ist.utl.pt [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Carvalho, Paulo F.; Rodrigues, A.P.; Carvalho, Bernardo B.; Sousa, Jorge; Batista, António J.N.; Correia, Miguel; Combo, Álvaro M.; Cruz, Nuno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Correia, Carlos M.B.A. [Centro de Instrumentação, Departamento de Física, Universidade de Coimbra, 3004-516 Coimbra (Portugal); Gonçalves, Bruno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-10-15

    Highlights: • This architecture targets the health management integration into the NDS. • The developed solution supports the ShM redundancy features, specified by ATCA. • The average RTT was around 59 ms and in 99.9% of the cases was less than 130 ms. • Without losing any update cycle, can monitor a system shelf with approximately 400 sensors. • This solution enables the user to configure the entire system in DB files and st.cmd. - Abstract: The ITER CODAC Core System (CCS) is responsible for plant Instrumentation and Control (I&C) supervising and monitoring. This system uses the Enhanced Physics and Industrial Control System (EPICS) Channel Access (CA) protocol as the interface with the Plant Operation Network (PON). This paper presents a generic EPICS device support developed for the integration of the ATCA Shelf Manager (ShM) into the ITER CCS, providing scalability and easy configuration. The device support uses the available HTTP interface on Shelf Manager in the communication layer. Both HTTP server and sensors/actuators definitions can be configured using the EPICS database file and the Input/Output Controller (IOC) initialization file. A proposal based on this device is also presented, targeting the Nominal Device Support (NDS) for health management. The EPICS device support running in an IOC provides Process Variables (PV) to the PON network with the system information and these PVs can be used by all CA clients, such as EPICS user interface clients, alarm systems and archive systems. Operation with redundant ATCA ShMs and device support scalability tests were performed and the results are presented.

  20. Re-engineering Nascom's network management architecture

    Science.gov (United States)

    Drake, Brian C.; Messent, David

    1994-01-01

    The development of Nascom systems for ground communications began in 1958 with Project Vanguard. The low-speed systems (rates less than 9.6 Kbs) were developed following existing standards; but, there were no comparable standards for high-speed systems. As a result, these systems were developed using custom protocols and custom hardware. Technology has made enormous strides since the ground support systems were implemented. Standards for computer equipment, software, and high-speed communications exist and the performance of current workstations exceeds that of the mainframes used in the development of the ground systems. Nascom is in the process of upgrading its ground support systems and providing additional services. The Message Switching System (MSS), Communications Address Processor (CAP), and Multiplexer/Demultiplexer (MDM) Automated Control System (MACS) are all examples of Nascom systems developed using standards such as, X-windows, Motif, and Simple Network Management Protocol (SNMP). Also, the Earth Observing System (EOS) Communications (Ecom) project is stressing standards as an integral part of its network. The move towards standards has produced a reduction in development, maintenance, and interoperability costs, while providing operational quality improvement. The Facility and Resource Manager (FARM) project has been established to integrate the Nascom networks and systems into a common network management architecture. The maximization of standards and implementation of computer automation in the architecture will lead to continued cost reductions and increased operational efficiency. The first step has been to derive overall Nascom requirements and identify the functionality common to all the current management systems. The identification of these common functions will enable the reuse of processes in the management architecture and promote increased use of automation throughout the Nascom network. The MSS, CAP, MACS, and Ecom projects have indicated

  1. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  2. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  3. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  4. Improvised explosive devices: pathophysiology, injury profiles and current medical management.

    Science.gov (United States)

    Ramasamy, A; Hill, A M; Clasper, J C

    2009-12-01

    The improvised explosive device (IED), in all its forms, has become the most significant threat to troops operating in Afghanistan and Iraq. These devices range from rudimentary home made explosives to sophisticated weapon systems containing high-grade explosives. Within this broad definition they may be classified as roadside explosives and blast mines, explosive formed pojectile (EFP) devices and suicide bombings. Each of these groups causeinjury through a number of different mechanisms and can result in vastly different injury profiles. The "Global War on Terror" has meant that incidents which were previously exclusively seen in conflict areas, can occur anywhere, and clinicians who are involved in emergency trauma care may be required to manage casualties from similar terrorist attacks. An understanding of the types of devices and their pathophysiological effects is necessary to allow proper planning of mass casualty events and to allow appropriate management of the complex poly-trauma casualties they invariably cause. The aim of this review article is to firstly describe the physics and injury profile from these different devices and secondly to present the current clinical evidence that underpins their medical management.

  5. Mobile human network management and recommendation by probabilistic social mining.

    Science.gov (United States)

    Min, Jun-Ki; Cho, Sung-Bae

    2011-06-01

    Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.

  6. Dynamic spectrum management in green cognitive radio cellular networks

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2018-01-01

    In this paper, we propose a new cellular network operation scheme fulfilling the 5G requirements related to spectrum management and green communications. We focus on cognitive radio cellular networks in which both the primary network (PN

  7. DETERMINANTS OF NETWORK OUTCOMES: THE IMPACT OF MANAGEMENT STRATEGIES.

    Science.gov (United States)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-09-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more influence on network dynamics than previously theorized.

  8. The Marketing Plan: An Integrative Device for Teaching Marketing Management.

    Science.gov (United States)

    Berdine, W. R.; Petersen, James C.

    1980-01-01

    The importance of the marketing plan is stressed as an integrative device for teaching marketing management, and a structure is presented to assist students in designing a marketing plan. Components of this plan include marketing objectives, targeting market and buying motives, external environment and competition, product, price, and promotion.…

  9. Logic of Biomaterial devices from CLRI for wound management

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Logic of Biomaterial devices from CLRI for wound management. Designing of biodegradable scaffolds. Designing the scaffold. Host drugs and growth factors. Design controlled drug release only to the wound area (based on pH differentials). Smartness is built in ...

  10. Information and management system for the secondary electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Knezevic, M. (Rudnik i Termoelectrana Gacko u Osnivanju (Yugoslavia))

    1988-07-01

    Emphasizes the importance of a reliable and continuous secondary electrical distribution network for surface coal mine productivity. Interruptions in equipment operation caused by mechanical and electrical failures should be eliminated without delay. Effective communication systems should lead to reliable management and high productivity in mines. It is suggested that mines be divided into four groups according to their sensitivity to supply interruptions, and provided with remotely controlled signalling devices linked to main and auxiliary dispatching stations equipped with micro-computers. Productivity may be increased by some 50-70% and supply costs decreased by some 35% if appropriate electrical distribution systems are used. A sketch of a secondary electrical supply network is attached. 11 refs.

  11. The Managing Epilepsy Well Network:: Advancing Epilepsy Self-Management.

    Science.gov (United States)

    Sajatovic, Martha; Jobst, Barbara C; Shegog, Ross; Bamps, Yvan A; Begley, Charles E; Fraser, Robert T; Johnson, Erica K; Pandey, Dilip K; Quarells, Rakale C; Scal, Peter; Spruill, Tanya M; Thompson, Nancy J; Kobau, Rosemarie

    2017-03-01

    Epilepsy, a complex spectrum of disorders, affects about 2.9 million people in the U.S. Similar to other chronic disorders, people with epilepsy face challenges related to management of the disorder, its treatment, co-occurring depression, disability, social disadvantages, and stigma. Two national conferences on public health and epilepsy (1997, 2003) and a 2012 IOM report on the public health dimensions of epilepsy highlighted important knowledge gaps and emphasized the need for evidence-based, scalable epilepsy self-management programs. The Centers for Disease Control and Prevention translated recommendations on self-management research and dissemination into an applied research program through the Prevention Research Centers Managing Epilepsy Well (MEW) Network. MEW Network objectives are to advance epilepsy self-management research by developing effective interventions that can be broadly disseminated for use in people's homes, healthcare providers' offices, or in community settings. The aim of this report is to provide an update on the MEW Network research pipeline, which spans efficacy, effectiveness, and dissemination. Many of the interventions use e-health strategies to eliminate barriers to care (e.g., lack of transportation, functional limitations, and stigma). Strengths of this mature research network are the culture of collaboration, community-based partnerships, e-health methods, and its portfolio of prevention activities, which range from efficacy studies engaging hard-to-reach groups, to initiatives focused on provider training and knowledge translation. The MEW Network works with organizations across the country to expand its capacity, help leverage funding and other resources, and enhance the development, dissemination, and sustainability of MEW Network programs and tools. Guided by national initiatives targeting chronic disease or epilepsy burden since 2007, the MEW Network has been responsible for more than 43 scientific journal articles, two

  12. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  13. Software Health Management with Bayesian Networks

    Science.gov (United States)

    Mengshoel, Ole; Schumann, JOhann

    2011-01-01

    Most modern aircraft as well as other complex machinery is equipped with diagnostics systems for its major subsystems. During operation, sensors provide important information about the subsystem (e.g., the engine) and that information is used to detect and diagnose faults. Most of these systems focus on the monitoring of a mechanical, hydraulic, or electromechanical subsystem of the vehicle or machinery. Only recently, health management systems that monitor software have been developed. In this paper, we will discuss our approach of using Bayesian networks for Software Health Management (SWHM). We will discuss SWHM requirements, which make advanced reasoning capabilities for the detection and diagnosis important. Then we will present our approach to using Bayesian networks for the construction of health models that dynamically monitor a software system and is capable of detecting and diagnosing faults.

  14. Plasticity in memristive devices for Spiking Neural Networks

    Directory of Open Access Journals (Sweden)

    Sylvain eSaïghi

    2015-03-01

    Full Text Available Memristive devices present a new device technology allowing for the realization of compact nonvolatile memories. Some of them are already in the process of industrialization. Additionally, they exhibit complex multilevel and plastic behaviors, which make them good candidates for the implementation of artificial synapses in neuromorphic engineering. However, memristive effects rely on diverse physical mechanisms, and their plastic behaviors differ strongly from one technology to another. Here, we present measurements performed on different memristive devices and the opportunities that they provide. We show that they can be used to implement different learning rules whose properties emerge directly from device physics: real time or accelerated operation, deterministic or stochastic behavior, long term or short term plasticity. We then discuss how such devices might be integrated into a complete architecture. These results highlight that there is no unique way to exploit memristive devices in neuromorphic systems. Understanding and embracing device physics is the key for their optimal use.

  15. Smart home design for electronic devices monitoring based wireless gateway network using cisco packet tracer

    Science.gov (United States)

    Sihombing, Oloan; Zendrato, Niskarto; Laia, Yonata; Nababan, Marlince; Sitanggang, Delima; Purba, Windania; Batubara, Diarmansyah; Aisyah, Siti; Indra, Evta; Siregar, Saut

    2018-04-01

    In the era of technological development today, the technology has become the need for the life of today's society. One is needed to create a smart home in turning on and off electronic devices via smartphone. So far in turning off and turning the home electronic device is done by pressing the switch or remote button, so in control of electronic device control less effective. The home smart design is done by simulation concept by testing system, network configuration, and wireless home gateway computer network equipment required by a smart home network on cisco packet tracer using Internet Thing (IoT) control. In testing the IoT home network wireless network gateway system, multiple electronic devices can be controlled and monitored via smartphone based on predefined configuration conditions. With the Smart Ho me can potentially increase energy efficiency, decrease energy usage costs, control electronics and change the role of residents.

  16. Network resiliency through memory health monitoring and proactive management

    Science.gov (United States)

    Andrade Costa, Carlos H.; Cher, Chen-Yong; Park, Yoonho; Rosenburg, Bryan S.; Ryu, Kyung D.

    2017-11-21

    A method for managing a network queue memory includes receiving sensor information about the network queue memory, predicting a memory failure in the network queue memory based on the sensor information, and outputting a notification through a plurality of nodes forming a network and using the network queue memory, the notification configuring communications between the nodes.

  17. Integration of a network aware traffic generation device into a computer network emulation platform

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  18. Network position and related power : how they affect and are affected by network management and outcomes

    NARCIS (Netherlands)

    Oukes, Tamara

    2018-01-01

    In network position and related power you learn more about how network position and related power affect and are affected by network management and outcomes. First, I expand our present understanding of how startups with a fragile network position manage business relationships by taking an

  19. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Science.gov (United States)

    Valdivieso Caraguay, Ángel Leonardo; García Villalba, Luis Javier

    2017-01-01

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors. PMID:28362346

  20. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.

    Science.gov (United States)

    Caraguay, Ángel Leonardo Valdivieso; Villalba, Luis Javier García

    2017-03-31

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  1. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Ángel Leonardo Valdivieso Caraguay

    2017-03-01

    Full Text Available This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  2. Creating wi-fi bluetooth mesh network for crisis management applications

    Science.gov (United States)

    Al-Tekreeti, Safa; Adams, Christopher; Al-Jawad, Naseer

    2010-04-01

    This paper proposes a wireless mesh network implementation consisting of both Wi-Fi Ad-Hoc networks as well as Bluetooth Piconet/Scatternet networks, organised in an energy and throughput efficient structure. This type of networks can be easily constructed for Crises management applications, for example in an Earthquake disaster. The motivation of this research is to form mesh network from the mass availability of WiFi and Bluetooth enabled electronic devices such as mobile phones and PC's that are normally present in most regions were major crises occurs. The target of this study is to achieve an effective solution that will enable Wi-Fi and/or Bluetooth nodes to seamlessly configure themselves to act as a bridge between their own network and that of the other network to achieve continuous routing for our proposed mesh networks.

  3. Innovative, wearable snap connector technology for improved device networking in electronic garments

    Science.gov (United States)

    Kostrzewski, Andrew A.; Lee, Kang S.; Gans, Eric; Winterhalter, Carole A.; Jannson, Tomasz P.

    2007-04-01

    This paper discusses Physical Optics Corporation's (POC) wearable snap connector technology that provides for the transfer of data and power throughout an electronic garment (e-garment). These connectors resemble a standard garment button and can be mated blindly with only one hand. Fully compatible with military clothing, their application allows for the networking of multiple electronic devices and an intuitive method for adding/removing existing components from the system. The attached flexible cabling also permits the rugged snap connectors to be fed throughout the standard webbing found in military garments permitting placement in any location within the uniform. Variations of the snap electronics/geometry allow for integration with USB 2.0 devices, RF antennas, and are capable of transferring high bandwidth data streams such as the 221 Mbps required for VGA video. With the trend towards providing military officers with numerous electronic devices (i.e., heads up displays (HMD), GPS receiver, PDA, etc), POC's snap connector technology will greatly improve cable management resulting in a less cumbersome uniform. In addition, with electronic garments gaining widespread adoption in the commercial marketplace, POC's technology is finding applications in such areas as sporting good manufacturers and video game technology.

  4. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  5. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  6. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

    Science.gov (United States)

    Busdicker, Mike; Upendra, Priyanka

    2017-09-02

    This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.

  7. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  8. Managing Trust in Online Social Networks

    Science.gov (United States)

    Bhuiyan, Touhid; Josang, Audun; Xu, Yue

    In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations

  9. Managing logistical processes in franchise retail trade networks

    OpenAIRE

    Grigorenko Tatyana N.; Kochubey Dmitriy V.

    2013-01-01

    The article analyses approaches to organisation of internal logistics of franchise trade networks and methodical provision of assessment of results of logistical activity at companies of franchise networks. The article justifies urgency of application of referent models of management of supply chains in construction of a system of management of logistical activity of franchise networks. It offers classification of models of management of internal logistics of franchise retail trade networks. ...

  10. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  11. The 'new' occupation of network manager

    International Nuclear Information System (INIS)

    Vivies, P. de; Von Burchardt, F.; Cattoor, H.; Mendiluce, J.; Vercammen, F.

    2003-01-01

    This paper gathers 5 presentations given at the 2003 gas congress of Paris about the network management activity. The first presentation presents the point of view of the commission of energy regulation (CRE) about the opening of the gas market, the tariffing of gas network access, the transparency about the available capacities, the opening of the professionals market to competition and the works in progress. The second presentation deals with the evolution of the gas transport activity in Germany. The third presentation presents the EASEE-gas association for the development of common commercial practices in the European gas market. The forth presentation treats of the evolution of the Spanish gas distribution market, while the last presentation presents the evolution of the liquefied petroleum gases (LPG) sector with the example of the supply of Hiddensee island in the Baltic sea. (J.S.)

  12. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Directory of Open Access Journals (Sweden)

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  13. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  14. Twiddlenet: Metadata Tagging and Data Dissemination in Mobile Device Networks

    National Research Council Canada - National Science Library

    Clotfelter, Christopher T; Towle, Jonathon E

    2007-01-01

    .... TwiddleNet is a distributed architecture of personal servers that harnesses the power of these mobile devices, enabling real time information dissemination and file sharing of multiple data types...

  15. Self-Regulating Capillary Flow Networks for Electrospray Micropropulsion Devices

    Data.gov (United States)

    National Aeronautics and Space Administration — Advances in miniaturization of electronics and MEMS devices enable microsatellites and CubeSats to perform tasks that previously required massive satellites. Low...

  16. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  17. Strategy development management of Multimodal Transport Network

    Directory of Open Access Journals (Sweden)

    Nesterova Natalia S.

    2016-01-01

    Full Text Available The article gives a brief overview of works on the development of transport infrastructure for multimodal transportation and integration of Russian transport system into the international transport corridors. The technology for control of the strategy, that changes shape and capacity of Multi-modal Transport Network (MTN, is considered as part of the methodology for designing and development of MTN. This technology allows to carry out strategic and operational management of the strategy implementation based on the use of the balanced scorecard.

  18. Data management of protein interaction networks

    CERN Document Server

    Cannataro, Mario

    2012-01-01

    Interactomics: a complete survey from data generation to knowledge extraction With the increasing use of high-throughput experimental assays, more and more protein interaction databases are becoming available. As a result, computational analysis of protein-to-protein interaction (PPI) data and networks, now known as interactomics, has become an essential tool to determine functionally associated proteins. From wet lab technologies to data management to knowledge extraction, this timely book guides readers through the new science of interactomics, giving them the tools needed to: Generate

  19. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  20. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  1. Service and device discovery of nodes in a wireless sensor network

    NARCIS (Netherlands)

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  2. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  3. InP monolithically integrated label swapper device for spectral amplitude coded optical packet networks

    NARCIS (Netherlands)

    Muñoz, P.; García-Olcina, R.; Doménech, J.D.; Rius, M.; Sancho, J.C.; Capmany, J.; Chen, L.R.; Habib, C.; Leijtens, X.J.M.; Vries, de T.; Heck, M.J.R.; Augustin, L.M.; Nötzel, R.; Robbins, D.J.

    2010-01-01

    In this paper a label swapping device, for spectral amplitude coded optical packet networks, fully integrated using InP technology is presented. Compared to previous demonstrations using discrete component assembly, the device footprint is reduced by a factor of 105 and the operation speed is

  4. Secure Real-Time Monitoring and Management of Smart Distribution Grid using Shared Cellular Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Ganem, Hervé; Jorguseski, Ljupco

    2017-01-01

    capabilities. Thanks to the advanced measurement devices, management framework, and secure communication infrastructure developed in the FP7 SUNSEED project, the Distribution System Operator (DSO) now has full observability of the energy flows at the medium/low voltage grid. Furthermore, the prosumers are able......, where the smart grid ICT solutions are provided through shared cellular LTE networks....

  5. Effects of junctions on carbon nanotube network-based devices

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Pil Soo; Kim, Gyu Tae [School of Electrical Engineering, Korea University, Seoul 136-713 (Korea, Republic of)

    2011-11-15

    Realistic random networks of carbon nanotubes (CNTs) were simulated by the noble hybrid method combining Monte Carlo and SPICE simulations. Near the percolation threshold, the electrical characteristics of networks are strongly affected by the contacts among nanotubes. The nonlinear electrical junctions in the CNT network were modeled by suitable SPICE models and simulated using our hybrid simulation method. We successfully described the morphological percolation threshold, and the critical density was determined as a function of normalized length. The effects of electrical junctions on the scaling of the sheet conductance were investigated. (Copyright copyright 2011 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  6. An Implementation of a Network Configuration Management System ...

    African Journals Online (AJOL)

    The job of the network administrator becomes difficult as the number of hosts in a computer network increase. Network management requires the network administrator to have vital configuration information about hosts so as to provide viable solutions. In situations where the hosts span a large area or in several buildings as ...

  7. Detection of Traffic Initiated by Mobile Malware Targeting Android Devices in 3GPP Networks

    OpenAIRE

    Kühnel, Marián

    2017-01-01

    Android devices have become the most popular of mobile devices; omnipresent in both business and private use. They are virtually always on and offer functionalities exceeding those of desktop computers. These properties, as well as sensitive information stored on Android devices, render them an attractive target for mobile malware authors. As the volume of mobile malware increases, analysis is becoming challenging and, sometimes, infeasible. Additionally, current network-based intrusion detec...

  8. Physical removal of metallic carbon nanotubes from nanotube network devices using a thermal and fluidic process

    International Nuclear Information System (INIS)

    Ford, Alexandra C; Shaughnessy, Michael; Wong, Bryan M; Kane, Alexander A; Krafcik, Karen L; Léonard, François; Kuznetsov, Oleksandr V; Billups, W Edward; Hauge, Robert H

    2013-01-01

    Electronic and optoelectronic devices based on thin films of carbon nanotubes are currently limited by the presence of metallic nanotubes. Here we present a novel approach based on nanotube alkyl functionalization to physically remove the metallic nanotubes from such network devices. The process relies on preferential thermal desorption of the alkyls from the semiconducting nanotubes and the subsequent dissolution and selective removal of the metallic nanotubes in chloroform. The approach is versatile and is applied to devices post-fabrication. (paper)

  9. Cognitive interference management in heterogeneous networks

    CERN Document Server

    Marabissi, Dania

    2015-01-01

    This brief investigates the role of interference management in Heterogeneous Networks (Het Nets), focusing on cognitive approaches and the use of beamforming. Key concepts of Het Nets are introduced and different deployment strategies are examined, such as sharing the same frequency band of the macro cells or using new high frequency bands. Particular attention is devoted to co-channel deployment and to the problem of interference management, addressing various strategies that can be adopted to handle the interference between the cells. In addition, the brief explores cognitive small cells which are able to avoid or limit interference by using suitable beamforming and resource allocation schemes. The suggested solutions are supported by numerical results in terms of performance evaluations and comparisons.

  10. Management of Information Supporting Collaborative Networks

    Science.gov (United States)

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  11. Integrating wireless sensor networks with CE devices for health care activity tracking in the home environment

    NARCIS (Netherlands)

    Bosman, R.P.; Lukkien, J.J.; Verhoeven, R.

    2009-01-01

    Wireless sensing devices containing limited processing and communication capabilities are becoming available for all sorts of purposes. An important problem is to integrate networks of these sensors with the existing CE en IT infrastructure such that a) data coming out of the sensor network can be

  12. Photon management of GaN-based optoelectronic devices via nanoscaled phenomena

    KAUST Repository

    Tsai, Yu-Lin; Lai, Kun-Yu; Lee, Ming-Jui; Liao, Yu-Kuang; Ooi, Boon S.; Kuo, Hao-Chung; He, Jr-Hau

    2016-01-01

    Photon management is essential in improving the performances of optoelectronic devices including light emitting diodes, solar cells and photo detectors. Beyond the advances in material growth and device structure design, photon management via

  13. 78 FR 35940 - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Draft...

    Science.gov (United States)

    2013-06-14

    ...] Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Draft Guidance for... draft guidance entitled ``Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.'' This guidance identifies cybersecurity issues that manufacturers should consider in preparing...

  14. Distributed Prognostics and Health Management with a Wireless Network Architecture

    Science.gov (United States)

    Goebel, Kai; Saha, Sankalita; Sha, Bhaskar

    2013-01-01

    A heterogeneous set of system components monitored by a varied suite of sensors and a particle-filtering (PF) framework, with the power and the flexibility to adapt to the different diagnostic and prognostic needs, has been developed. Both the diagnostic and prognostic tasks are formulated as a particle-filtering problem in order to explicitly represent and manage uncertainties in state estimation and remaining life estimation. Current state-of-the-art prognostic health management (PHM) systems are mostly centralized in nature, where all the processing is reliant on a single processor. This can lead to a loss in functionality in case of a crash of the central processor or monitor. Furthermore, with increases in the volume of sensor data as well as the complexity of algorithms, traditional centralized systems become for a number of reasons somewhat ungainly for successful deployment, and efficient distributed architectures can be more beneficial. The distributed health management architecture is comprised of a network of smart sensor devices. These devices monitor the health of various subsystems or modules. They perform diagnostics operations and trigger prognostics operations based on user-defined thresholds and rules. The sensor devices, called computing elements (CEs), consist of a sensor, or set of sensors, and a communication device (i.e., a wireless transceiver beside an embedded processing element). The CE runs in either a diagnostic or prognostic operating mode. The diagnostic mode is the default mode where a CE monitors a given subsystem or component through a low-weight diagnostic algorithm. If a CE detects a critical condition during monitoring, it raises a flag. Depending on availability of resources, a networked local cluster of CEs is formed that then carries out prognostics and fault mitigation by efficient distribution of the tasks. It should be noted that the CEs are expected not to suspend their previous tasks in the prognostic mode. When the

  15. Critical appraisal of cardiac implantable electronic devices: complications and management

    Directory of Open Access Journals (Sweden)

    Padeletti L

    2011-09-01

    Full Text Available Luigi Padeletti1, Giosuè Mascioli2, Alessandro Paoletti Perini1, Gino Grifoni1, Laura Perrotta1, Procolo Marchese3, Luca Bontempi3, Antonio Curnis31Istituto di Clinica Medica e Cardiologia, Università degli Studi di Firenze, Italia; 2Elettrofisiologia, Istituto Humanitas Gavazzeni, Bergamo, Italia; 3Elettrofisiologia, Spedali Civili, Brescia, ItaliaAbstract: Population aging and broader indications for the implant of cardiac implantable electronic devices (CIEDs are the main reasons for the continuous increase in the use of pacemakers (PMs, implantable cardioverter-defibrillators (ICDs and devices for cardiac resynchronization therapy (CRT-P, CRT-D. The growing burden of comorbidities in CIED patients, the greater complexity of the devices, and the increased duration of procedures have led to an augmented risk of infections, which is out of proportion to the increase in implantation rate. CIED infections are an ominous condition, which often implies the necessity of hospitalization and carries an augmented risk of in-hospital death. Their clinical presentation may be either at pocket or at endocardial level, but they can also manifest themselves with lone bacteremia. The management of these infections requires the complete removal of the device and subsequent, specific, antibiotic therapy. CIED failures are monitored by competent public authorities, that require physicians to alert them to any failures, and that suggest the opportune strategies for their management. Although the replacement of all potentially affected devices is often suggested, common practice indicates the replacement of only a minority of devices, as close follow-up of the patients involved may be a safer strategy. Implantation of a PM or an ICD may cause problems in the patients' psychosocial adaptation and quality of life, and may contribute to the development of affective disorders. Clinicians are usually unaware of the psychosocial impact of implanted PMs and ICDs. The

  16. Electromechanically Actuated Multifunctional Wireless Auxetic Device for Wound Management.

    Science.gov (United States)

    Mir, Mariam; Ansari, Umar; Ali, Murtaza Najabat; Iftikhar, Muhammad Hassan Ul; Qayyum, Faisal

    2017-01-01

    The design and fabrication of a wound healing device for chronic wounds, with multiple functions for controlled drug delivery and exudate removal, has been described in this paper. The structural features have been machined and modified through laser cutting in a biocompatible polymer cast. Miniaturized versions of electronically actuated (lead-screw and pulley) mechanisms are used for the specific purpose of controlled drug delivery. These mechanisms have been studied and tested, being controlled through a microcontroller setup. An auxetic polymeric barrier membrane has been used for restricting the drug quantities administered. Drug delivery mechanisms are powered wirelessly, through an external, active RF component; this communicates with a passive component that is buried inside the wound healing device. The exudate removal efficiency of the device has been assessed through several simple tests using simulated wound exudate. It has been found that reasonably precise quantities of drug dosages to be administered to the wound site can be controlled through both drug delivery mechanisms; however, the lead-screw mechanism provides a better control of auxetic barrier membrane actuation and hence controlled drug delivery. We propose that this device can have potential clinical significance in controlled drug delivery and exudate removal in the management of chronic wounds.

  17. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-02-07

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  18. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user's trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  19. Advanced business process management in networked E-business scenarios

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Türetken, O.

    2017-01-01

    In the modern economy, we see a shift towards networked business scenarios. In many contemporary situations, the operation of multiple organizations is tightly coupled in collaborative business networks. To allow this tightly coupled collaboration, business process management (BPM) in these

  20. Picture this: Managed change and resistance in business network settings

    DEFF Research Database (Denmark)

    Kragh, Hanne; Andersen, Poul Houman

    2009-01-01

    This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...

  1. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  2. Management of mandated networks from a dynamic perspective

    NARCIS (Netherlands)

    Segato, Federica; Raab, J.

    2017-01-01

    The management of networks has received increasing attention in recent years in the form of systematic empirical research. The general thrust of the results seem to indicate that network management resembles what we know about general management. However, there are also specific characteristics of

  3. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  4. Regenerable Photovoltaic Devices with a Hydrogel-Embedded Microvascular Network

    Science.gov (United States)

    Koo, Hyung-Jun; Velev, Orlin D.

    2013-01-01

    Light-driven degradation of photoactive molecules could be one of the major obstacles to stable long term operation of organic dye-based solar light harvesting devices. One solution to this problem may be mimicking the regeneration functionality of a plant leaf. We report an organic dye photovoltaic system that has been endowed with such microfluidic regeneration functionality. A hydrogel medium with embedded channels allows rapid and uniform supply of photoactive reagents by a convection-diffusion mechanism. A washing-activation cycle enables reliable replacement of the organic component in a dye-sensitized photovoltaic system. Repetitive restoration of photovoltaic performance after intensive device degradation is demonstrated. PMID:23912814

  5. Management of seismic data on network

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Bu Heung [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    KIGAM has managed magnetic tapes written in seismic data acquired in Korea offshore and abroad since 1979. For now, it amounts about 13,000 tapes and other documents of seismic data are reserved by KIGAM also. For handling with them, FOX-PRO database management system has been used since 1993. In case of one user, it seems useful and convenient because the program is very easy to use and many well done utility was provided. In contrast with that, it has many problems also. For example, a user who wants to query information of these magnetic tapes must go magnetic tape room where the system is installed and he must know how to use the utilities of the FOX-PRO database management system. For the reason of above, the seismic data processing team attempted to change the FOX-PRO system with other client-server system supports networking on internet. After many testing and considering, they selected like as following hardware and software( System: PC with networking, OS: Linux and Unix, Software: Just Logic/SQL). The main reasons for selecting above system, first, any kinds of personal computer are available and easy to get. Secondly, Linux and Unix OS are good for using network. Especially, Linux is free and easy to get on many internet ftp sites. Lastly Just Logic/SQL is for client-server system, supports Linux OS and the programming style is very similar to C language. The contents of this report are as follows. In chapter 2, the Just Logic/SQL system structure and existing files through the sub-directories are showed and commented. In chapter 3, the statements using in Just Logic/SQL are explained and some examples are showed. In chapter 4, shows two example programs making seismic database including rack list, optical disk table respectively. The rack list table is the database of magnetic tapes managed by KIGAM. The optical disk table is the information record about how many, what tapes are converted to optical disk. (author). 4 tabs.

  6. Research on University Network Teaching Platform (Blackboard in Teaching Management

    Directory of Open Access Journals (Sweden)

    Gou Zhao Xia

    2016-01-01

    Full Text Available With rapid development of online education; teaching platform based on the network, as a new instructional mode has become a hot topic in online teaching. In this paper, the he teaching situation and existing problems on online was analyzed by comparing the difference between network teaching platform and traditional classroom teaching. Then the strategies of network teaching management and the case, which is focusing on the characteristics of Blackboard with the application of network teaching management was presents.

  7. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  8. PIYAS-Proceeding to Intelligent Service Oriented Memory Allocation for Flash Based Data Centric Sensor Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanam Shahla Rizvi

    2009-12-01

    Full Text Available Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS. This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  9. PIYAS-proceeding to intelligent service oriented memory allocation for flash based data centric sensor devices in wireless sensor networks.

    Science.gov (United States)

    Rizvi, Sanam Shahla; Chung, Tae-Sun

    2010-01-01

    Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS). This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  10. Management information system of medical equipment using mobile devices

    Science.gov (United States)

    Núñez, C.; Castro, D.

    2011-09-01

    The large numbers of technologies currently incorporated into mobile devices transform them into excellent tools for capture and to manage the information, because of the increasing computing power and storage that allow to add many miscellaneous applications. In order to obtain benefits of these technologies, in the biomedical engineering field, it was developed a mobile information system for medical equipment management. The central platform for the system it's a mobile phone, which by a connection with a web server, it's capable to send and receive information relative to any medical equipment. Decoding a type of barcodes, known as QR-Codes, the management process is simplified and improved. These barcodes identified the medical equipments in a database, when these codes are photographed and decoded with the mobile device, you can access to relevant information about the medical equipment in question. This Project in it's actual state is a basic support tool for the maintenance of medical equipment. It is also a modern alternative, competitive and economic in the actual market.

  11. Forensic analysis of social networking application on iOS devices

    Science.gov (United States)

    Zhang, Shuhui; Wang, Lianhai

    2013-12-01

    The increased use of social networking application on iPhone and iPad make these devices a goldmine for forensic investigators. Besides, QQ, Wechat, Sina Weibo and skype applications are very popular in China and didn't draw attention to researchers. These social networking applications are used not only on computers, but also mobile phones and tablets. This paper focuses on conducting forensic analysis on these four social networking applications on iPhone and iPad devices. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application and correlation analysis with other activities. Advices to the forensic investigators are also given. It could help the investigators to describe the crime behavior and reconstruct the crime venue.

  12. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  13. EPICS device support module as ATCA system manager for the ITER fast plant system controller

    Energy Technology Data Exchange (ETDEWEB)

    Carvalho, Paulo F., E-mail: pricardofc@ipfn.ist.utl.pt [Associação EURATOM/IST, Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico – Universidade Técnica de Lisboa, Lisboa (Portugal); Santos, Bruno; Gonçalves, Bruno; Carvalho, Bernardo B.; Sousa, Jorge; Rodrigues, A.P.; Batista, António J.N.; Correia, Miguel; Combo, Álvaro [Associação EURATOM/IST, Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico – Universidade Técnica de Lisboa, Lisboa (Portugal); Correia, Carlos M.B.A. [Centro de Instrumentação, Departamento de Física, Universidade de Coimbra, Coimbra (Portugal); Varandas, Carlos A.F. [Associação EURATOM/IST, Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico – Universidade Técnica de Lisboa, Lisboa (Portugal)

    2013-10-15

    Highlights: ► In Nuclear Fusion, demanding security and high-availability requirements call for redundancy to be available. ► ATCA based Nuclear Fusion Systems are composed by several electronic and mechanical component. ► Control and monitoring of ATCA electronic systems are recommended. ► ITER Fast Plant System Controller Project CODAC system prototype. ► EPICS device support module as External ATCA system manager solution. -- Abstract: This paper presents an Enhanced Physics and Industrial Control System (EPICS) device support module for the International Thermonuclear Experimental Reactor (ITER) Fast Plant System Controller (FPSC) project based in Advanced Telecommunications Computing Architecture (ATCA) specification. The developed EPICS device support module provides an External System Manager (ESM) solution for monitoring and control the ITER FPSC ATCA shelf system and data acquisition boards in order to take proper action and report problems to a control room operator or high level management unit in case of any system failure occurrence. EPICS device support module acts as a Channel Access (CA) server to report problems and publish ATCA system data information to the control room operator, high level management unit or other CA network clients such as Control System Studio Operator Interfaces (CSS OPIs), Best Ever Alarm System Toolkit (BEAST), Best Ever Archive Utility (BEAUTY) or other CA client applications. EPICS device support module communicates with the ATCA Shelf manager (ShM) using HTTP protocol to send and receive commands through POST method in order to get and set system and shelf components properties such as fan speeds measurements, temperatures readings, module status and ATCA boards acquisition and configuration parameters. All system properties, states, commands and parameters are available through the EPICS device support module CA server in EPICS Process Variables (PV) and signals format. ATCA ShM receives the HTTP protocol

  14. Security Frameworks for Machine-to-Machine Devices and Networks

    Science.gov (United States)

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  15. Social Networks and Welfare in Future Animal Management.

    Science.gov (United States)

    Koene, Paul; Ipema, Bert

    2014-03-17

    It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal species. Social Network Analysis (SNA) facilitates the characterization of social networking at group, subgroup and individual levels. SNA is currently used for modeling the social behavior and management of wild animals and social welfare of zoo animals. It has been recognized for use with farm animals but has yet to be applied for management purposes. Currently, the main focus is on cattle, because in large groups (poultry), recording of individuals is expensive and the existence of social networks is uncertain due to on-farm restrictions. However, in many cases, a stable social network might be important to individual animal fitness, survival and welfare. For instance, when laying hens are not too densely housed, simple networks may be established. We describe here small social networks in horses, brown bears, laying hens and veal calves to illustrate the importance of measuring social networks among animals managed by humans. Emphasis is placed on the automatic measurement of identity, location, nearest neighbors and nearest neighbor distance for management purposes. It is concluded that social networks are important to the welfare of human-managed animal species and that welfare management based on automatic recordings will become available in the near future.

  16. Transparent Electrodes Based on Silver Nanowire Networks: From Physical Considerations towards Device Integration.

    Science.gov (United States)

    Bellet, Daniel; Lagrange, Mélanie; Sannicolo, Thomas; Aghazadehchors, Sara; Nguyen, Viet Huong; Langley, Daniel P; Muñoz-Rojas, David; Jiménez, Carmen; Bréchet, Yves; Nguyen, Ngoc Duy

    2017-05-24

    The past few years have seen a considerable amount of research devoted to nanostructured transparent conducting materials (TCM), which play a pivotal role in many modern devices such as solar cells, flexible light-emitting devices, touch screens, electromagnetic devices, and flexible transparent thin film heaters. Currently, the most commonly used TCM for such applications (ITO: Indium Tin oxide) suffers from two major drawbacks: brittleness and indium scarcity. Among emerging transparent electrodes, silver nanowire (AgNW) networks appear to be a promising substitute to ITO since such electrically percolating networks exhibit excellent properties with sheet resistance lower than 10 Ω/sq and optical transparency of 90%, fulfilling the requirements of most applications. In addition, AgNW networks also exhibit very good mechanical flexibility. The fabrication of these electrodes involves low-temperature processing steps and scalable methods, thus making them appropriate for future use as low-cost transparent electrodes in flexible electronic devices. This contribution aims to briefly present the main properties of AgNW based transparent electrodes as well as some considerations relating to their efficient integration in devices. The influence of network density, nanowire sizes, and post treatments on the properties of AgNW networks will also be evaluated. In addition to a general overview of AgNW networks, we focus on two important aspects: (i) network instabilities as well as an efficient Atomic Layer Deposition (ALD) coating which clearly enhances AgNW network stability and (ii) modelling to better understand the physical properties of these networks.

  17. A Holistic Management Architecture for Large-Scale Adaptive Networks

    National Research Council Canada - National Science Library

    Clement, Michael R

    2007-01-01

    This thesis extends the traditional notion of network management as an indicator of resource availability and utilization into a systemic model of resource requirements, capabilities, and adaptable...

  18. Influence of TCSC Devices on Congestion Management in a Deregulated Power System Using Evolutionary Programming Technique

    Science.gov (United States)

    Ananthichristy, A., Dr.; Elanthirayan, R.; Brindha, R., Dr.; Siddhiq, M. S.; Venkatesh, N.; Harshit, M. V.; Nikhilreddy, M.

    2018-04-01

    Congestion management is one of the technical challenges in power system deregulation. In deregulated electricity market it may always not be possible to dispatch all of the contracted power transactions due to congestion of the transmission corridors. Transmission congestion occurs when there is insufficient transmission capacity to simultaneously accommodate all constraints for transmission of a line. Flexible Alternative Current Transmission System (FACTS) devices can be an alternative to reduce the flows in the heavily loaded lines, resulting in an increased loadability, low system loss, improved stability of the network, reduced cost of production and fulfilled contractual requirement by controlling the power flow in the network. A method to determine the optimal location of FACTS has been suggested based on reduction of total system VAR power losses. The simulation was done on IEEE 14 bus system and results were obtained.

  19. Laser Processed Silver Nanowire Network Transparent Electrodes for Novel Electronic Devices

    Science.gov (United States)

    Spechler, Joshua Allen

    Silver nanowire network transparent conducting layers are poised to make headway into a space previously dominated by transparent conducting oxides due to the promise of a flexible, scaleable, lab-atmosphere processable alternative. However, there are many challenges standing in the way between research scale use and consumer technology scale adaptation of this technology. In this thesis we will explore many, and overcome a few of these challenges. We will address the poor conductivity at the narrow nanowire-nanowire junction points in the network by developing a laser based process to weld nanowires together on a microscopic scale. We address the need for a comparative metric for transparent conductors in general, by taking a device level rather than a component level view of these layers. We also address the mechanical, physical, and thermal limitations to the silver nanowire networks by making composites from materials including a colorless polyimide and titania sol-gel. Additionally, we verify our findings by integrating these processes into devices. Studying a hybrid organic/inorganic heterojunction photovoltaic device we show the benefits of a laser processed electrode. Green phosphorescent organic light emitting diodes fabricated on a solution phase processed silver nanowire based electrode show favorable device metrics compared to a conductive oxide electrode based control. The work in this thesis is intended to push the adoption of silver nanowire networks to further allow new device architectures, and thereby new device applications.

  20. Wireless Sensor Networks Database: Data Management and Implementation

    Directory of Open Access Journals (Sweden)

    Ping Liu

    2014-04-01

    Full Text Available As the core application of wireless sensor network technology, Data management and processing have become the research hotspot in the new database. This article studied mainly data management in wireless sensor networks, in connection with the characteristics of the data in wireless sensor networks, discussed wireless sensor network data query, integrating technology in-depth, proposed a mobile database structure based on wireless sensor network and carried out overall design and implementation for the data management system. In order to achieve the communication rules of above routing trees, network manager uses a simple maintenance algorithm of routing trees. Design ordinary node end, server end in mobile database at gathering nodes and mobile client end that can implement the system, focus on designing query manager, storage modules and synchronous module at server end in mobile database at gathering nodes.

  1. Collaborative Manufacturing Management in Networked Supply Chains

    Science.gov (United States)

    Pouly, Michel; Naciri, Souleiman; Berthold, Sébastien

    ERP systems provide information management and analysis to industrial companies and support their planning activities. They are currently mostly based on theoretical values (averages) of parameters and not on the actual, real shop floor data, leading to disturbance of the planning algorithms. On the other hand, sharing data between manufacturers, suppliers and customers becomes very important to ensure reactivity towards markets variability. This paper proposes software solutions to address these requirements and methods to automatically capture the necessary corresponding shop floor information. In order to share data produced by different legacy systems along the collaborative networked supply chain, we propose to use the Generic Product Model developed by Hitachi to extract, translate and store heterogeneous ERP data.

  2. Safeguards Accountability Network accountability and materials management

    International Nuclear Information System (INIS)

    Carnival, G.J.; Meredith, E.M.

    1985-01-01

    The Safeguards Accountability Network (SAN) is an on-line accountability system used by Rocky Flats Plant to provide accountability control of its nuclear material inventory. The system is also used to monitor and evaluate the use of the nuclear material inventory against programmatic objectives for materials management. The SAN system utilizes two Harris 800 Computers as central processing units. Enhancement plans are currently being formulated to provide automated data collection from process operations on the shop floor and from non-destructive analysis safeguards instrumentation. SAN, discussed in this paper, is an excellent system for basic accountability control of nuclear materials inventories and is a quite useful tool in evaluating the efficient use of nuclear materials inventories at Rocky Flats Plant

  3. QoS and energy management in cognitive radio network case study approach

    CERN Document Server

    Mishra, Vishram; Lau, Chiew-Tong

    2017-01-01

    This book covers the important aspects involved in making cognitive radio devices portable, mobile and green, while also extending their service life. At the same time, it presents a variety of established theories and practices concerning cognitive radio from academia and industry. Cognitive radio can be utilized as a backbone communication medium for wireless devices. To effectively achieve its commercial application, various aspects of quality of service and energy management need to be addressed. The topics covered in the book include energy management and quality of service provisioning at Layer 2 of the protocol stack from the perspectives of medium access control, spectrum selection, and self-coexistence for cognitive radio networks.

  4. Information Collection using Handheld Devices in Unreliable Networking Environments

    Science.gov (United States)

    2014-06-01

    joint logistics operations center JMS Java Message System JUNG Java Universal Network/Graph Framework KTG Kestral Technology Group MILOB... Java Message System, a Publisher/Subscriber system that is explained in greater detail at either Oracle’s JMS site (Oracle 2014) or the JMS Wikipedia...Google’s infrastructure and local servers with MySQL and PostgreSQL on the backend (ODK 2014b). (2) Google Fusion Tables are used to do basic link

  5. Locating of Series FACTS Devices for Multi-Objective Congestion Management Using Components of Nodal Prices

    Directory of Open Access Journals (Sweden)

    A. R. Moradi

    2017-03-01

    Full Text Available Congestion and overloading for lines are the main problems in the exploitation of power grids. The consequences of these problems in deregulated systems can be mentioned as sudden jumps in prices in some parts of the power system, lead to an increase in market power and reduction of competition in it. FACTS devices are efficient, powerful and economical tools in controlling power flows through transmission lines that play a fundamental role in congestion management. However, after removing congestion, power systems due to targeting security restrictions may be managed with a lower voltage or transient stability rather than before removing. Thus, power system stability should be considered within the construction of congestion management. In this paper, a multi-objective structure is presented for congestion management that simultaneously optimizes goals such as total operating cost, voltage and transient security. In order to achieve the desired goals, locating and sizing of series FACTS devices are done with using components of nodal prices and the newly developed grey wolf optimizer (GWO algorithm, respectively. In order to evaluate reliability of mentioned approaches, a simulation is done on the 39-bus New England network.

  6. Nanomaterials for LightManagement in Electro-Optical Devices

    Energy Technology Data Exchange (ETDEWEB)

    Truong, Vo-Van [Concordia University, Montréal, Québec, H4B 1R6, Canada; Singh, Jai [Charles Darwin University, Darwin, Australia; Tanemura, Sakae [Japan Fine Ceramics Center, Nagoya, Japan; Hu, Michael Z. [ORNL

    2012-01-01

    In the past decade, nanostructured materials and nanoparticles have emerged as the necessary ingredients for electrooptical applications and enhancement of device performance, in particular by making use of the light management aspects of the nanomaterials. The application areas that are being transformed profoundly include smart coating devices (e.g., electrochromic, photochromic, and thermochromic devices), solar energy, and sensing. Despite the large volume of work in the past on smart coating devices, and in particular on electrochromic devices and thermochromic fenestrations, for optical transmission or reflection control, applications remain limited because of slow response time and nonuniformity in the case of large surfaces. Recent works in the field indicate that nanostructured electrochromic coatings would be an integral part of the solution to the above problem. One aspect that can thus be focused on would be the fabrication and characterization of the nanostructured smart coating materials and their compatibility with other layers in the overall smart coating device. In the area of solar photovoltaics, nanomaterials have been used in designing light-trapping schemes for inorganic as well as organic solar cells. One particular category of solar cells that has attracted much interest is the plasmonic solar cells in which metallic nanoparticles are incorporated, helping in enhancing their energy conversion efficiency. Nanostructured solar cells would eventually develop into a 'game changing' technology for making solar cells that are affordable and highly efficient, providing a sizeable alternative energy source for our ever-increasing energy needs. Sensors based on the optical properties of constituting nanostructures and nanoparticles also form a most interesting class of bio- and electrochemical sensing devices. The possibility of synthetizing nanoparticles and structures of specifically desired sizes and shapes has indeed opened a whole new

  7. Modeling management of research and education networks

    NARCIS (Netherlands)

    Galagan, D.V.

    2004-01-01

    Computer networks and their services have become an essential part of research and education. Nowadays every modern R&E institution must have a computer network and provide network services to its students and staff. In addition to its internal computer network, every R&E institution must have a

  8. On Transmission Policies in Multihop Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2016-01-01

    Ideal transmission policies are relevant nowadays to reduce energy consumption or increase throughput in mobile networks. In this work, we propose two recoding schemes with collision avoidance mechanism to reduce the number of transmission required to convey a batch of packets from a source...

  9. Policy-based Network Management in Home Area Networks: Interim Test Results

    OpenAIRE

    Ibrahim Rana, Annie; Ó Foghlú, Mícheál

    2009-01-01

    This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...

  10. Developing and Testing SpaceWire Devices and Networks

    Science.gov (United States)

    Parkes, Steve; Mills, Stuart

    2014-08-01

    SpaceWire is a data-handling network for use on-board spacecraft, which connects together instruments, mass- memory, processors, downlink telemetry, and other on- board sub-systems [1]. SpaceWire is simple to implement and has some specific characteristics that help it support data-handling applications in space: high-speed, low-power, simplicity, relatively low implementation cost, and architectural flexibility making it ideal for many space missions. SpaceWire provides high-speed (2 Mbits/s to 200 Mbits/s), bi- directional, full-duplex data-links, which connect together SpaceWire enabled equipment. Data-handling networks can be built to suit particular applications using point-to-point data-links and routing switches.Since the SpaceWire standard was published in January 2003, it has been adopted by ESA, NASA, JAXA and RosCosmos for many missions and is being widely used on scientific, Earth observation, commercial and other spacecraft. High-profile missions using SpaceWire include: Gaia, ExoMars rover, Bepi- Colombo, James Webb Space Telescope, GOES-R, Lunar Reconnaissance Orbiter and Astro-H.The development and testing of the SpaceWire links and networks used on these and many other spacecraft currently under development, requires a comprehensive array of test equipment. In this paper the requirements for test equipment fulfilling key test functions are outlined and then equipment that meets these requirements is described. Finally the all-important software that operates with the test equipment is introduced.

  11. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of

  12. Game-Theoretic Social-Aware Resource Allocation for Device-to-Device Communications Underlaying Cellular Network

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2018-01-01

    Full Text Available Device-to-Device communication underlaying cellular network can increase the spectrum efficiency due to direct proximity communication and frequency reuse. However, such performance improvement is influenced by the power interference caused by spectrum sharing and social characteristics in each social community jointly. In this investigation, we present a dynamic game theory with complete information based D2D resource allocation scheme for D2D communication underlaying cellular network. In this resource allocation method, we quantify both the rate influence from the power interference caused by the D2D transmitter to cellular users and rate enhancement brought by the social relationships between mobile users. Then, the utility function maximization game is formulated to optimize the overall transmission rate performance of the network, which synthetically measures the final influence from both power interference and sociality enhancement. Simultaneously, we discuss the Nash Equilibrium of the proposed utility function maximization game from a theoretical point of view and further put forward a utility priority searching algorithm based resource allocation scheme. Simulation results show that our proposed scheme attains better performance compared with the other two advanced proposals.

  13. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  14. Maintenance Management in Network Utilities Framework and Practical Implementation

    CERN Document Server

    Gómez Fernández, Juan F

    2012-01-01

    In order to satisfy the needs of their customers, network utilities require specially developed maintenance management capabilities. Maintenance Management information systems are essential to ensure control, gain knowledge and improve-decision making in companies dealing with network infrastructure, such as distribution of gas, water, electricity and telecommunications. Maintenance Management in Network Utilities studies specified characteristics of maintenance management in this sector to offer a practical approach to defining and implementing  the best management practices and suitable frameworks.   Divided into three major sections, Maintenance Management in Network Utilities defines a series of stages which can be followed to manage maintenance frameworks properly. Different case studies provide detailed descriptions which illustrate the experience in real company situations. An introduction to the concepts is followed by main sections including: • A Literature Review: covering the basic concepts an...

  15. Evaluation of constrained mobility for programmability in network management

    NARCIS (Netherlands)

    Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.

    2000-01-01

    In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While

  16. Self-management of Hybrid Networks: Introduction, Pros and Cons

    NARCIS (Netherlands)

    Fioreze, Tiago; Pras, Aiko; Lehnert, Ralf

    In the last decade ‘self-management’ has become a popular research theme within the networking community. While reading papers, one could get the impression that self-management is the obvious solution to solve many of the current network management problems. There are hardly any publications,

  17. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  18. Design Management in the Textile Industry - A Network Perspective

    DEFF Research Database (Denmark)

    Christensen, Poul Rind; Bang, Anne Louise

    In this paper we explore textile design activities and textile design management from an industrial network perspective. The textile industry is probably one of the most globalized manufacturing industries in the world and thus one of the most dispersed industries on the globe. Most studies on de...... management in order to maintain the relationships in their network of customers and suppliers....

  19. The Analysis of User Behaviour of a Network Management Training Tool using a Neural Network

    Directory of Open Access Journals (Sweden)

    Helen Donelan

    2005-10-01

    Full Text Available A novel method for the analysis and interpretation of data that describes the interaction between trainee network managers and a network management training tool is presented. A simulation based approach is currently being used to train network managers, through the use of a simulated network. The motivation is to provide a tool for exposing trainees to a life like situation without disrupting a live network. The data logged by this system describes the detailed interaction between trainee network manager and simulated network. The work presented here provides an analysis of this interaction data that enables an assessment of the capabilities of the trainee network manager as well as an understanding of how the network management tasks are being approached. A neural network architecture is implemented in order to perform an exploratory data analysis of the interaction data. The neural network employs a novel form of continuous self-organisation to discover key features in the data and thus provide new insights into the learning and teaching strategies employed.

  20. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  1. Computerized management of radiology department: Installation and use of local area network(LAN) by personal computers

    International Nuclear Information System (INIS)

    Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo

    1993-01-01

    There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe

  2. A Hardware-Supported Algorithm for Self-Managed and Choreographed Task Execution in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Borja Bordel

    2018-03-01

    Full Text Available Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices. On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations.

  3. Mobile Device Management horizons for CERN Managed iOS and Mac Self-Service

    CERN Multimedia

    CERN. Geneva; MUSZKOWSKI, Maciek; BIPPUS, Vincent Nicolas

    2015-01-01

    Overview of the MDM (Mobile Device Mamagement) market in the context of the CERN needs and a discussion of technical capabilities of a range of MDM products, followed by a presentation of two new functionalities implemented using an MDM: Self-service Kiosk for Mac and delegated-management solution for professional tablets.

  4. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    KAUST Repository

    Elrasad, Amr Elsayed M.

    2016-05-15

    The increasing bandwidth demands in access networks motivates network operators, networking devices manufacturers, and standardization institutions to search for new approaches for access networks. These approaches should support higher bandwidth, longer distance between end user and network operator, and less energy consumption. Ethernet Passive Optical Network (EPON) is a favorable choice for broadband access networks. EPONs support transmission rates up to 10 Gbps. EPONs also support distance between end users and central office up to 20 Km. Moreover, optical networks have the least energy consumption among all types of networks. In this dissertation, we focus on reducing delay and saving energy in EPONs. Reducing delay is essential for delay-sensitive traffic, while minimizing energy consumption is an environmental necessity and also reduces the network operating costs. We identify five challenges, namely excess bandwidth allocation, frame delineation, congestion resolution, large round trip time delay in long-reach EPONs (LR-EPONs), and energy saving. We provide a Dynamic Bandwidth Allocation (DBA) approach for each challenge. We also propose a novel scheme that combines the features of the proposed approaches in one highly performing scheme. Our approach is to design novel DBA protocols that can further reduce the delay and be simultaneously simple and fair. We also present a dynamic bandwidth allocation scheme for Green EPONs taking into consideration maximizing energy saving under target delay constraints. Regarding excess bandwidth allocation, we develop an effective DBA scheme called Delayed Excess Scheduling (DES). DES achieves significant delay and jitter reduction and is more suitable for industrial deployment due to its simplicity. Utilizing DES in hybrid TDM/WDM EPONs (TWDM-EPONs) is also investigated. We also study eliminating the wasted bandwidth due to frame delineation. We develop an interactive DBA scheme, Efficient Grant Sizing Interleaved

  5. The enhancing impact of friendship networks on sales managers' performance

    OpenAIRE

    Claro, Danny Pimentel; Laban Neto, Silvio Abrahão; Claro, Priscila Borin de Oliveira

    2013-01-01

    This paper examines how relationships with friends moderate the impact of professional networks on sales performance. Based on a sample of 204 sales managers in a professional service company, this study presents evidence that friendship networks amplify the effect of sales forces’ professional networks on new product sales as well as on prospecting and converting new deals. Our results offer important insights into the socio-cognitive perspective of sales management literature and suggest th...

  6. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  7. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  8. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required

  9. Adaptive Learning Rule for Hardware-based Deep Neural Networks Using Electronic Synapse Devices

    OpenAIRE

    Lim, Suhwan; Bae, Jong-Ho; Eum, Jai-Ho; Lee, Sungtae; Kim, Chul-Heung; Kwon, Dongseok; Park, Byung-Gook; Lee, Jong-Ho

    2017-01-01

    In this paper, we propose a learning rule based on a back-propagation (BP) algorithm that can be applied to a hardware-based deep neural network (HW-DNN) using electronic devices that exhibit discrete and limited conductance characteristics. This adaptive learning rule, which enables forward, backward propagation, as well as weight updates in hardware, is helpful during the implementation of power-efficient and high-speed deep neural networks. In simulations using a three-layer perceptron net...

  10. Relationship Management in International Strategic Alliances and networks

    DEFF Research Database (Denmark)

    Andersen, Poul

    2011-01-01

    This chapter discusses relationship management in international strategic alliances and networks, building on and synthesizing parts of the relationship management literature. The chapter provides a model linking three generic relationship management tasks with three levels of management......, identifying nine focus areas for relationship management efforts. Rather than distinguishing between the management of external and internal resources, the integration of external and internal resources is the focus, meaning that all managerial tasks have both internal and external consequences...

  11. Reducing hospital noise: a review of medical device alarm management.

    Science.gov (United States)

    Konkani, Avinash; Oakley, Barbara; Bauld, Thomas J

    2012-01-01

    Increasing noise in hospital environments, especially in intensive care units (ICUs) and operating rooms (ORs), has created a formidable challenge for both patients and hospital staff. A major contributing factor for the increasing noise levels in these environments is the number of false alarms generated by medical devices. This study focuses on discovering best practices for reducing the number of false clinical alarms in order to increase patient safety and provide a quiet environment for both work and healing. The researchers reviewed Pub Med, Web of Knowledge and Google Scholar sources to obtain original journal research and review articles published through January 2012. This review includes 27 critically important journal articles that address different aspects of medical device alarms management, including the audibility, identification, urgency mapping, and response time of nursing staff and different solutions to such problems. With current technology, the easiest and most direct method for reducing false alarms is to individualize alarm settings for each patient's condition. Promoting an institutional culture change that emphasizes the importance of individualization of alarms is therefore an important goal. Future research should also focus on the development of smart alarms.

  12. Software to manage transformers using intelligent electronic device

    Directory of Open Access Journals (Sweden)

    Marcio Zamboti Fortes

    2016-01-01

    Full Text Available Power companies usually answer the increase in power demand by building new generation facilities. Nevertheless, an efficient use of energy could reduce and delay the costs of investment in new power plants. This paper shows a software system to manage transformers and evaluate losses when they work with zero loads. This system contributes to reduce the waste of energy with some simple actions such as shutting off an unused transformer or reconnecting disabled equipment based on the customer’s demand. It uses real time measurements collected from Intelligent Electronic Devices as a base for software decisions. It also measures and reports the total power saving.

  13. Service oriented network architecture for control and management of home appliances

    Science.gov (United States)

    Hayakawa, Hiroshi; Koita, Takahiro; Sato, Kenya

    2005-12-01

    Recent advances in multimedia network systems and mechatronics have led to the development of a new generation of applications that associate the use of various multimedia objects with the behavior of multiple robotic actors. The connection of audio and video devices through high speed multimedia networks is expected to make the system more convenient to use. For example, many home appliances, such as a video camera, a display monitor, a video recorder, an audio system and so on, are being equipped with a communication interface in the near future. Recently some platforms (i.e. UPnP1, HAVi2 and so on) are proposed for constructing home networks; however, there are some issues to be solved to realize various services by connecting different equipment via the pervasive peer-to-peer network. UPnP offers network connectivity of PCs of intelligent home appliances, practically, which means to require a PC in the network to control other devices. Meanwhile, HAVi has been developed for intelligent AV equipments with sophisticated functions using high CPU power and large memory. Considering the targets of home alliances are embedded systems, this situation raises issues of software and hardware complexity, cost, power consumption and so on. In this study, we have proposed and developed the service oriented network architecture for control and management of home appliances, named SONICA (Service Oriented Network Interoperability for Component Adaptation), to address these issues described before.

  14. Design and development of a device management platform for EAST cryogenic system

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Zhiwei, E-mail: zzw@ipp.ac.cn; Lu, Xiaofei, E-mail: xiaofeilu@ipp.ac.cn; Zhuang, Ming, E-mail: zhm@ipp.ac.cn; Hu, Liangbing, E-mail: huliangbing@ipp.ac.cn; Xia, Genhai, E-mail: xgh@ipp.ac.cn

    2014-05-15

    Highlights: • A device management platform for EAST cryogenic system based on DCS is designed. • This platform enhances the integrity and continuity of system device information. • It can help predictive maintenance and device management decision. - Abstract: EAST cryogenic system is one of the critical sub-systems of the EAST tokamak device. It is a large scale helium cryoplant, which adopts distributed control system to realize monitoring and control of the cryogenic process and devices. However, the maintenance and management of most field devices are still in the corrective maintenance or traditional preventive maintenance stage. Under maintained or over maintained problems widely exist, which could cause devices fault and increase operation costs. Therefore, a device management platform is proposed for a safe and steady operation as well as fault diagnosis and predictive maintenance of EAST cryogenic system. This paper presents the function design and architecture design of the cryogenic device management platform. This platform is developed based on DeltaV DCS and acquires monitoring data through OPC protocol. It consists of three pillars, namely device information management, device condition management, and device performance monitoring. The development and implementation of every pillar are illustrated in detail in this paper. Test results and discussions are presented in the end.

  15. Research Devices Maintenance Programs and Safety Network Infrastructures in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Zainudin Jaafar; Muhammad Zahidee Taat; Ishak Mansor

    2015-01-01

    Instrumentation and Automation Center (PIA) is responsible in carrying out maintenance work for building safety infrastructure and area for nuclear scientific and research work. Care cycle and nuclear scientific tools starting from the preparation of specifications until devices disposal- to get the maximum output from devices therefore PIA has introduced Effective and Comprehensive Maintenance Plan under Management/ Trust/ Development/ Science Fund budgets and also user, Asset Management, caring and handling of the devices. This paper also discussed more on case study related to using and handling so that it can be guidance and standard when its involving mishandling, improper maintenance, inadequacy of supervision and others including improvement suggestion programs. (author)

  16. An Intelligent Alternative Approach to the efficient Network Management

    Directory of Open Access Journals (Sweden)

    MARTÍN, A.

    2012-12-01

    Full Text Available Due to the increasing complexity and heterogeneity of networks and services, many efforts have been made to develop intelligent techniques for management. Network intelligent management is a key technology for operating large heterogeneous data transmission networks. This paper presents a proposal for an architecture that integrates management object specifications and the knowledge of expert systems. We present a new approach named Integrated Expert Management, for learning objects based on expert management rules and describe the design and implementation of an integrated intelligent management platform based on OSI and Internet management models. The main contributions of our approach is the integration of both expert system and managed models, so we can make use of them to construct more flexible intelligent management network. The prototype SONAP (Software for Network Assistant and Performance is accuracy-aware since it can control and manage a network. We have tested our system on real data to the fault diagnostic in a telecommunication system of a power utility. The results validate the model and show a significant improvement with respect to the number of rules and the error rate in others systems.

  17. Integrating Network Management for Cloud Computing Services

    Science.gov (United States)

    2015-06-01

    Backend Distributed Datastore High-­‐level   Objec.ve   Network   Policy   Perf.   Metrics   SNAT  IP   Alloca.on   Controller...azure.microsoft.com/. 114 [16] Microsoft Azure ExpressRoute. http://azure.microsoft.com/en-us/ services/expressroute/. [17] Mobility and Networking...Networking Technologies, Services, and Protocols; Performance of Computer and Commu- nication Networks; Mobile and Wireless Communications Systems

  18. A value network development model and implications for innovation and production network management

    NARCIS (Netherlands)

    Vermeulen, B.; Kok, de A.G.

    2013-01-01

    In managing their value network, firms have to balance current and future value concerns and own and network partners’ concerns. Firms generate immediate value through manufacturing and selling the current generation of products together with other firms in its production network and generate future

  19. Public management and policy networks: foundations of a network approach to governance

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)

    2006-01-01

    markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy

  20. System Control Device Electronics Smart Home Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Safarul Ilham

    2017-06-01

    Full Text Available The use of information technology is very useful for today’s life and the next, where the human facilitated in doing a variety of activities in the life day to day. By the development of the existing allows people no longer do a job with difficulty. For that, it takes a system safety home using system technology Web-based and complete video streaming CCTV (video streaming a person can see the condition of his home whenever and wherever by using handphone, laptops and other tools are connected to the Internet network. This tool can facilitate someone in the monitor at home and control equipment the House as open and close and the lock the gate, turning on and off the lights so homeowners are no longer have to visit their home and fear the state of the House because fully security and control in the House was handled by the system. based on the above problems Writer try to design work system a tool that can control the simulation tools home using two Microcontroller is Attiny 2313 and Atmega16.

  1. Spin wave absorber generated by artificial surface anisotropy for spin wave device network

    Directory of Open Access Journals (Sweden)

    Naoki Kanazawa

    2016-09-01

    Full Text Available Spin waves (SWs have the potential to reduce the electric energy loss in signal processing networks. The SWs called magnetostatic forward volume waves (MSFVWs are advantageous for networking due to their isotropic dispersion in the plane of a device. To control the MSFVW flow in a processing network based on yttrium iron garnet, we developed a SW absorber using artificial structures. The mechanical surface polishing method presented in this work can well control extrinsic damping without changing the SW dispersion of the host material. Furthermore, enhancement of the ferromagnetic resonance linewidth over 3 Oe was demonstrated.

  2. Hierarchical Trust Management of COI in Heterogeneous Mobile Networks

    Science.gov (United States)

    2017-08-01

    Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: irchen@vt.edu...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will

  3. The prevention research centers' managing epilepsy well network.

    Science.gov (United States)

    DiIorio, Colleen K; Bamps, Yvan A; Edwards, Ariele L; Escoffery, Cam; Thompson, Nancy J; Begley, Charles E; Shegog, Ross; Clark, Noreen M; Selwa, Linda; Stoll, Shelley C; Fraser, Robert T; Ciechanowski, Paul; Johnson, Erica K; Kobau, Rosemarie; Price, Patricia H

    2010-11-01

    The Managing Epilepsy Well (MEW) Network was created in 2007 by the Centers for Disease Control and Prevention's (CDC) Prevention Research Centers and Epilepsy Program to promote epilepsy self-management research and to improve the quality of life for people with epilepsy. MEW Network membership comprises four collaborating centers (Emory University, University of Texas Health Science Center at Houston, University of Michigan, and University of Washington), representatives from CDC, affiliate members, and community stakeholders. This article describes the MEW Network's background, mission statement, research agenda, and structure. Exploratory and intervention studies conducted by individual collaborating centers are described, as are Network collaborative projects, including a multisite depression prevention intervention and the development of a standard measure of epilepsy self-management. Communication strategies and examples of research translation programs are discussed. The conclusion outlines the Network's role in the future development and dissemination of evidence-based epilepsy self-management programs. Copyright © 2010 Elsevier Inc. All rights reserved.

  4. Multipath diffuse routing over heterogeneous mesh networks of web devices and sensors

    NARCIS (Netherlands)

    Vitale, G.; Stassen, M.L.A.; Colak, S.B.; Pronk, V.; Macq, B.; Quisquater, J.-.J.

    2002-01-01

    In this paper we present a new data flow algorithm based on physical diffusion for dense device networks needed for future ubiquitous communications. This diffuse data routing concept is based on multi-path signal propagation aided with adaptive beam-forming methods. Adaptation for beam-forming at

  5. Wireless Sensing Node Network Management for Monitoring Landslide Disaster

    International Nuclear Information System (INIS)

    Takayama, S; Akiyama, J; Fujiki, T; Mokhtar, N A B

    2013-01-01

    This paper shows the network management and operation to monitor landslide disaster at slop of mountain and hill. Natural disasters damage a measuring system easily. It is necessary for the measuring system to be flexible and robust. The measuring network proposed in this paper is the telemetry system consisted of host system (HS) and local sensing nodes network system (LSNNS). LSNNS operates autonomously and sometimes is controlled by commands from HS. HS collects data/information of landslide disaster from LSNNS, and controls LSNNS remotely. HS and LSNNS are communicated by using 'cloud' system. The dual communication is very effective and convenient to manage a network system operation

  6. Formation of a national network for rapid response to device and lead advisories: The Canadian Heart Rhythm Society Device Advisory Committee

    Science.gov (United States)

    Krahn, Andrew D; Simpson, Christopher S; Parkash, Ratika; Yee, Raymond; Champagne, Jean; Healey, Jeffrey S; Cameron, Doug; Thibault, Bernard; Mangat, Iqwal; Tung, Stanley; Sterns, Laurence; Birnie, David H; Exner, Derek V; Sivakumaran, Soori; Davies, Ted; Coutu, Benoit; Crystal, Eugene; Wolfe, Kevin; Verma, Atul; Stephenson, Elizabeth A; Sanatani, Shubhayan; Gow, Robert; Connors, Sean; Paredes, Felix Ayala; Turabian, Mike; Kus, Teresa; Essebag, Vidal; Gardner, Martin

    2009-01-01

    The Canadian Heart Rhythm Society (CHRS) Device Advisory Committee was commissioned to respond to advisories regarding cardiac rhythm device and lead performance on behalf of the CHRS. In the event of an advisory, the Chair uses an e-mail network to disseminate advisory information to Committee members broadly representative of the Canadian device community. A consensus recommendation is prepared by the Committee and made available to all Canadian centres on the CHRS Web site after approval by the CHRS executive. This collaborative approach using an e-mail network has proven very efficient in providing a rapid national response to device advisories. The network is an ideal tool to collect specific data on implanted device system performance and allows for prompt reporting of clinically relevant data to front-line clinicians and patients. PMID:19584969

  7. Photon management of GaN-based optoelectronic devices via nanoscaled phenomena

    KAUST Repository

    Tsai, Yu-Lin

    2016-09-06

    Photon management is essential in improving the performances of optoelectronic devices including light emitting diodes, solar cells and photo detectors. Beyond the advances in material growth and device structure design, photon management via nanoscaled phenomena have also been demonstrated as a promising way for further modifying/improving the device performance. The accomplishments achieved by photon management via nanoscaled phenomena include strain-induced polarization field management, crystal quality improvement, light extraction/harvesting enhancement, radiation pattern control, and spectrum management. In this review, we summarize recent development, challenges and underlying physics of photon management in GaN-based light emitting diodes and solar cells. (C) 2016 Elsevier Ltd. All rights reserved.

  8. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  9. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  10. The Dynamics of network and dyad level supply management

    DEFF Research Database (Denmark)

    Ellegaard, Chris

    -supplier relation and its immediate network context, are presented. In analysing the data, the dynamic interdependency between management of one level and management of the other, will be demonstrated. The analysis reveals a need for an alternating approach to supply management, which takes the dynamic complexity...

  11. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  12. Professional development and human resources management in networks

    Directory of Open Access Journals (Sweden)

    Evgeniy Rudnev

    2016-05-01

    Full Text Available Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future.

  13. COMMUNICATION MANAGEMENT CRISIS IN SOCIAL NETWORKS

    OpenAIRE

    Ana Mª Enrique Jiménez

    2013-01-01

    It is often in the social networks where you detect the first signs of a potential crisis situation. Today, many companies decide to be present in social networks to communicate, listen and respond to their audiences openly with immediacy. A simple complaint is visible and propagates through the network in seconds, being capable of generating a negative impact on the corporate image of the organization. The same can happen to the contrary, ie, to praise the performance of a company, which may...

  14. Intelligent Resource Management for Local Area Networks: Approach and Evolution

    Science.gov (United States)

    Meike, Roger

    1988-01-01

    The Data Management System network is a complex and important part of manned space platforms. Its efficient operation is vital to crew, subsystems and experiments. AI is being considered to aid in the initial design of the network and to augment the management of its operation. The Intelligent Resource Management for Local Area Networks (IRMA-LAN) project is concerned with the application of AI techniques to network configuration and management. A network simulation was constructed employing real time process scheduling for realistic loads, and utilizing the IEEE 802.4 token passing scheme. This simulation is an integral part of the construction of the IRMA-LAN system. From it, a causal model is being constructed for use in prediction and deep reasoning about the system configuration. An AI network design advisor is being added to help in the design of an efficient network. The AI portion of the system is planned to evolve into a dynamic network management aid. The approach, the integrated simulation, project evolution, and some initial results are described.

  15. Network management for 900-1300 MW PWR power plant industrial network

    International Nuclear Information System (INIS)

    Schlosser, J.G.; Maillart, H.; Lopinto, Y.

    1993-07-01

    Communication networks are a vital element in industrial information system projects. Because of the complexity of these networks, which are heterogeneous in terms of hardware, protocols and communication software, the need is now clear to consider them as applications in and of themselves. For this reason, EDF communication networks are now covered by system requirement specifications with SPRINT, and by an acceptance policy which calls for conformance certificates and defines methods for interoperability tests. Network management completes the picture, and attempts to provide the resources with which to assess present network status and manage communication networks. For this purpose, EDF has selected the OSI standard, which is based on four key concepts: - the ''Manager - Agent'' structural model, - a service (CMISE) and a protocol (CMIP) which enable exchange of management information, - an object-oriented management data model, -functions for: configuration, anomaly, performance and alarm management. This document presents the results of a project to integrate into a single management platform communication systems which do not conform to the OSI management recommendations. There were three major phases to the project: - a review of the OSI management model, and most particularly of the information model advocated; - a review of the resources to be managed and a comparison of the information provided by the different agents. Specifications were proposed for the management object and attribute classes which can usefully be implemented; - integration of ARLIC. During development of a breadboard version based on a BULL ISM platform for management of the power plant local area network, one possible solution for integration of ARLIC was proposed, describing the ARLIC information modeling along the lines of the OSI model. This project showed that it is possible to use the OSI modeling to represent management data manipulated by the communication software used on

  16. AANA Journal Course: update for nurse anesthetists. Arrhythmia management devices and electromagnetic interference.

    Science.gov (United States)

    Mattingly, Emily

    2005-04-01

    The technological complexity of implantable arrhythmia management devices, specifically pacemakers and defibrillators, has increased dramatically since their introduction only a few decades ago. Patients with such devices are encountered much more frequently in hospitals and surgery centers, yet anesthesia provider knowledge of safe and proper management is often incomplete. Anesthesia textbooks and references may provide only short paragraphs on arrhythmia management devices that do not address important perioperative management strategies for this ever-growing patient population. It is no longer satisfactory to simply place a magnet over an implanted device during surgery and assume that this action protects the patient from harm due to electromagnetic interference from inappropriate device function. This AANA Journal course serves as a concise review of basic device function, the sources and effects of electromagnetic interference in the operative setting, and patient management recommendations from current literature.

  17. Response of asymmetric carbon nanotube network devices to sub-terahertz and terahertz radiation

    International Nuclear Information System (INIS)

    Gayduchenko, I.; Kardakova, A.; Voronov, B.; Finkel, M.; Fedorov, G.; Jiménez, D.; Morozov, S.; Presniakov, M.; Goltsman, G.

    2015-01-01

    Demand for efficient terahertz radiation detectors resulted in intensive study of the asymmetric carbon nanostructures as a possible solution for that problem. It was maintained that photothermoelectric effect under certain conditions results in strong response of such devices to terahertz radiation even at room temperature. In this work, we investigate different mechanisms underlying the response of asymmetric carbon nanotube (CNT) based devices to sub-terahertz and terahertz radiation. Our structures are formed with CNT networks instead of individual CNTs so that effects probed are more generic and not caused by peculiarities of an individual nanoscale object. We conclude that the DC voltage response observed in our structures is not only thermal in origin. So called diode-type response caused by asymmetry of the device IV characteristic turns out to be dominant at room temperature. Quantitative analysis provides further routes for the optimization of the device configuration, which may result in appearance of novel terahertz radiation detectors

  18. Accuracy Enhancements for Positioning of Mobile Devices in Wireless Communication Networks

    DEFF Research Database (Denmark)

    Figueiras, Joao

    of the physical length of the communication links. Since these solutions do not require integration of additional hardware into the mobile nodes, they are cheap and simple to implement. As a price to pay, accuracy is typically lower in comparison to dedicated positioning systems. Thus, an important challenge...... communication among users, cooperative positioning strategies aim at localizing devices as a group and not as individuals. In order to reach this goal it is necessary to combine measurements from two domains: device-to-device links and cellular links. Since this combination of information......Positioning of mobile devices in wireless communication networks is nowadays being intensively investigated due to the combined benefit of location information and communication. Typical solutions for such scenario rely on robust algorithms that estimate position from indirect measurements...

  19. Demo - Talk2Me: A Framework for Device–to–Device Augmented Reality Social Network

    DEFF Research Database (Denmark)

    Shu, Jiayu; Kosta, Sokol; Zheng, Rui

    2018-01-01

    –to–Device fashion. When a user looks at nearby persons through her camera–enabled wearable devices (e.g., Google Glass), the framework automatically extracts the face–signature of the person of interest, compares it with the previously captured signatures, and presents the information shared by this person......In this demo, we present Talk2Me, an augmented reality social network framework that enables users to disseminate information in a distributed way and view others’ information instantly. Talk2Me advertises users’ messages, together with their face–signatures, to every nearby device in a Device...... to the user. We design a lightweight and yet accurate face recognition algorithm, together with an efficient distributed dissemination protocol. We integrate their implementations in an Android prototype....

  20. Public management in intergovernmental networks: Matching structural and behavioral networks

    NARCIS (Netherlands)

    O'Toole, Laurence J.; Meier, Kenneth J.

    2004-01-01

    While there is considerable consensus on the importance of intergovernmental management for the performance of many public programs, theoretical work has been slow to develop, and systematic empirical research on the topic has been rare. This article explores intergovernmental management in the

  1. Value Systems Alignment Analysis in Collaborative Networked Organizations Management

    Directory of Open Access Journals (Sweden)

    Patricia Macedo

    2017-11-01

    Full Text Available The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assist managers in virtual and networked organizations management. The implementation of the assessment and analysis methods is supported by a set of software services integrated in the information system that supports the management of the networked organizations. A case study in the solar energy sector was conducted, and the data collected through this study allow us to confirm the practical applicability of the proposed methods and the software services.

  2. ECO INVESTMENT PROJECT MANAGEMENT THROUGH TIME APPLYING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Tamara Gvozdenović

    2007-06-01

    Full Text Available he concept of project management expresses an indispensable approach to investment projects. Time is often the most important factor in these projects. The artificial neural network is the paradigm of data processing, which is inspired by the one used by the biological brain, and it is used in numerous, different fields, among which is the project management. This research is oriented to application of artificial neural networks in managing time of investment project. The artificial neural networks are used to define the optimistic, the most probable and the pessimistic time in PERT method. The program package Matlab: Neural Network Toolbox is used in data simulation. The feed-forward back propagation network is chosen.

  3. Mobility management in the future mobile network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza

    2018-01-01

    The current mobile network architectures are heavily hierarchical, which implies that all traffic must be traversed through a centralized core entity. This makes the network prone to several limitations, e.g., suboptimal communication paths, low scalability, signaling overhead, and single point of

  4. MANAGING GLOBAL OPERATIONS NETWORKS IN MOTION

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Sørensen, Brian Vejrum

    2008-01-01

    capabilities and intensified need for transfer, assimilation and augmentation of activities and know-how within the network. Based on these the paper highlights some organisational effects and managerial challenges the companies face regarding rapid changes in their networks configurations and capabilities.......Most industrial companies are, for reasons related to cost, market access or knowledge, working with some aspect of offshore operations. This may take form of captive operations or through outsourcing of activities overseas. With this trend, global operations networks are emerging resulting...... in corporate strategic repositioning, re-configurations of sites, and changes to the underlying capabilities. The paper is based on cases of 3 Danish companies and their global supply networks. These networks are not in a steady state, they evolve as a consequence of the ongoing co-evolution between the focal...

  5. A neural network device for on-line particle identification in cosmic ray experiments

    International Nuclear Information System (INIS)

    Scrimaglio, R.; Finetti, N.; D'Altorio, L.; Rantucci, E.; Raso, M.; Segreto, E.; Tassoni, A.; Cardarilli, G.C.

    2004-01-01

    On-line particle identification is one of the main goals of many experiments in space both for rare event studies and for optimizing measurements along the orbital trajectory. Neural networks can be a useful tool for signal processing and real time data analysis in such experiments. In this document we report on the performances of a programmable neural device which was developed in VLSI analog/digital technology. Neurons and synapses were accomplished by making use of Operational Transconductance Amplifier (OTA) structures. In this paper we report on the results of measurements performed in order to verify the agreement of the characteristic curves of each elementary cell with simulations and on the device performances obtained by implementing simple neural structures on the VLSI chip. A feed-forward neural network (Multi-Layer Perceptron, MLP) was implemented on the VLSI chip and trained to identify particles by processing the signals of two-dimensional position-sensitive Si detectors. The radiation monitoring device consisted of three double-sided silicon strip detectors. From the analysis of a set of simulated data it was found that the MLP implemented on the neural device gave results comparable with those obtained with the standard method of analysis confirming that the implemented neural network could be employed for real time particle identification

  6. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices

    Directory of Open Access Journals (Sweden)

    Ziyang He

    2018-04-01

    Full Text Available By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  7. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas; Sezgin, Aydin

    2015-01-01

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  8. LiteNet: Lightweight Neural Network for Detecting Arrhythmias at Resource-Constrained Mobile Devices.

    Science.gov (United States)

    He, Ziyang; Zhang, Xiaoqing; Cao, Yangjie; Liu, Zhi; Zhang, Bo; Wang, Xiaoyan

    2018-04-17

    By running applications and services closer to the user, edge processing provides many advantages, such as short response time and reduced network traffic. Deep-learning based algorithms provide significantly better performances than traditional algorithms in many fields but demand more resources, such as higher computational power and more memory. Hence, designing deep learning algorithms that are more suitable for resource-constrained mobile devices is vital. In this paper, we build a lightweight neural network, termed LiteNet which uses a deep learning algorithm design to diagnose arrhythmias, as an example to show how we design deep learning schemes for resource-constrained mobile devices. Compare to other deep learning models with an equivalent accuracy, LiteNet has several advantages. It requires less memory, incurs lower computational cost, and is more feasible for deployment on resource-constrained mobile devices. It can be trained faster than other neural network algorithms and requires less communication across different processing units during distributed training. It uses filters of heterogeneous size in a convolutional layer, which contributes to the generation of various feature maps. The algorithm was tested using the MIT-BIH electrocardiogram (ECG) arrhythmia database; the results showed that LiteNet outperforms comparable schemes in diagnosing arrhythmias, and in its feasibility for use at the mobile devices.

  9. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas

    2015-10-24

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  10. Continued Development and Implementation of the Universal Network Interface Device (UNID) II, Digital Engineering Laboratory Network (DELNET) Volume 1.

    Science.gov (United States)

    1984-12-01

    3. It is assuied that the network software design as J,!veloed functions properly. Sum.mary of Current Knowlede [re aost tip to late sumfnary of the...conversations with the program management staff regarding multi-user and multi-level security issues related to the Integrated-Service/Agency Automated

  11. Light Management in Optoelectronic Devices with Disordered and Chaotic Structures

    KAUST Repository

    Khan, Yasser

    2012-07-01

    With experimental realization, energy harvesting capabilities of chaotic microstructures were explored. Incident photons falling into chaotic trajectories resulted in energy buildup for certain frequencies. As a consequence, many fold enhancement in light trapping was observed. These ellipsoid like chaotic microstructures demonstrated 25% enhancement in light trapping at 450nm excitation and 15% enhancement at 550nm excitation. Optimization of these structures can drive novel chaos-assisted energy harvesting systems. In subsequent sections of the thesis, prospect of broadband light extraction from white light emitting diodes were investigated, which is an unchallenged but quintessential problem in solid-state lighting. Size dependent scattering allows microstructures to interact strongly with narrow-band light. If disorder is introduced in spread and sizes of microstructures, broadband light extraction is possible. A novel scheme with Voronoi tessellation to quantify disorder in physical systems was also introduced, and a link between voronoi disorder and state disorder of statistical mechanics was established. Overall, in this thesis some nascent concepts regarding disorder and chaos were investigated to efficiently manage electromagnetic waves in optoelectronic devices.

  12. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    Science.gov (United States)

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  13. Lan Network Management System Design In PT. ABC

    OpenAIRE

    Mellviana Chandra; Drs. Lingga Hermanto, MM

    1998-01-01

    In all cases, the process of choosing what type of system and network to the appropriate network operating system relies heavily on an understanding of running a business firm (in terms of managing data and information into something meaningful). Hence thing to note is studied process data and information flow within an existing business in a way to analyze and evaluate as precisely as possible. Emphasized here that the selected network must support and reflect the ways data / information flo...

  14. Network and System Management of ICEbox Through SNMP

    National Research Council Canada - National Science Library

    Lee, Daniel

    1997-01-01

    .... Then, this report presents the design and implementation of the experimental network management system's software modules and the proxy agent that provide the interface between ICEbox and the SNMP...

  15. Using Web-Based Technologies for Network Management Tools

    National Research Council Canada - National Science Library

    Agami, Arie

    1997-01-01

    .... New solutions to current network management tools problems may be found in the increasingly popular World Wide Web, Internet tools such as Java, and remote database access through the Internet...

  16. Managing Virtual Networks on Large-Scale Projects

    National Research Council Canada - National Science Library

    Noll, David

    2006-01-01

    The complexity of Boeing's 787 Program is too great for the formal planned information and communication network structure to fully meet the needs of companies, managers, and employees located throughout the world...

  17. Towards an autonomous self-tuning vibration energy harvesting device for wireless sensor network applications

    International Nuclear Information System (INIS)

    Challa, Vinod R; Prasad, M G; Fisher, Frank T

    2011-01-01

    Future deployment of wireless sensor networks will ultimately require a self-sustainable local power source for each sensor, and vibration energy harvesting is a promising approach for such applications. A requirement for efficient vibration energy harvesting is to match the device and source frequencies. While techniques to tune the resonance frequency of an energy harvesting device have recently been described, in many applications optimization of such systems will require the energy harvesting device to be able to autonomously tune its resonance frequency. In this work a vibration energy harvesting device with autonomous resonance frequency tunability utilizing a magnetic stiffness technique is presented. Here a piezoelectric cantilever beam array is employed with magnets attached to the free ends of cantilever beams to enable magnetic force resonance frequency tuning. The device is successfully tuned from − 27% to + 22% of its untuned resonance frequency while outputting a peak power of approximately 1 mW. Since the magnetic force tuning technique is semi-active, energy is only consumed during the tuning process. The developed prototype consumed maximum energies of 3.3 and 3.9 J to tune to the farthest source frequencies with respect to the untuned resonance frequency of the device. The time necessary for this prototype device to harvest the energy expended during its most energy-intensive (largest resonant frequency adjustment) tuning operation is 88 min in a low amplitude 0.1g vibration environment, which could be further optimized using higher efficiency piezoelectric materials and system components

  18. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  19. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P; Abu-Mahfouz, Adnan M

    2017-05-04

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  20. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Directory of Open Access Journals (Sweden)

    Musa Ndiaye

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs are becoming increasingly popular with the advent of the Internet of things (IoT. Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  1. Do social networks and technological capabilities help knowledge management?

    Directory of Open Access Journals (Sweden)

    Encarnación García-Sánchez

    2017-12-01

    Full Text Available Dynamic capabilities are currently becoming an important extension of the theory of resources and capabilities that enables companies to adapt better in the current competitive environment. This paper examines how knowledge management, a dynamic function related to management or administration of a set of knowledge flows, develops thanks to the greater dynamism of social networks. It then shows how this relationship is especially strengthened by different technological capabilities. To achieve these goals, the paper examines the main tools that permit companies to develop an ability to achieve competitive advantage relative to the technological capabilities of managers and workers, social networks and knowledge management.

  2. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  3. Contract Management: Organisational and Legal Form of Hotel Networks

    OpenAIRE

    Burak Tatyana V.

    2013-01-01

    Hotel business has been the most dynamic and profitable segment of economy, which is characterised with a high degree of internationalisation of capital and international character, during the recent decades. We clearly observe development of national and international hotel networks at this stage. Management contract is one of the methods of development and creation of hotel networks. The article describes theoretical basis of introduction of the contract management into the hotel business, ...

  4. Digital networks for the image management

    International Nuclear Information System (INIS)

    Gomez del Campo L, A.

    1999-01-01

    The digital networks designed specifically for the X-ray departments in the hospitals already were found in open development at beginning the 80's decade. Actually the digital network will be present include the image generation without the necessity to use film in direct form and in its case to print it through a laser ray printers network, an electronic image file, the possibility to integrate the hospitable information system to the electronic expedient which will allow communicate radiograph electronic files and consult by satellite via the problem cases. (Author)

  5. Network design management and technical perspectives

    CERN Document Server

    Piliouras, Teresa C

    2004-01-01

    MAKING THE BUSINESS CASE FOR THE NETWORKManagement Overview of Network DesignDefine the Business ObjectivesDetermine Potential Risks, Dependencies, Costs andBenefitsIdentify Project RequirementsDevelop Project Implementation ApproachStrategic Positioning Using NetworksCase StudiesCalculation of Technology's Strategic ValueDealing with Major Design ChallengesOrganizational Concerns and RecommendationsTechnology Concerns and RecommendationsSimilarities and Differences between Voice and DataNetwork Design and PlanningMajor Trends and Technology EnablersSocietal TrendsService Provider TrendsMajor

  6. Self-Management of Hybrid Optical and Packet Switching Networks

    NARCIS (Netherlands)

    Fioreze, Tiago

    2010-01-01

    Hybrid optical and packet switching networks are composed of multi-service hybrid devices that enable forwarding of data at multiple levels. Large IP flows at the IP level may be therefore moved to the optical level bypassing therefore the per hop routing decisions of the IP level. Such move could

  7. Designing and Implementing a Distributed Social Network Service for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Alexandru RADOVICI

    2011-01-01

    Full Text Available The paper presents a new paradigm for building social network services. The proposed platform is called eXtensible Social Network. As it uses the XMPP protocol for authentication and communication, it allows users from different service providers interact with each other, without having to change their accounts. Moreover, the platform provides means for users to authenticate and interact with each other while temporary disconnected from the Internet. Moreover, the platform is specially designed for mobile devices, running on their restrictive operating systems and taking advantage of the systems optimizations.

  8. Impact of stand-by energy losses in electronic devices on smart network performance

    OpenAIRE

    Mandić-Lukić Jasmina S.; Pantović Vladan S.; Vasiljević Željko S.

    2012-01-01

    Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic dev...

  9. Adapting cognitive radio technology for low-power wireless personal area network devices

    DEFF Research Database (Denmark)

    Toftegaard, Thomas Skjødeberg; Rohde, John

    2011-01-01

    The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....

  10. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Directory of Open Access Journals (Sweden)

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  11. 75 FR 391 - Medical Device Quality System Regulation Educational Forum on Risk Management Through the Product...

    Science.gov (United States)

    2010-01-05

    ...] Medical Device Quality System Regulation Educational Forum on Risk Management Through the Product Life... on Risk Management through the Product Life Cycle.'' This public workshop is intended to provide... discussed at the workshop: (1) Standards and guidance, (2) risk management in design, (3) risk management in...

  12. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  13. Management and optimization of the CPCU network working

    Energy Technology Data Exchange (ETDEWEB)

    Silvain, D. (Compagnie Parisienne de Chauffage Urbain, 75 - Paris (FR))

    1991-10-01

    The CPCU steam distribution network is supplemented by a return network for the condensation water. The data system installed in 1988 provides, for the real time, management of the function of the two networks and a reduction in production costs. For the steam, data required in the network, the boiler houses and from external sources are processed by local network of five microprocessors and permit: - with time delay: technical and economic production optimizing calculations, or forecasts, for the following day, of the total required output and the procedure necessary for supplying this at the lowest cost; - in real time: on the basis of the forecasts for the previous day, creating the production instructions for the boiler houses and the instructions for the network remote control elements; - in case of an unexpected occurrence: immediate creation of new operating forecasts for the boiler houses for the establishing management data in real time. For the water, the system forecasts the volume to be returned to the boiler depending on the quantity of steam to be produced. Subsequently, an analysis is carried out in real time of pressures and outputs measured in the network for deriving valve movements and the pump stop/start procedure for guaranteeing the return of the water. The architecture, basic principles and software developed for this application can be used in other steam or water networks and, in a general manner, are adaptable for the management of any complex multi-supplier or multicustomer systems.

  14. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  15. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    Science.gov (United States)

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  16. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  17. Business communication in social networks: Content management and experiences

    Directory of Open Access Journals (Sweden)

    Miguel Ángel Nicolás

    2014-11-01

    Full Text Available Currently, management of communication in social networks has become an indispensable strategic activity and contributes directly to change the mode of relationship between business and its stakeholders. The first section of this paper presents a brief analysis of the results reported in different specialized national studies in social networks. We analyse the general activities that users prefer to do and activities that users value most brands on networks. If an organization wants to successfully manage their communication in social networks is very important to know the behaviour of the users and design strategies based on their status and economic activity. This paper presents a brief analysis of social branding through the classification of different corporate content posted on their networks.

  18. Seamless Data Services for Real Time Communication in a Heterogeneous Networks using Network Tracking and Management

    OpenAIRE

    T, Adiline Macriga.; Kumar, Dr. P. Anandha

    2010-01-01

    Heterogeneous Networks is the integration of all existing networks under a single environment with an understanding between the functional operations and also includes the ability to make use of multiple broadband transport technologies and to support generalized mobility. It is a challenging feature for Heterogeneous networks to integrate several IP-based access technologies in a seamless way. The focus of this paper is on the requirements of a mobility management scheme for multimedia real-...

  19. Actor networks in strategic niche management : insights from social network theory

    NARCIS (Netherlands)

    Caniëls, M.C.J.; Romijn, H.A.

    2008-01-01

    This paper contributes to Strategic Niche Management (SNM), an analytical technique designed to facilitate the introduction and diffusion of radically new sustainable technologies through societal experiments. According to SNM, intensive networking among social actors is a crucial process for the

  20. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  1. Ship nuclear power device of cable aging management

    International Nuclear Information System (INIS)

    Wei Hua; Chen Miao; Chen Tao

    2012-01-01

    Cable for marine nuclear power plant continuous delivery of electrical energy. Cable is mostly in the high temperature and strong radiation and harsh working environment, and can not be replaced in the lifetime This should be the cable aging management methods through research, maintenance and repair program to provide a scientific basis. Cable aging management approach for a number of different levels of cable management at different levels, relying on computers and other modern tools, the use of information management database software maintenance of the cable through the science of aging control. Cable Aging Management including the scope of cable aging management, classification management basis and used for different levels of management supervision and implementation of means testing approach. Application of the ship that has the operational management science, both planned maintenance to improve the science, but also improves the efficiency of aging management. This management method can be extended to nuclear power plants of cable aging management. (authors)

  2. Strategy and management of network security at KEK

    International Nuclear Information System (INIS)

    Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa

    2001-01-01

    Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy

  3. Left ventricular assist device management in patients chronically supported for advanced heart failure.

    Science.gov (United States)

    Cowger, Jennifer; Romano, Matthew A; Stulak, John; Pagani, Francis D; Aaronson, Keith D

    2011-03-01

    This review summarizes management strategies to reduce morbidity and mortality in heart failure patients supported chronically with implantable left ventricular assist devices (LVADs). As the population of patients supported with long-term LVADs has grown, patient selection, operative technique, and patient management strategies have been refined, leading to improved outcomes. This review summarizes recent findings on LVAD candidate selection, and discusses outpatient strategies to optimize device performance and heart failure management. It also reviews important device complications that warrant close outpatient monitoring. Managing patients on chronic LVAD support requires regular patient follow-up, multidisciplinary care teams, and frequent laboratory and echocardiographic surveillance to ensure optimal outcomes.

  4. Hybrid Spintronic-CMOS Spiking Neural Network with On-Chip Learning: Devices, Circuits, and Systems

    Science.gov (United States)

    Sengupta, Abhronil; Banerjee, Aparajita; Roy, Kaushik

    2016-12-01

    Over the past decade, spiking neural networks (SNNs) have emerged as one of the popular architectures to emulate the brain. In SNNs, information is temporally encoded and communication between neurons is accomplished by means of spikes. In such networks, spike-timing-dependent plasticity mechanisms require the online programing of synapses based on the temporal information of spikes transmitted by spiking neurons. In this work, we propose a spintronic synapse with decoupled spike-transmission and programing-current paths. The spintronic synapse consists of a ferromagnet-heavy-metal heterostructure where the programing current through the heavy metal generates spin-orbit torque to modulate the device conductance. Low programing energy and fast programing times demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We perform a simulation study based on an experimentally benchmarked device-simulation framework to demonstrate the interfacing of such spintronic synapses with CMOS neurons and learning circuits operating in the transistor subthreshold region to form a network of spiking neurons that can be utilized for pattern-recognition problems.

  5. Anesthesia management for MitraClip device implantation

    Directory of Open Access Journals (Sweden)

    Harikrishnan Kothandan

    2014-01-01

    Full Text Available Aims and Objectives: Percutaneous MitraClip implantation has been demonstrated as an alternative procedure in high-risk patients with symptomatic severe mitral regurgitation (MR who are not suitable (or denied mitral valve repair/replacement due to excessive co morbidity. The MitraClip implantation was performed under general anesthesia and with 3-dimensional transesophageal echocardiography (TEE and fluoroscopic guidance. Materials and Methods: Peri-operative patient data were extracted from the electronic and paper medical records of 21 patients who underwent MitraClip implantations. Results: Four MitraClip implantation were performed in the catheterization laboratory; remaining 17 were performed in the hybrid operating theatre. In 2 patients, procedure was aborted, in one due to migration of the Chiari network into the left atrium and in second one, the leaflets and chords of the mitral valve torn during clipping resulting in consideration for open surgery. In the remaining 19 patients, MitraClip was implanted and the patients showed acute reduction of severe MR to mild-moderate MR. All the patients had invasive blood pressure monitoring and the initial six patients had central venous catheterization prior to the procedure. Intravenous heparin was administered after the guiding catheter was introduced through the inter-atrial septum and activated clotting time was maintained beyond 250 s throughout the procedure. Protamine was administered at the end of the procedure. All the patients were monitored in the intensive care unit after the procedure. Conclusions: Percutaneous MitraClip implantation is a feasible alternative in high-risk patients with symptomatic severe MR. Anesthesia management requirements are similar to open surgical mitral valve repair or replacement. TEE plays a vital role during the MitraClip implantation.

  6. D-MHR: A Distributed Management Scheme for Hybrid Networks to Provide Real-time Industrial Wireless Automation

    NARCIS (Netherlands)

    Zand, P.; Das, Kallol; Mathews, E.; Havinga, Paul J.M.

    Current wireless technologies for industrial application, such as WirelessHART and ISA100.11a, use a centralized management approach which makes it difficult and costly for harvester-powered I/O devices to re-join the network in case of power failure. The communication overhead and delay to cope

  7. Do Director Networks Help Manager Plan and Forecast Better?

    NARCIS (Netherlands)

    Schabus, M.

    I examine whether directors' superior access to information and resources through their board network improves the quality of firms' planning and forecasting. Managers may benefit from well-connected directors as, even though managers have firm specific knowledge, they may have only limited insight

  8. Audit Trail Management System in Community Health Care Information Network.

    Science.gov (United States)

    Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio

    2015-01-01

    After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.

  9. Toward effective strategies for energy efficient network management

    NARCIS (Netherlands)

    Vreeswijk, Jacob Dirk; van Berkum, Eric C.; van Arem, Bart; van Vliet, H.; Abadi, A.; Bauer e.a., D.

    2010-01-01

    Trade-offs in efficiency, equity and acceptability arise as a central feature in traffic management. Today's urban traffic network management strategies focus on overall system performance and often overlook the interests of the individual road user. In addition, the emphasis is on travel time

  10. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  11. Talk2Me: A Framework for Device–to–Device Augmented Reality Social Network

    DEFF Research Database (Denmark)

    Shu, Jiayu; Kosta, Sokol; Zheng, Rui

    2018-01-01

    , an augmented reality social network framework that enables users to disseminate information in a distributed way and view others’ information instantly. Talk2Me advertises users’ messages, together with their face–signature, to every nearby device in a Device–to–Device fashion. When a user looks at nearby...... persons through her camera–enabled wearable devices (e.g., Google Glass), the framework automatically extracts the face–signature of the person of interest, compares it with the previously captured signatures, and presents the information shared by this person to the user. We design and implement Talk2Me...... a novel face recognition algorithm for this specific scenario with a small number of face features and limited computing capability. Evaluation results of the prototype with real users and extensive simulations validate the performance and usability of our design, showing the potentials of the augmented...

  12. COMMUNICATION MANAGEMENT CRISIS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Ana Mª Enrique Jiménez

    2013-04-01

    Full Text Available It is often in the social networks where you detect the first signs of a potential crisis situation. Today, many companies decide to be present in social networks to communicate, listen and respond to their audiences openly with immediacy. A simple complaint is visible and propagates through the network in seconds, being capable of generating a negative impact on the corporate image of the organization. The same can happen to the contrary, ie, to praise the performance of a company, which may affect the creation or strengthening of the good reputation of the company. However, we know that this does not happen with the same intensity. In this paper we analyze the decisions and actions of two opposing companies, Nestlé and Panrico, in front of a possible crisis situation.

  13. Automatic disease diagnosis using optimised weightless neural networks for low-power wearable devices.

    Science.gov (United States)

    Cheruku, Ramalingaswamy; Edla, Damodar Reddy; Kuppili, Venkatanareshbabu; Dharavath, Ramesh; Beechu, Nareshkumar Reddy

    2017-08-01

    Low-power wearable devices for disease diagnosis are used at anytime and anywhere. These are non-invasive and pain-free for the better quality of life. However, these devices are resource constrained in terms of memory and processing capability. Memory constraint allows these devices to store a limited number of patterns and processing constraint provides delayed response. It is a challenging task to design a robust classification system under above constraints with high accuracy. In this Letter, to resolve this problem, a novel architecture for weightless neural networks (WNNs) has been proposed. It uses variable sized random access memories to optimise the memory usage and a modified binary TRIE data structure for reducing the test time. In addition, a bio-inspired-based genetic algorithm has been employed to improve the accuracy. The proposed architecture is experimented on various disease datasets using its software and hardware realisations. The experimental results prove that the proposed architecture achieves better performance in terms of accuracy, memory saving and test time as compared to standard WNNs. It also outperforms in terms of accuracy as compared to conventional neural network-based classifiers. The proposed architecture is a powerful part of most of the low-power wearable devices for the solution of memory, accuracy and time issues.

  14. Double network bacterial cellulose hydrogel to build a biology-device interface

    Science.gov (United States)

    Shi, Zhijun; Li, Ying; Chen, Xiuli; Han, Hongwei; Yang, Guang

    2013-12-01

    Establishing a biology-device interface might enable the interaction between microelectronics and biotechnology. In this study, electroactive hydrogels have been produced using bacterial cellulose (BC) and conducting polymer (CP) deposited on the BC hydrogel surface to cover the BC fibers. The structures of these composites thus have double networks, one of which is a layer of electroactive hydrogels combined with BC and CP. The electroconductivity provides the composites with capabilities for voltage and current response, and the BC hydrogel layer provides good biocompatibility, biodegradability, bioadhesion and mass transport properties. Such a system might allow selective biological functions such as molecular recognition and specific catalysis and also for probing the detailed genetic and molecular mechanisms of life. A BC-CP composite hydrogel could then lead to a biology-device interface. Cyclic voltammetry and electrochemical impedance spectroscopy (EIS) are used here to study the composite hydrogels' electroactive property. BC-PAni and BC-PPy respond to voltage changes. This provides a mechanism to amplify electrochemical signals for analysis or detection. BC hydrogels were found to be able to support the growth, spreading and migration of human normal skin fibroblasts without causing any cytotoxic effect on the cells in the cell culture. These double network BC-CP hydrogels are biphasic Janus hydrogels which integrate electroactivity with biocompatibility, and might provide a biology-device interface to produce implantable devices for personalized and regenerative medicine.

  15. Motorized CPM/CAM physiotherapy device with sliding-mode Fuzzy Neural Network control loop.

    Science.gov (United States)

    Ho, Hung-Jung; Chen, Tien-Chi

    2009-11-01

    Continuous passive motion (CPM) and controllable active motion (CAM) physiotherapy devices promote rehabilitation of damaged joints. This paper presents a computerized CPM/CAM system that obviates the need for mechanical resistance devices such as springs. The system is controlled by a computer which performs sliding-mode Fuzzy Neural Network (FNN) calculations online. CAM-type resistance force is generated by the active performance of an electric motor which is controlled so as to oppose the motion of the patient's leg. A force sensor under the patient's foot on the device pedal provides data for feedback in a sliding-mode FNN control loop built around the motor. Via an active impedance control feedback system, the controller drives the motor to behave similarly to a damped spring by generating and controlling the amplitude and direction of the pedal force in relation to the patient's leg. Experiments demonstrate the high sensitivity and speed of the device. The PC-based feedback nature of the control loop means that sophisticated auto-adaptable CPM/CAM custom-designed physiotherapy becomes possible. The computer base also allows extensive data recording, data analysis and network-connected remote patient monitoring.

  16. Organization of managed clinical networking for home parenteral nutrition.

    Science.gov (United States)

    Baxter, Janet P; McKee, Ruth F

    2006-05-01

    Home parenteral nutrition (HPN) is an established treatment for intestinal failure, and organization of HPN is variable throughout the UK and Europe. Managed clinical networking is the single most important feature of the UK National Health Service strategy for acute services in Scotland and has the potential to improve the management of HPN patients. This review addresses the role of managed clinical networking in HPN and compares outcome data between centres. The Scottish HPN Managed Clinical Network has published the main body of the current literature supporting the concept of managed clinical networking in this context. The Network is responsible for the organization and quality assurance of HPN provision in Scotland, and has been established for 5 years. It has captured significant patient data for the purpose of clinical audit and illustrates that this is an effective model for the management of this patient population. This review provides advice for other areas wishing to improve equity of access, and to smooth the patient journey between primary, secondary and tertiary health care in the context of artificial nutrition support.

  17. The External Networking Behaviour of Public Managers

    DEFF Research Database (Denmark)

    Hansen, Morten Balle; Villadsen, Anders Ryom

    2017-01-01

    There has been an increasing focus on managerial external networking behaviour within public administration. While most previous quantitative research has analysed such behaviour one-dimensionally, we suggest a two-dimensional conceptualization based on the concepts of weak and strong ties....... Utilizing measures resembling previous research, we explore the utility of the approach in an exploratory study of Danish local government. Our findings suggest that the two dimensions of external networking behaviour are distinct. We discuss our approach compared to previous approaches and argue...

  18. Management and Fragmentation of a Network Program

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg

    This paper contains an analysis of the role of identity in interorganizational collaboration. The case is a network program that involved three parties: eight companies, one consulting institution and a research institution. The purpose of the network program was to develop and test concepts...... and methods within organizational learning and it was supported by the Danish government. The three parties had different roles in the program. The eight companies all participated as experiments for organizational learning. Consultants from the consulting institution acted as consultants on the eight...

  19. Evaluation of Management Network Security Using Sekcheck Network Evaluator

    OpenAIRE

    Syahri, Rizal; W, Cholil; Q, Widiyati

    2014-01-01

    The Utilization of Information Technology in business has become a significant part in supporting the business process. The implementation of IT has been implemented as a value chain system which support the business transaction from first level process till documentation, its result a report which could mark the decision making process in manager level. Indeed the information which is the output of the system has a very important role in the process business; therefore the procedure and mech...

  20. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers

    Science.gov (United States)

    Li, Fei; Zhao, Wei; Guo, Ying

    2018-01-01

    Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.

  1. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Science.gov (United States)

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  2. The Role of Social Networks in Early Adoption of Mobile Devices

    Science.gov (United States)

    Tscherning, Heidi; Mathiassen, Lars

    As mobile devices have become the personal information-processing interface of choice, many individuals seem to swiftly follow fashion. Yet, the literature is silent on how early adopters of mobile devices overcome uncertainties related to shifts in technology. Based on purposive sampling, this paper presents detailed insights into why and how five closely related individuals made the decision to adopt the iPhone before it was available through traditional supply chains. Focusing on the role played by social networks, we analyze how adoption threshold, opinion leaders, social contagion, and social learning shaped adoption behaviors and outcomes. The analyses confirm that network structures impact the early decision to accept the iPhone; they show that when facing uncertainty, adoption decisions emerged as a combined result of individual adoption reflections and major influences from the social network as well as behaviors observed within the network, and, they reveal interesting behaviors that differed from expectations. In conclusion, we discuss implications for both theory and practice.

  3. Facilitate generation connections on Orkney by automatic distribution network management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This report summarises the results of a study assessing the capability and limitations of the Orkney Network under a variety of conditions of demand, generation connections, network configuration, and reactive compensation). A conceptual active management scheme (AMS) suitable for the conditions on Orkney is developed and evaluated. Details are given of a proposed framework for the design and evaluation of future active management schemes, logic control sequences for managed generation units, and a proposed evaluation method for the active management scheme. Implications of introducing the proposed AMS are examined, and the commercial aspects of an AMS and system security are considered. The existing Orkney network is described; and an overview of the SHEPDL (Scottish Hydro Electric Power Distribution Ltd.) SCADA system is presented with a discussion of AMS identification, selection, and development.

  4. NETWORKS OF HEALTH CARE: A CHALLENGE TO SUS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Camila Dubow

    2013-09-01

    Full Text Available The article proposes a critical reflection, based on national law, scholarly, scientific, on the current development of Networks of Health Care, as a strategy for strengthening the Single Health System (SUS. Are weighted inefficiency of traditional ways of organizing care and management, the challenge of Network Health Care for comprehensive care and management mechanisms used in this process. The work provides subsidies for the care practices and health management are reflected, pointing strategies that result in disruptions of paradigms through a refocusing of attention in existing models. For networks of health care can be consolidated, is fundamental to political sensitivity of health managers with a commitment to build a new model of care, through the struggle to consolidate the SUS and the realization of the principles of universality, comprehensiveness and equity.

  5. Dynamic Subsidy Method for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei

    2016-01-01

    Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion...... management in distribution networks, including the market mechanism, the mathematical formulation through a two-level optimization, and the method solving the optimization by tightening the constraints and linearization. Case studies were conducted with a one node system and the Bus 4 distribution network...... of the Roy Billinton Test System (RBTS) with high penetration of electric vehicles (EVs) and heat pumps (HPs). The case studies demonstrate the efficacy of the DS method for congestion management in distribution networks. Studies in this paper show that the DS method offers the customers a fair opportunity...

  6. Resource management for energy and spectrum harvesting sensor networks

    CERN Document Server

    Zhang, Deyu; Zhou, Haibo; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a ne...

  7. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    Science.gov (United States)

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Development of Network Devices Supporting Communication Independence In NPP I and C Systems

    International Nuclear Information System (INIS)

    Jeong, K.-I.; Suh, Y.S.; Park, G.-O.; Park, J.-Y.

    2013-06-01

    As advanced digital I and C systems of nuclear power plants or research reactors are being introduced to replace analog systems, a data communication network is necessary for data exchanges between I and C systems of nuclear power plants or research reactors. Data communication network technology may have significant impact on I and C systems. As the safety I and C system is composed of redundant channels to enhance the performance of the safety functions and data communication system is used to transmit the data generated by the digital I and C systems, communication independence is required to mitigate the risk of safety I and C system failure. Therefore this paper mainly discusses the issues related to the communication independence and the current status of network devices we designed, developed, and validated to satisfy the requirements of function, performance, and communication independence. (authors)

  9. Medical device development: managing conflicts of interest encountered by physicians.

    Science.gov (United States)

    Baim, Donald S; Donovan, Aine; Smith, John J; Briefs, Nancy; Geoffrion, Richard; Feigal, David; Kaplan, Aaron V

    2007-04-01

    New technologies introduced over the past three decades have transformed medical diagnosis and treatment, and significantly improved patient outcomes. These changes have been mediated by the introduction of new medical devices, particularly for the treatment of cardiovascular, orthopedic, and ophthalmic disorders. These devices, in turn, have created large markets and spawned a burgeoning medical device industry, including six Fortune 500 companies whose combined market capitalization now exceeds 400 billion dollars. This success story, which has unquestionably benefited patients and society alike, has been dependent upon an intense collaboration among industry, clinicians, and regulatory authorities. However, when physicians actively involved in patient care participate in such collaborations, they are increasingly vulnerable to creating potential conflicts between these two (clinical and device development) roles. Such conflicts, which may ultimately erode public trust, have important consequences not only for the individual physicians, but also for their parent institutions, their patients, sponsoring companies, and the entire clinical research enterprise that makes the development and introduction of new devices possible. The third Dartmouth Device Development Symposium held in October 2005 brought together thought leaders within the medical device community, including academicians, clinical investigators, regulators from the Food and Drug Administration and Centers for Medicare and Medicaid Services (CMS), large and small device manufacturers and the financial (venture capital and investment banks) community. The Symposium examined the conflicts of interest encountered during the early development and commercialization of a medical device. The goal of these discussions was to (1) identify and characterize the conflicts that arise and (2) provide strategies to address these conflicts. This manuscript was prepared by a writing committee to provide a summary

  10. Configuration and Management of Wireless Sensor Networks

    Science.gov (United States)

    2005-12-01

    monitor network status. B. CONCLUSIONS AND FUTURE WORK WSNs are an exciting and useful technology which will be used in various areas in the...int h = getSize().height; Image resizedImage = null; ImageFilter replicate = new ReplicateScaleFilter(w, h); ImageProducer prod = new

  11. Management of information supporting Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  12. Congestion management in Smart Distribution Network

    NARCIS (Netherlands)

    Haque, A.N.M.M.; Nguyen, P.H.; Kling, W.L.; Bliek, F.W.

    2014-01-01

    The accelerating use of Distributed Energy Resources (DERs) and new forms of loads connected in the Medium Voltage (MV) and Low Voltage (LV) networks are posing a great challenge for the Distribution System Operators (DSOs) in the near future. The bidirectional and uncertain flow of power may result

  13. Network Physics anounces first product to provide business-level management of the most complex and dynamic networks

    CERN Multimedia

    2003-01-01

    Network Physics, provider of business-level, traffic flow-based network management solutions, today announced the introduction of the Network Physics NP/BizFlow-1000. With the NP/BizFlow-1000, Fortune 1000 companies with complex and dynamic networks can analyze the flows that link business groups, critical applications, and network software and hardware (1 page).

  14. Efficient network resource management for multimedia-on-demand services

    Science.gov (United States)

    Kuo, Chinhwa; Chiu, Jui-Hwa; Wu, Jong-Jyh; Chen, Dxo-Shin

    1998-08-01

    A Multimedia Instruction on Demand (MID) serves the purpose of providing an environment for lecture design, lecture annotation, and lecture review over networks. In order to support real-time multimedia interactive playback for such an application, the underlying networks are required to provide network resource management mechanism to enforce the reservation policy. In our design, the MID server and MID gateway consist of the following mechanisms, namely, resource management agent, admission control agent, packet classifier, and packet scheduler. We make use of the framework of the ReSerVation Protocol to devise and implement a network resource management mechanism, which control end-to-end packet delays and bandwidth allocation for the designed MID system. In the present paper, our contributions are as follows: (1) a network resource management scheme is designed to support real-time multimedia over the Internet and (2) an experimental test bed is established to measure the system performance. The developed scheme is currently being implemented in the Multimedia Information Networking laboratory at Tamkang University.

  15. QNAP 1263U Network Attached Storage (NAS)/ Storage Area Network (SAN) Device Users Guide

    Science.gov (United States)

    2016-11-01

    position unless so designated by other authorized documents. Citation of manufacturer’s or trade names does not constitute an official endorsement or...Message Block, and newer standards such as Internet Small Computer Systems Interface. The differences in the protocols also play an important role in...Mapping the Network Drive 4 5.1 Windows 7 4 5.2 Windows 10 6 6. Connecting to the iSCSI on the NAS 6 7. Adding a New IQN to iSCSI ACL 7 8

  16. Intelligent Network Management and Functional Cerebellum Synthesis

    Science.gov (United States)

    Loebner, Egon E.

    1989-01-01

    Transdisciplinary modeling of the cerebellum across histology, physiology, and network engineering provides preliminary results at three organization levels: input/output links to central nervous system networks; links between the six neuron populations in the cerebellum; and computation among the neurons of the populations. Older models probably underestimated the importance and role of climbing fiber input which seems to supply write as well as read signals, not just to Purkinje but also to basket and stellate neurons. The well-known mossy fiber-granule cell-Golgi cell system should also respond to inputs originating from climbing fibers. Corticonuclear microcomplexing might be aided by stellate and basket computation and associate processing. Technological and scientific implications of the proposed cerebellum model are discussed.

  17. Managing Consumer Referrals in a Chain Network

    OpenAIRE

    Maria Arbatskaya; Hideo Konishi

    2014-01-01

    We consider the optimal pricing and referral strategy of a monopoly that uses a simple consumer communication network (a chain) to spread product information. The first-best policy with fully discriminatory position-based referral fees involves standard monopoly pricing and referral fees that provide consumers with strictly positive referral incentives. Effective price discrimination among consumers based on their positions in the chain occurs in both the first-best solution and the second-be...

  18. Bandwidth Management in Resource Constrained Networks

    Science.gov (United States)

    2012-03-01

    Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching

  19. Managing records in networked environment using EDRMS ...

    African Journals Online (AJOL)

    Vincent Mello

    ways of managing its records and archives. The impetus ... sector challenges and opportunities that organisations such as this are faced with in consideration of the ever-improving .... the operations of Rand Water as a state owned entity.

  20. International E-Waste Management Network (IEMN)

    Science.gov (United States)

    EPA and the Environmental Protection Administration Taiwan (EPAT) have collaborated since 2011 to build global capacity for the environmentally sound management of waste electrical and electronic equipment (WEEE), which is commonly called e-waste.

  1. Anesthetic management of Amplatzer atrial septal defect closure device embolization to right ventricular outflow tract

    Directory of Open Access Journals (Sweden)

    S Das

    2016-01-01

    Full Text Available Percutaneous device closure of atrial septal defect (ASD is an alternative treatment to surgery with advantages of avoidance of surgery, short procedure time, early discharge from hospital, and lower rates of complications. However, percutaneous device closure is associated with infrequent life-threatening complications such as device embolization. We report a case device embolization of the ASD occlude device into right ventricular outflow tract resulting progressive hypoxia. The role of anesthesiologist as a team leader in managing such emergency is discussed.

  2. Evaluation of knowledge management performances in NULIFE network

    International Nuclear Information System (INIS)

    Nitoi, Mirela; Cojan, Mihai; Pavelescu, Margarit

    2009-01-01

    One of the objectives of Nuclear Plant Life Prediction (NULIFE) network is the identification of experts and resources which can be used in the future. The major challenge is to use these competent personnel in an efficient manner, in the network. The paper presents the necessity of developing the knowledge management strategy for networks of excellence, as the specific issues of NULIFE network. In order to highlight the progress during the project operating, the developed indicators of performance are specified. The developed questionnaires evaluate the quality of knowledge management (development, use and distribution of knowledge), type of knowledge which is considered important for organization (at present and in future) and the benefits of knowledge transfer (immediate and in perspective). The developed questionnaires permit along with the evaluation of others groups activities, an auto-evaluation for the activity of the group where the subject is involved. (authors)

  3. Urgent surgical management for embolized occluder devices in childhood: single center experience

    Directory of Open Access Journals (Sweden)

    Gokaslan Gokhan

    2012-12-01

    Full Text Available Abstract Background In this study, we sought to analyze our experience in urgent surgical management for embolized cardiac septal and ductal occluder devices resulting from trans-catheter closure of atrial septal defect, ventricular septal defect and patent ductus arteriosus in childhood patient group. Methods We retrospectively reviewed 9 patients (aged 2–15 years who underwent urgent surgery due to cardiac septal and ductal occluder embolization between January 2007 and December 2010. Congenital defects were atrial septal defect (n = 6, ventricular septal defect (n = 1, and patent ductus arteriosus (n = 2. Risk factors for device embolization and urgent surgical management techniques for embolized device removal were discussed. Results Removal of embolized devices in all cases and repair of damaged tricuspid valve in 2 patients were performed. Inevitably, all congenital defects were closed or ligated up to the primary defect. Total circulator arrest necessitated in 1 patient with ascending aortic device embolization. All operations were completed successfully and no hospital mortality or morbidity was encountered. Conclusions Although closure of left to right shunting defects by percutaneous occluder devices has a lot of advantages, device embolization is still a major complication. If embolized device retrieval fails with percutaneous intervention attempts, surgical management is the only method to remove embolized devices. In this circumstance, to provide an uneventful perioperative course, urgent management strategies should be well planned.

  4. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  5. Radio resource management in multi-tier cellular wireless networks

    CERN Document Server

    Hossain, Ekram; Niyato, Dusit

    2013-01-01

    Providing an extensive overview of the radio resource management problem in femtocell networks, this invaluable book considers both code division multiple access femtocells and orthogonal frequency-division multiple access femtocells. In addition to incorporating current research on this topic, the book also covers technical challenges in femtocell deployment, provides readers with a variety of approaches to resource allocation and a comparison of their effectiveness, explains how to model various networks using Stochastic geometry and shot noise theory, and much more.

  6. In Vitro Reconstruction of Neuronal Networks Derived from Human iPS Cells Using Microfabricated Devices.

    Directory of Open Access Journals (Sweden)

    Yuzo Takayama

    Full Text Available Morphology and function of the nervous system is maintained via well-coordinated processes both in central and peripheral nervous tissues, which govern the homeostasis of organs/tissues. Impairments of the nervous system induce neuronal disorders such as peripheral neuropathy or cardiac arrhythmia. Although further investigation is warranted to reveal the molecular mechanisms of progression in such diseases, appropriate model systems mimicking the patient-specific communication between neurons and organs are not established yet. In this study, we reconstructed the neuronal network in vitro either between neurons of the human induced pluripotent stem (iPS cell derived peripheral nervous system (PNS and central nervous system (CNS, or between PNS neurons and cardiac cells in a morphologically and functionally compartmentalized manner. Networks were constructed in photolithographically microfabricated devices with two culture compartments connected by 20 microtunnels. We confirmed that PNS and CNS neurons connected via synapses and formed a network. Additionally, calcium-imaging experiments showed that the bundles originating from the PNS neurons were functionally active and responded reproducibly to external stimuli. Next, we confirmed that CNS neurons showed an increase in calcium activity during electrical stimulation of networked bundles from PNS neurons in order to demonstrate the formation of functional cell-cell interactions. We also confirmed the formation of synapses between PNS neurons and mature cardiac cells. These results indicate that compartmentalized culture devices are promising tools for reconstructing network-wide connections between PNS neurons and various organs, and might help to understand patient-specific molecular and functional mechanisms under normal and pathological conditions.

  7. Distributed processing and network of data acquisition and diagnostics control for Large Helical Device (LHD)

    International Nuclear Information System (INIS)

    Nakanishi, H.; Kojima, M.; Hidekuma, S.

    1997-11-01

    The LHD (Large Helical Device) data processing system has been designed in order to deal with the huge amount of diagnostics data of 600-900 MB per 10-second short-pulse experiment. It prepares the first plasma experiment in March 1998. The recent increase of the data volume obliged to adopt the fully distributed system structure which uses multiple data transfer paths in parallel and separates all of the computer functions into clients and servers. The fundamental element installed for every diagnostic device consists of two kinds of server computers; the data acquisition PC/Windows NT and the real-time diagnostics control VME/VxWorks. To cope with diversified kinds of both device control channels and diagnostics data, the object-oriented method are utilized wholly for the development of this system. It not only reduces the development burden, but also widen the software portability and flexibility. 100Mbps EDDI-based fast networks will re-integrate the distributed server computers so that they can behave as one virtual macro-machine for users. Network methods applied for the LHD data processing system are completely based on the TCP/IP internet technology, and it provides the same accessibility to the remote collaborators as local participants can operate. (author)

  8. A large interconnecting network within hybrid MEH-PPV/TiO2 nanorod photovoltaic devices

    International Nuclear Information System (INIS)

    Zeng, T-W; Lin, Y-Y; Lo, H-H; Chen, C-W; Chen, C-H; Liou, S-C; Huang, H-Y; Su, W-F

    2006-01-01

    This is a study of hybrid photovoltaic devices based on TiO 2 nanorods and poly[2-methoxy-5-(2'-ethyl-hexyloxy)-1,4-phenylene vinylene] (MEH-PPV). We use TiO 2 nanorods as the electron acceptors and conduction pathways. Here we describe how to develop a large interconnecting network within the photovoltaic device fabricated by inserting a layer of TiO 2 nanorods between the MEH-PPV:TiO 2 nanorod hybrid active layer and the aluminium electrode. The formation of a large interconnecting network provides better connectivity to the electrode, leading to a 2.5-fold improvement in external quantum efficiency as compared to the reference device without the TiO 2 nanorod layer. A power conversion efficiency of 2.2% under illumination at 565 nm and a maximum external quantum efficiency of 24% at 430 nm are achieved. A power conversion efficiency of 0.49% is obtained under Air Mass 1.5 illumination

  9. SOCIAL KNOWLEDGE MANAGEMENT, RESEARCH AND INNOVATION NETWORKS FOR INCLUSION

    Directory of Open Access Journals (Sweden)

    Sandra Ace vedo Zapata

    2017-09-01

    Full Text Available The objective is to describe the social management of knowledge through research and innovation networks to promote social inclusion. The reflection of the exploratory stage is presented within the doctoral thesis analyzing the challenges of the universities in the achievement of social inclusion with networks of research and innovation. A descriptive work was done, with documentary tracking, systematization and analysis. The findings show that it is necessary to articulate efforts in interdisciplinary and transdisciplinary networks with different actors: state, company, education, scientists, technologists and vulnerable, excluded populations, to build policies and strategies for social inclusion.

  10. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  11. Emergency Communications Network for Disasters Management in Venezuela

    Science.gov (United States)

    Burguillos, C.; Deng, H.

    2018-04-01

    The integration and use of different space technology applications for disasters management, play an important role at the time of prevents the causes and mitigates the effects of the natural disasters. Nevertheless, the space technology counts with the appropriate technological resources to provide the accurate and timely information required to support in the decision making in case of disasters. Considering the aforementioned aspects, in this research is presented the design and implementation of an Emergency Communications Network for Disasters Management in Venezuela. Network based on the design of a topology that integrates the satellites platforms in orbit operation under administration of Venezuelan state, such as: the communications satellite VENESAT-1 and the remote sensing satellites VRSS-1 and VRSS-2; as well as their ground stations with the aim to implement an emergency communications network to be activated in case of disasters which affect the public and private communications infrastructures in Venezuela. In this regard, to design the network several technical and operational specifications were formulated, between them: Emergency Strategies to Maneuver the VRSS-1 and VRSS-2 satellites for optimal images capture and processing, characterization of the VENESAT-1 transponders and radiofrequencies for emergency communications services, technologies solutions formulation and communications links design for disaster management. As result, the emergency network designed allows to put in practice diverse communications technologies solutions and different scheme or media for images exchange between the areas affected for disasters and the entities involved in the disasters management tasks, providing useful data for emergency response and infrastructures recovery.

  12. Strategy Scriptions: On sociomaterial devices staging strategy formulation European Management Journal

    DEFF Research Database (Denmark)

    Friis, Ole Uhrskov

    2014-01-01

    is making strategic choices, then chose a strategy and then making and action plan. Most project groups worked as expected, one group constituting a rare exception, as staging and the mobilisation of devices lead to unanticipated events, triggering extraordinary management activity. Our study shows......Strategy formulation can be viewed as an entanglement of social and material elements, developing sociomaterial strategy devices. Devices contribute to arranging and staging occasions of strategy formulation. The article investigates which arenas are staged for strategy formulation, which types...... of devices is purposely mobilised by management. and consultants. First, one central device, based on a balanced scorecard, is staging the managers as active strategists in a more traditional strategy workshop, with the employees as distanced spectators. Second, the employees are staged in an open space...

  13. Insertion algorithms for network model database management systems

    Science.gov (United States)

    Mamadolimov, Abdurashid; Khikmat, Saburov

    2017-12-01

    The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, forms partial order. When a database is large and a query comparison is expensive then the efficiency requirement of managing algorithms is minimizing the number of query comparisons. We consider updating operation for network model database management systems. We develop a new sequantial algorithm for updating operation. Also we suggest a distributed version of the algorithm.

  14. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  15. Madagascar's nascent locally managed marine area network

    African Journals Online (AJOL)

    communication, raise the profile and expand the use of the ... community - led approaches to conservation in Madagascar and ... Fishing communities have been managing marine resources in ... munities are finding that once abundant resources are dwin- .... per closure and lead to an enhancement in catch per unit effort.

  16. Madagascar's nascent locally managed marine area network ...

    African Journals Online (AJOL)

    Since 2004, the creation of locally managed marine areas (LMMAs) in Madagascar has exponentially increased, highlighting the need for improved information sharing between communities and between support organizations. Until recently, however, these LMMAs operated in relative isolation, with little communication or ...

  17. Wireless sensor networks for irrigation management

    Science.gov (United States)

    Sustaining an adequate food supply for the world's population will require advancements in irrigation technology and improved irrigation management. Site-specific irrigation and automatic irrigation scheduling are examples of strategies to deal with declining arable land and limited fresh water reso...

  18. Supraglottic devices as alternative equipment to airway management in state of sudden cardiac arrest

    Directory of Open Access Journals (Sweden)

    Rafał Czyż

    2017-08-01

    All of supraglottic devices are characterized by easiness in applying without experience in use them. Additionally time need to airway management in use of them is many times shorter than with traditional endotracheal intubation. Fundamental defect in these devices is a fact that they don’t provide total safety before aspiration for chime. Current literature shows us that supraglottic airway devices are perfect alternative to endotracheal intubation.

  19. Using Blockchain Technology and Smart Contracts for Access Management in IoT devices

    OpenAIRE

    Bagchi, Rupsha

    2017-01-01

    The Internet of Things is a proliferating industry, which is transforming many homes and businesses, making them smart. However, the rapid growth of these devices and the interactions between these devices, introduces many challenges including that of a secure management system for the identities and interactions of the devices. While the centralized model has worked well for many years, there is a risk of the servers becoming bottlenecks and a single point of failure, thereby making them vul...

  20. Writing orthotic device for the management of writer's cramp

    Directory of Open Access Journals (Sweden)

    Narayanasarma V. Singam

    2013-01-01

    Full Text Available Background: Oral therapies and chemodenervation procedures are often unrewarding in the treatment of focal, task-specific hand disorders such as writer's cramp or primary writing tremor. Methods: A portable writing orthotic device was evaluated on fifteen consecutively recruited writer's cramp and primary writing tremor subjects. We measured overall impairment at baseline and after two weeks of at-home use with the Writer’s Cramp Rating Scale (range = 0-8, higher is worse and writing quality and comfort with a visual analog scale (range = 0-10. Results: Compared to regular pen, the writing orthotic device improved the Writer's Cramp Rating Scale scores at first-test (p=0.001 and re-test (p=0.005 as well as writing quality and device comfort in writer's cramp subjects. Benefits were sustained at two weeks. Primary writing tremor subjects demonstrated no improvements.Conclusions: Writing orthotic devices exploiting a muscle-substitution strategy may yield immediate benefits in patients with writer's cramp.

  1. Considerations of Poka-Yoke device in total quality management

    OpenAIRE

    Claudiu Isac; Alin Isac

    2002-01-01

    Poka-Yoke is the Japanese term for mistake-proofing. Developed by Dr. Shigeo Shingo, Poka-Yoke employs devices on the process operations to prevent the special causes that result in defects, or to inexpensively inspect each item that is produced to determine whether it is acceptable or defective

  2. METHODOLOGY OF RESEARCH AND DEVELOPMENT MANAGEMENT OF REGIONAL NETWORK ECONOMY

    Directory of Open Access Journals (Sweden)

    O.I. Botkin

    2007-06-01

    Full Text Available Information practically of all the Russian regions economy branches and development by managing subjects is information − communicative the Internet technologies render huge influence on economic attitudes development in the environment of regional business: there are new forms of interaction of managing subjects and change is information − organizational structures of regional business management. Integrated image of the set forth above innovations is the regional network economy representing the interactive environment in which on high speed and with minimal transaction (R.H.Coase’s costs are performed social economic and commodity monetary attitudes between managing subjects of region with use of Internet global network interactive opportunities. The urgency of the regional network economy phenomenon research, first of all, is caused by necessity of a substantiation of regional network economy methodology development and management mechanisms development by its infrastructure with the purpose of regional business efficiency increase. In our opinion, the decision of these problems will be the defining factor of effective economic development maintenance and russian regions economy growth in the near future.

  3. A new era for cardiac rhythm management devices : Solutions for transvenous lead complications

    NARCIS (Netherlands)

    Knops, R.E.

    2017-01-01

    Both pacemakers and cardiac defibrillators (ICD) have been designed to treat cardiac arrhythmias. These arrhythmias often lead to life-threatening conditions. Numerous studies have shown the benefits on survival and quality of life of these cardiac rhythm management (CRM) devices. These devices rely

  4. California; Northern Sierra Air Quality Management District; Approval of Air Plan Revisions; Wood Burning Devices

    Science.gov (United States)

    EPA is taking final action to approve a revision to the Northern Sierra Air Quality Management District (NSAQMD) portion of the California SIP concerning emissions of particulate matter (PM) from wood burning devices.

  5. Safeguards Accountability Network accountability and materials management

    International Nuclear Information System (INIS)

    Carnival, G.J.; Meredith, E.M.

    1985-01-01

    The Safeguards Accountability Network (SAN) is a computerized on-line accountability system for the safeguards accountability control of nuclear materials inventories at Rocky Flats Plant. SAN is a dedicated accountability system utilizing source documents filled out on the shop floor as its base. The system incorporates double entry accounting and is developed around the Material Balance Area (MBA) concept. MBA custodians enter transaction information from source documents prepared by personnel in the process areas directly into the SAN system. This provides a somewhat near-real time perpetual inventory system which has limited interaction with MBA custodians. MBA custodians are permitted to inquire into the system and status items on inventory. They are also responsible for the accuracy of the accountability information used as input to the system for their MBA. Monthly audits by the Nuclear Materials Control group assure the timeliness and accuracy of SAN accountability information

  6. Overview of FACTS devices for wind power plants directly connected to the transmission network

    DEFF Research Database (Denmark)

    Adamczyk, Andrzej Grzegorz; Teodorescu, Remus; Rodriguez, Pedro

    2010-01-01

    Growing number of wind turbines is changing electricity generation profile all over the world. This brings challenges for power system operation, which was designed and developed around conventional power plants with directly coupled synchronous generators. In result, safety and stability...... of the electrical network with high wind energy penetration might be compromised. For this reason transmission system operators (TSO) impose more stringent connection requirements on the wind power plant (WPP) owners. On the other hand flexible AC transmission systems (FACTS) devices offer enhancement of grid...... research in FACTS applicability for WPPs is summarized. Examples of few existing FACTS applications for wind farms are given....

  7. A cost-effective measurement-device-independent quantum key distribution system for quantum networks

    Science.gov (United States)

    Valivarthi, Raju; Zhou, Qiang; John, Caleb; Marsili, Francesco; Verma, Varun B.; Shaw, Matthew D.; Nam, Sae Woo; Oblak, Daniel; Tittel, Wolfgang

    2017-12-01

    We experimentally realize a measurement-device-independent quantum key distribution (MDI-QKD) system. It is based on cost-effective and commercially available hardware such as distributed feedback lasers and field-programmable gate arrays that enable time-bin qubit preparation and time-tagging, and active feedback systems that allow for compensation of time-varying properties of photons after transmission through deployed fiber. We examine the performance of our system, and conclude that its design does not compromise performance. Our demonstration paves the way for MDI-QKD-based quantum networks in star-type topology that extend over more than 100 km distance.

  8. Managing CSCL Activity through networking models

    Directory of Open Access Journals (Sweden)

    Luis Casillas

    2014-04-01

    Full Text Available This study aims at managing activity carried out in Computer-Supported Collaborative Learning (CSCL environments. We apply an approach that gathers and manages the knowledge underlying huge data structures, resulting from collaborative interaction among participants and stored as activity logs. Our method comprises a variety of important issues and aspects, such as: deep understanding of collaboration among participants in workgroups, definition of an ontology for providing meaning to isolated data manifestations, discovering of knowledge structures built in huge amounts of data stored in log files, and development of high-semantic indicators to describe diverse primitive collaborative acts, and binding these indicators to formal descriptions defined in the collaboration ontology; besides our method includes gathering collaboration indicators from web forums using natural language processing (NLP techniques.

  9. Organizational Politics, Social Network, and Knowledge Management

    Science.gov (United States)

    Lee, Hyun Jung; Kang, Sora; Lee, Jongwon

    This research identifies the social relationship and structure among members as well as organization’s political inclination, through which, it also identifies the current status of knowledge management. The result shows that the socio-technological factors (individual, knowledge and IT factors) affect knowledge transfer and the knowledge transfer influences performance and that the members’ relationship based on the political inclination of the organization has a major moderating effect on the above two relation.

  10. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Science.gov (United States)

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  11. The Network Configuration of an Object Relational Database Management System

    Science.gov (United States)

    Diaz, Philip; Harris, W. C.

    2000-01-01

    The networking and implementation of the Oracle Database Management System (ODBMS) requires developers to have knowledge of the UNIX operating system as well as all the features of the Oracle Server. The server is an object relational database management system (DBMS). By using distributed processing, processes are split up between the database server and client application programs. The DBMS handles all the responsibilities of the server. The workstations running the database application concentrate on the interpretation and display of data.

  12. Load management in electrical networks. Objectives, methods, prospects

    International Nuclear Information System (INIS)

    Gabioud, D.

    2008-01-01

    This illustrated article takes up the problems related to the variation of the load in electricity networks. How to handle the peak load? Different solutions in the energy demand management are discussed. Method based on the price, method based on the reduction of the load by electric utilities. Information systems are presented which gives the consumer the needed data to participate in the local load management.

  13. Knowledge network for medical technology management in Mexico.

    Science.gov (United States)

    Licona, Fabiola Martínez; Leehan, Joaquín Azpiroz; Méndez, Miguel Cadena; Yuriar, Salvador Duarte; Salazar, Raúl Molina; Gilmore, Amador Terán

    2009-10-01

    The role of biomedical engineers (BMEs) has changed widely over the years, from managing a group of technicians to the planning of large installations and the management of medical technology countrywide. As the technology has advanced, the competence of BMEs has been challenged because it is no longer possible to be an expert in every component of the technology involved in running a hospital. Our approach has been to form a network of professionals that are experts in different fields related to medical technology, where work is coordinated to provide high quality services at the planning and execution stages of projects related to medical technology. A study of the procedures involved in the procurement of medical technology has been carried out over the years. These experiences have been compared with several case studies where the approach to problem solving in this area has been multidisciplinary. Planning and execution phases of projects involving medical technology management have been identified. After several instances of collaboration among experts from different fields, a network for management of healthcare technology has been formed at our institution that incorporates the experience from different departments that were dealing separately with projects involving medical technology. This network has led us to propose this approach to solve medical technology management projects, where the strengths of each subgroup complement each other. This structure will lead to a more integrated approach to healthcare technology management and will ensure higher quality solutions.

  14. Agile Management and Interoperability Testing of SDN/NFV‐Enriched 5G Core Networks

    Directory of Open Access Journals (Sweden)

    Taesang Choi

    2018-02-01

    Full Text Available In the fifth generation (5G era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission‐critical Internet of Things is the main differentiator of 5G services. These types of real‐time and large‐bandwidth‐consuming services require a radio latency of less than 1 ms and an end‐to‐end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software‐defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof‐of‐concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

  15. Research on two-port network of wavelet transform processor using surface acoustic wavelet devices and its application.

    Science.gov (United States)

    Liu, Shoubing; Lu, Wenke; Zhu, Changchun

    2017-11-01

    The goal of this research is to study two-port network of wavelet transform processor (WTP) using surface acoustic wave (SAW) devices and its application. The motive was prompted by the inconvenience of the long research and design cycle and the huge research funding involved with traditional method in this field, which were caused by the lack of the simulation and emulation method of WTP using SAW devices. For this reason, we introduce the two-port network analysis tool, which has been widely used in the design and analysis of SAW devices with uniform interdigital transducers (IDTs). Because the admittance parameters calculation formula of the two-port network can only be used for the SAW devices with uniform IDTs, this analysis tool cannot be directly applied into the design and analysis of the processor using SAW devices, whose input interdigital transducer (IDT) is apodized weighting. Therefore, in this paper, we propose the channel segmentation method, which can convert the WTP using SAW devices into parallel channels, and also provide with the calculation formula of the number of channels, the number of finger pairs and the static capacitance of an interdigital period in each parallel channel firstly. From the parameters given above, we can calculate the admittance parameters of the two port network for each channel, so that we can obtain the admittance parameter of the two-port network of the WTP using SAW devices on the basis of the simplification rule of parallel two-port network. Through this analysis tool, not only can we get the impulse response function of the WTP using SAW devices but we can also get the matching circuit of it. Large numbers of studies show that the parameters of the two-port network obtained by this paper are consistent with those measured by network analyzer E5061A, and the impulse response function obtained by the two-port network analysis tool is also consistent with that measured by network analyzer E5061A, which can meet the

  16. Management of antithrombotic therapy during cardiac implantable device surgery.

    Science.gov (United States)

    AlTurki, Ahmed; Proietti, Riccardo; Birnie, David H; Essebag, Vidal

    2016-06-01

    Anticoagulants are commonly used drugs that are frequently encountered during device placement. Deciding when to halt or continue the use of anticoagulants is a balance between the risks of thromboembolism versus bleeding. Patients taking warfarin with a high risk of thromboembolism should continue to take their warfarin without interruption during device placement while ensuring their international normalized ratio remains below 3. For patients who are taking warfarin and have low risk of thromboembolism, either interrupted or continued warfarin may be used, with no evidence to clearly support either strategy. There is little evidence to support continuing direct acting oral anticoagulants (DOACs) for device implantation. The timing of halting these medications depends largely on renal function. If bleeding occurs, warfarin׳s anticoagulation effect is reversible with vitamin K and activated prothrombin complex concentrate. There are no DOAC reversal agents currently available, but some are under development. Regarding antiplatelet agents, aspirin alone can be safely continued while clopidogrel alone may also be continued, but with a slightly higher bleeding risk. Dual antiplatelet therapy for bare-metal stent/drug-eluting stent implanted within 4 weeks/6 months, respectively, should be continued due to high risk of stent thrombosis; however, if they are implanted after this period, then clopidogrel can be halted 5 days before the procedure and resumed soon after, while aspirin is continued. If the patient is taking both aspirin and warfarin, aspirin should be halted 5 days prior to the procedure, while warfarin is continued.

  17. Organizational network in trauma management in Italy

    Directory of Open Access Journals (Sweden)

    Osvaldo Chiara

    2005-10-01

    Full Text Available In Italy, as in other western countries, trauma is a leading cause of death during the first four decades of life, with almost 18.000 of deaths per year. Since 80s organized systems for trauma care, including a pre-hospital emergency medical system and a network of hospitals designated as Trauma Centres, have been developed in north American countries. Effectiveness of trauma systems has been investigated comparing the post-system to the pre-system trauma care with the method of panel evaluation of preventable death rates and comparison of observed survival with expected probability of survival. In Italy, a pre-hospital emergency medical system has been implemented on a national scale, while a trauma network has not been developed. Nowadays, trauma patients are often admitted to the closest hospital, independently from local resources. The Superior Council of Ministry of Health has presented in 2004 a new trauma system model (SIAT based on the recognition in the field of patients with more serious injuries and the transportation to general hospitals with resources and multidisciplinary teams specialized in trauma care (trauma team. The designation of few trauma team hospitals, one highly specialized Centre (CTS and two area Centres (CTZ every two millions of inhabitants allows each Centre to treat at least 250 severe trauma patients per year to increase experience. Less severe injured patients may be treated in non-trauma team acute care facilities, according to the inclusive system model. The development of trauma team services in some Italian hospitals has demonstrated an increase in survival and a decrease in preventable death rate from 42% to 7,6%. Economic studies of Ministry of Health have established that the implementation of a trauma system model on a national scale with a 25% decrease of preventable trauma deaths and disabilities would save 7500 million of euros of public money. Therefore, in our country the concentration of severely

  18. Social Networking for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  19. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  20. Double-NAT Based Mobility Management for Future LTE Networks

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture and develop a novel IP mobility management solution for it. The proposed solution can handle traffic redirecting and IP address continuity above the distributed anchor

  1. Managing Coopetition in Supplier Networks : A Paradox Perspective

    NARCIS (Netherlands)

    Wilhelm, Miriam; Sydow, Jörg

    2018-01-01

    Scholars in the field of supply chain management have started to embrace the idea of simultaneous cooperation and competition (“coopetition”) in supplier networks but have mainly looked at coopetition from a structural perspective. In this paper, we complement the structural view with a paradox

  2. International agri-food chains and networks. Management and Organization

    NARCIS (Netherlands)

    Bijman, J.; Omta, S.W.F.; Trienekens, J.H.; Wijnands, J.H.M.; Wubben, E.F.M.

    2006-01-01

    This book brings together a rich collection of papers on management and organization in agri-food chains and networks. Producers, processors, traders and retailers of agricultural and food products operate in an economic and institutional environment that is increasingly dominated by global

  3. Idea Management: Perspectives from Leadership, Learning, and Network Theory

    NARCIS (Netherlands)

    D. Deichmann (Dirk)

    2012-01-01

    textabstractIn this dissertation, we focus on how leadership styles, individual learning behaviors, and social network structures drive or inhibit organizational members to repeatedly generate and develop innovative ideas. Taking the idea management programs of three multinational companies as the

  4. Managing health physics departmental data via a local area network

    International Nuclear Information System (INIS)

    Weber, P.J.; Castronovo, F.P. Jr.

    1993-01-01

    The authors describe the multiuser data management system that can be accessed simultaneously by all department members, in use at the Dept of Health Physics, Brigham and Women's Hospital, U.S.A., which makes use of the Local Area Network. (UK)

  5. Modeling Social Influences in a Knowledge Management Network

    Science.gov (United States)

    Franco, Giacomo; Maresca, Paolo; Nota, Giancarlo

    2010-01-01

    The issue of knowledge management in a distributed network is receiving increasing attention from both scientific and industrial organizations. Research efforts in this field are motivated by the awareness that knowledge is more and more perceived as a primary economic resource and that, in the context of organization of organizations, the…

  6. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  7. Public Management and Educational Performance: The impact of Managerial Networking

    NARCIS (Netherlands)

    O'Toole, Laurence J.; Meier, Kenneth J.

    2003-01-01

    Policies are implemented in complex networks of organizations and target populations. Effective action often requires managers to deal with an array of actors to procure resources, build support, coproduce results, and overcome obstacles to implementation. Few large-n studies have examined the

  8. An Internet of Things Approach for Managing Smart Services Provided by Wearable Devices

    OpenAIRE

    Pedro Castillejo; José-Fernán Martínez; Lourdes López; Gregorio Rubio

    2013-01-01

    The Internet of Things (IoT) is growing at a fast pace with new devices getting connected all the time. A new emerging group of these devices is the wearable devices, and the wireless sensor networks are a good way to integrate them in the IoT concept and bring new experiences to the daily life activities. In this paper, we present an everyday life application involving a WSN as the base of a novel context-awareness sports scenario, where physiological parameters are measured and sent to the ...

  9. Intelligent battery energy management and control for vehicle-to-grid via cloud computing network

    International Nuclear Information System (INIS)

    Khayyam, Hamid; Abawajy, Jemal; Javadi, Bahman; Goscinski, Andrzej; Stojcevski, Alex; Bab-Hadiashar, Alireza

    2013-01-01

    Highlights: • The intelligent battery energy management substantially reduces the interactions of PEV with parking lots. • The intelligent battery energy management improves the energy efficiency. • The intelligent battery energy management predicts the road load demand for vehicles. - Abstract: Plug-in Electric Vehicles (PEVs) provide new opportunities to reduce fuel consumption and exhaust emission. PEVs need to draw and store energy from an electrical grid to supply propulsive energy for the vehicle. As a result, it is important to know when PEVs batteries are available for charging and discharging. Furthermore, battery energy management and control is imperative for PEVs as the vehicle operation and even the safety of passengers depend on the battery system. Thus, scheduling the grid power electricity with parking lots would be needed for efficient charging and discharging of PEV batteries. This paper aims to propose a new intelligent battery energy management and control scheduling service charging that utilize Cloud computing networks. The proposed intelligent vehicle-to-grid scheduling service offers the computational scalability required to make decisions necessary to allow PEVs battery energy management systems to operate efficiently when the number of PEVs and charging devices are large. Experimental analyses of the proposed scheduling service as compared to a traditional scheduling service are conducted through simulations. The results show that the proposed intelligent battery energy management scheduling service substantially reduces the required number of interactions of PEV with parking lots and grid as well as predicting the load demand calculated in advance with regards to their limitations. Also it shows that the intelligent scheduling service charging using Cloud computing network is more efficient than the traditional scheduling service network for battery energy management and control

  10. Advanced Energy Storage Management in Distribution Network

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Guodong [ORNL; Ceylan, Oguzhan [ORNL; Xiao, Bailu [ORNL; Starke, Michael R [ORNL; Ollis, T Ben [ORNL; King, Daniel J [ORNL; Irminger, Philip [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

    2016-01-01

    With increasing penetration of distributed generation (DG) in the distribution networks (DN), the secure and optimal operation of DN has become an important concern. In this paper, an iterative mixed integer quadratic constrained quadratic programming model to optimize the operation of a three phase unbalanced distribution system with high penetration of Photovoltaic (PV) panels, DG and energy storage (ES) is developed. The proposed model minimizes not only the operating cost, including fuel cost and purchasing cost, but also voltage deviations and power loss. The optimization model is based on the linearized sensitivity coefficients between state variables (e.g., node voltages) and control variables (e.g., real and reactive power injections of DG and ES). To avoid slow convergence when close to the optimum, a golden search method is introduced to control the step size and accelerate the convergence. The proposed algorithm is demonstrated on modified IEEE 13 nodes test feeders with multiple PV panels, DG and ES. Numerical simulation results validate the proposed algorithm. Various scenarios of system configuration are studied and some critical findings are concluded.

  11. Active local distribution network management for embedded generation

    Energy Technology Data Exchange (ETDEWEB)

    White, S.

    2005-07-01

    With the newer electric power transmission networks, there is a requirement for power to flow in two different directions and this calls for more intelligent forms of management. To satisfy these demands, GENEVAC has produced a controller that aims to increase the energy that power plants can feed to the distribution networks. The software and hardware have undergone trials at two 33/11 kV substations in England. The hardware was designed to monitor voltage, current and phase angle at various points in the network. The software estimates the value of the voltages at every node in the network. The results showed good correlation between estimated and measured voltages: other findings are reported. Recommendations for further work are made including development of a full commercial system. The study was conducted by Econnect Ltd under contract to the DTI.

  12. Error performance analysis in downlink cellular networks with interference management

    KAUST Repository

    Afify, Laila H.

    2015-05-01

    Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly abstract many important wireless communication system aspects (e.g., modulation techniques, signal recovery techniques). Recently, a novel stochastic geometry model, based on the Equivalent-in-Distribution (EiD) approach, succeeded to capture the aforementioned communication system aspects and extend the analysis to averaged error performance, however, on the expense of increasing the modeling complexity. Inspired by the EiD approach, the analysis developed in [1] takes into consideration the key system parameters, while providing a simple tractable analysis. In this paper, we extend this framework to study the effect of different interference management techniques in downlink cellular network. The accuracy of the proposed analysis is verified via Monte Carlo simulations.

  13. Processes in construction of failure management expert systems from device design information

    Science.gov (United States)

    Malin, Jane T.; Lance, Nick

    1987-01-01

    This paper analyzes the tasks and problem solving methods used by an engineer in constructing a failure management expert system from design information about the device to te diagnosed. An expert test engineer developed a trouble-shooting expert system based on device design information and experience with similar devices, rather than on specific expert knowledge gained from operating the device or troubleshooting its failures. The construction of the expert system was intensively observed and analyzed. This paper characterizes the knowledge, tasks, methods, and design decisions involved in constructing this type of expert system, and makes recommendations concerning tools for aiding and automating construction of such systems.

  14. Design and Realization of a Condition Management System for the Gateway Electrical Energy Metering Device

    Directory of Open Access Journals (Sweden)

    Chao Tang

    2013-12-01

    Full Text Available With the construction of firm and intelligent power grid in China, it is difficult for the traditional management method of electrical energy metering device to meet the prospecting requirements. Using the computer and internet techniques to realize the information and intelligentization of the electrical energy metering management has become a necessary guarantee of improving power supply ability, marketing control, and customer service. This paper introduced a kind of large and intelligent condition management system of the gateway electrical energy metering device. The key technologies and realize process were analyzed. Moreover, a detailed description of the application modules such as the GIS smart display of metering point, the condition management of metering devices and the visual monitoring of metering point was presented. The trial operation in the selected transformer substations and the power stations of Chongqing Power Electrical Corp. indicated that, the condition management system is very open, safety and efficient. According to the data exchange with the production and scheduling platform, the system improved the efficient operation of the electrical energy metering devices. Meanwhile, combined with the real-time visual monitoring, the condition management system improved the prevention ability of electricity filching, realized the unified automatic large-scale management of electrical energy metering devices.

  15. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández

    2014-01-01

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678

  16. Energy management in mobile devices with the cinder operating system

    KAUST Repository

    Roy, Arjun

    2011-01-01

    We argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. We present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. We identify three key properties of control - isolation, delegation, and subdivision - and show how using these abstractions can achieve them. We also show how the architecture of the HiStar information-flow control kernel lends itself well to energy control. We prototype and evaluate Cinder on a popular smartphone, the Android G1. Copyright © 2011 ACM.

  17. An Overview of Optical Network Bandwidth and Fault Management

    Directory of Open Access Journals (Sweden)

    J.A. Zubairi

    2010-09-01

    Full Text Available This paper discusses the optical network management issues and identifies potential areas for focused research. A general outline of the main components in optical network management is given and specific problems in GMPLS based model are explained. Later, protection and restoration issues are discussed in the broader context of fault management and the tools developed for fault detection are listed. Optical networks need efficient and reliable protection schemes that restore the communications quickly on the occurrence of faults without causing failure of real-time applications using the network. A holistic approach is required that provides mechanisms for fault detection, rapid restoration and reversion in case of fault resolution. Since the role of SDH/SONET is diminishing, the modern optical networks are poised towards the IP-centric model where high performance IP-MPLS routers manage a core intelligent network of IP over WDM. Fault management schemes are developed for both the IP layer and the WDM layer. Faults can be detected and repaired locally and also through centralized network controller. A hybrid approach works best in detecting the faults where the domain controller verifies the established LSPs in addition to the link tests at the node level. On detecting a fault, rapid restoration can perform localized routing of traffic away from the affected port and link. The traffic may be directed to pre-assigned backup paths that are established as shared or dedicated resources. We examine the protection issues in detail including the choice of layer for protection, implementing protection or restoration, backup path routing, backup resource efficiency, subpath protection, QoS traffic survival and multilayer protection triggers and alarm propagation. The complete protection cycle is described and mechanisms incorporated into RSVP-TE and other protocols for detecting and recording path errors are outlined. In addition, MPLS testbed

  18. Leveraging network utility management practices for regulatory purposes

    International Nuclear Information System (INIS)

    2009-11-01

    Electric utilities around the globe are entering a phase where they must modernize and implement smart grid technologies. In order to optimize system architecture, asset replacement, and future operating costs, it the utilities must implement robust and flexible asset management structures. This report discussed the ways in which regulators assess investment plans. It focused on the implicit or explicit use of an asset management approach, including principles; processes; input and outputs; decision-making criteria and prioritization methods. The Ontario Energy Board staff were familiarized with the principles and objectives of established and emerging asset management processes and underlying analytic processes, systems and tools in order to ensure that investment information provided by network utilities regarding rates and other applications could be evaluated effectively. Specifically, the report discussed the need for and importance of asset management and provided further details of international markets and their regulatory approaches to asset management. The report also discussed regulatory approaches for review of asset management underlying investment plans as well as an overview of international regulatory practice for review of network utility asset management. It was concluded that options for strengthening regulatory guidance and assessment included utilizing appropriate and effective benchmarking to assess, promote and provide incentives for best practices and steer clear of the potential perverse incentives. 21 tabs., 17 figs., 1 appendix.

  19. A Data Scheduling and Management Infrastructure for the TEAM Network

    Science.gov (United States)

    Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.

    2009-04-01

    currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the

  20. An optimized electronic device for solar power harvesting dedicated to wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Le Cam, Vincent; Le Maulf, Regis; Lemarchand, Laurent; Martin, William; Le Pen, Mathieu [LUNAM Univ., Bouguenais (France). IFSTTAR, MACS Dept.

    2012-07-01

    For economics as for practical reasons, this last decade, the use and dissemination of wireless sensor networks (WSN) became obvious; particularly in structural heath monitoring (SHM) use-cases where distances between sensors could be long and access to the structure quite difficult. Even if efforts are leaded to design small components and RF modules that ask for low-power, the need of an external source is often necessary. After have acquired knowledge in solar cells as in batteries technologies and methods to control charge/discharge phases as in optimizing algorithms, IFSTTAR laboratory has designed an electronic device that integrates those progress. This electronic device has a quite generic mission: for a panel of batteries chemistry (Lithium, NiMh) and a panel of solar cells sources (frome mW to some W), the system acts as an improved battery charger whatever the load ask for power. The system applies control algorithms based on battery capacity and chemistry profile. It also applies the MPPT (Maximum Power Point Tracking) algorithm. At any time, battery State Of Charge (SOC) can be requested via I2C bus as well as a warning signal is output when SOC becomes critical. Through standard pin connectors and a simple I2C interface, the system can be used by many wireless devices (sensors) that have to run autonomously. After the presentation of this system, a focus on its application on a real use-case will be given. (orig.)

  1. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  2. A Software Suite for Testing SpaceWire Devices and Networks

    Science.gov (United States)

    Mills, Stuart; Parkes, Steve

    2015-09-01

    SpaceWire is a data-handling network for use on-board spacecraft, which connects together instruments, mass-memory, processors, downlink telemetry, and other on-board sub-systems. SpaceWire is simple to implement and has some specific characteristics that help it support data-handling applications in space: high-speed, low-power, simplicity, relatively low implementation cost, and architectural flexibility making it ideal for many space missions. SpaceWire provides high-speed (2 Mbits/s to 200 Mbits/s), bi-directional, full-duplex data-links, which connect together SpaceWire enabled equipment. Data-handling networks can be built to suit particular applications using point-to-point data-links and routing switches. STAR-Dundee’s STAR-System software stack has been designed to meet the needs of engineers designing and developing SpaceWire networks and devices. This paper describes the aims of the software and how those needs were met.

  3. The cell envelope stress response of Bacillus subtilis: from static signaling devices to dynamic regulatory network.

    Science.gov (United States)

    Radeck, Jara; Fritz, Georg; Mascher, Thorsten

    2017-02-01

    The cell envelope stress response (CESR) encompasses all regulatory events that enable a cell to protect the integrity of its envelope, an essential structure of any bacterial cell. The underlying signaling network is particularly well understood in the Gram-positive model organism Bacillus subtilis. It consists of a number of two-component systems (2CS) and extracytoplasmic function σ factors that together regulate the production of both specific resistance determinants and general mechanisms to protect the envelope against antimicrobial peptides targeting the biogenesis of the cell wall. Here, we summarize the current picture of the B. subtilis CESR network, from the initial identification of the corresponding signaling devices to unraveling their interdependence and the underlying regulatory hierarchy within the network. In the course of detailed mechanistic studies, a number of novel signaling features could be described for the 2CSs involved in mediating CESR. This includes a novel class of so-called intramembrane-sensing histidine kinases (IM-HKs), which-instead of acting as stress sensors themselves-are activated via interprotein signal transfer. Some of these IM-HKs are involved in sensing the flux of antibiotic resistance transporters, a unique mechanism of responding to extracellular antibiotic challenge.

  4. An emerging network storage management standard: Media error monitoring and reporting information (MEMRI) - to determine optical tape data integrity

    Science.gov (United States)

    Podio, Fernando; Vollrath, William; Williams, Joel; Kobler, Ben; Crouse, Don

    1998-01-01

    Sophisticated network storage management applications are rapidly evolving to satisfy a market demand for highly reliable data storage systems with large data storage capacities and performance requirements. To preserve a high degree of data integrity, these applications must rely on intelligent data storage devices that can provide reliable indicators of data degradation. Error correction activity generally occurs within storage devices without notification to the host. Early indicators of degradation and media error monitoring 333 and reporting (MEMR) techniques implemented in data storage devices allow network storage management applications to notify system administrators of these events and to take appropriate corrective actions before catastrophic errors occur. Although MEMR techniques have been implemented in data storage devices for many years, until 1996 no MEMR standards existed. In 1996 the American National Standards Institute (ANSI) approved the only known (world-wide) industry standard specifying MEMR techniques to verify stored data on optical disks. This industry standard was developed under the auspices of the Association for Information and Image Management (AIIM). A recently formed AIIM Optical Tape Subcommittee initiated the development of another data integrity standard specifying a set of media error monitoring tools and media error monitoring information (MEMRI) to verify stored data on optical tape media. This paper discusses the need for intelligent storage devices that can provide data integrity metadata, the content of the existing data integrity standard for optical disks, and the content of the MEMRI standard being developed by the AIIM Optical Tape Subcommittee.

  5. Data base management system configuration specification. [computer storage devices

    Science.gov (United States)

    Neiers, J. W.

    1979-01-01

    The functional requirements and the configuration of the data base management system are described. Techniques and technology which will enable more efficient and timely transfer of useful data from the sensor to the user, extraction of information by the user, and exchange of information among the users are demonstrated.

  6. A Distributed Routing Scheme for Energy Management in Solar Powered Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.; Shamma, Jeff S.; Claudel, Christian G.

    2017-01-01

    Energy management is critical for solar-powered sensor networks. In this article, we consider data routing policies to optimize the energy in solar powered networks. Motivated by multipurpose sensor networks, the objective is to find the best

  7. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  8. Distribution Networks Management with High Penetration of Photovoltaic Panels

    DEFF Research Database (Denmark)

    Morais, Hugo

    2013-01-01

    The photovoltaic solar panels penetration increases significantly in recent years in several European countries, mainly in the low voltage and medium voltage networks supported by governmental policies and incentives. Consequently, the acquisition and installation costs of PV panels decrease...... and the know–how increase significantly. Presently is important the use of new management methodologies in distribution networks to support the growing penetration of PV panels. In some countries, like in Germany and in Italy, the solar generation based in photovoltaic panels supply 40% of the demand in some...

  9. Integrated resource management for Hybrid Optical Wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    Efficient utilization of available bandwidth over hybrid optical wireless networks is a critical issue, especially for multimedia applications with high data rates and stringent Quality of Service (QoS) requirements. In this paper, we propose an integrated resource management including an enhanced...... resource sharing scheme and an integrated admission control scheme for the hybrid optical wireless networks. It provides QoS guarantees for connections through both optical and wireless domain. Simulation results show that our proposed scheme improves QoS performances in terms of high throughput and low...

  10. Development of a Contingency Capillary Wastewater Management Device

    Science.gov (United States)

    Thomas, Evan A.

    2010-01-01

    The Personal Body .Attached Liquid Liquidator (PBALL) is conceived as a passive, capillary driven contingency wastewater disposal device. In this contingency scenario, the airflow system on the NASA Crew Exploration Vehicle (CEV) is assumed to have failed, leaving only passive hardware and vacuum vent to dispose of the wastewater. To meet these needs, the PBALL was conceived to rely on capillary action and urine wetting design considerations. The PBALL is designed to accommodate a range of wetting conditions, from 0deg < (theta)adv approx. 90deg, be adaptable for both male and female use, collect and retain up to a liter of urine, minimize splash-back, and allow continuous drain of the wastewater to vacuum while minimizing cabin air loss. A sub-scale PBALL test article was demonstrated on NASA's reduced gravity aircraft in April, 2010.

  11. Cardiac device infections: definition, classification, differential diagnosis, and management.

    Science.gov (United States)

    Polewczyk, Anna; Janion, Marianna; Kutarski, Andrzej

    2016-04-13

    Cardiac device infections (CDIs) continue to be a serious clinical problem, with varying terminology and different classifications constituting one of the major diagnostic and therapeutic challenges in routine clinical practice. The problem invariably arises during an attempt to estimate the extent of the infection, which in consequence determines the choice of treatment strategy (duration of antibiotic therapy). The most serious form of CDI is lead-related infective endocarditis (LRIE). There are no clearly established diagnostic criteria for this disease; the available Duke University criteria are difficult to apply in patients with a suspicion of LRIE because of low sensitivity. As the treatment of LRIE is expensive and troublesome, there is a tendency to underdiagnose this condition and seek any intermediary forms between local pocket infection and definite LRIE. The present review includes suggestions for the systematization of CDIs with a clear definition of LRIE as a separate and most severe entity among CDIs.

  12. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    Science.gov (United States)

    2007-01-15

    machine when it tries to probe and login to other machines that the compromised machine does not usually connect to. Such ano- molous traffic patterns would...3107.pdf [Porras97] Phillip A. Porras and Peter G. Neumann. EMERALD : event monitoring enabling responses to anomalous live disturbances. National...Samar95] V. Samar and R. J. Schemers III. Unified login with pluggable authentication modules (PAM). Open Software Foundation RFC 86.0. Open Software

  13. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  14. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  15. Management of synchronized network activity by highly active neurons

    International Nuclear Information System (INIS)

    Shein, Mark; Raichman, Nadav; Ben-Jacob, Eshel; Volman, Vladislav; Hanein, Yael

    2008-01-01

    Increasing evidence supports the idea that spontaneous brain activity may have an important functional role. Cultured neuronal networks provide a suitable model system to search for the mechanisms by which neuronal spontaneous activity is maintained and regulated. This activity is marked by synchronized bursting events (SBEs)—short time windows (hundreds of milliseconds) of rapid neuronal firing separated by long quiescent periods (seconds). However, there exists a special subset of rapidly firing neurons whose activity also persists between SBEs. It has been proposed that these highly active (HA) neurons play an important role in the management (i.e. establishment, maintenance and regulation) of the synchronized network activity. Here, we studied the dynamical properties and the functional role of HA neurons in homogeneous and engineered networks, during early network development, upon recovery from chemical inhibition and in response to electrical stimulations. We found that their sequences of inter-spike intervals (ISI) exhibit long time correlations and a unimodal distribution. During the network's development and under intense inhibition, the observed activity follows a transition period during which mostly HA neurons are active. Studying networks with engineered geometry, we found that HA neurons are precursors (the first to fire) of the spontaneous SBEs and are more responsive to electrical stimulations

  16. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  17. Starling flock networks manage uncertainty in consensus at low cost.

    Directory of Open Access Journals (Sweden)

    George F Young

    Full Text Available Flocks of starlings exhibit a remarkable ability to maintain cohesion as a group in highly uncertain environments and with limited, noisy information. Recent work demonstrated that individual starlings within large flocks respond to a fixed number of nearest neighbors, but until now it was not understood why this number is seven. We analyze robustness to uncertainty of consensus in empirical data from multiple starling flocks and show that the flock interaction networks with six or seven neighbors optimize the trade-off between group cohesion and individual effort. We can distinguish these numbers of neighbors from fewer or greater numbers using our systems-theoretic approach to measuring robustness of interaction networks as a function of the network structure, i.e., who is sensing whom. The metric quantifies the disagreement within the network due to disturbances and noise during consensus behavior and can be evaluated over a parameterized family of hypothesized sensing strategies (here the parameter is number of neighbors. We use this approach to further show that for the range of flocks studied the optimal number of neighbors does not depend on the number of birds within a flock; rather, it depends on the shape, notably the thickness, of the flock. The results suggest that robustness to uncertainty may have been a factor in the evolution of flocking for starlings. More generally, our results elucidate the role of the interaction network on uncertainty management in collective behavior, and motivate the application of our approach to other biological networks.

  18. Starling Flock Networks Manage Uncertainty in Consensus at Low Cost

    Science.gov (United States)

    Young, George F.; Scardovi, Luca; Cavagna, Andrea; Giardina, Irene; Leonard, Naomi E.

    2013-01-01

    Flocks of starlings exhibit a remarkable ability to maintain cohesion as a group in highly uncertain environments and with limited, noisy information. Recent work demonstrated that individual starlings within large flocks respond to a fixed number of nearest neighbors, but until now it was not understood why this number is seven. We analyze robustness to uncertainty of consensus in empirical data from multiple starling flocks and show that the flock interaction networks with six or seven neighbors optimize the trade-off between group cohesion and individual effort. We can distinguish these numbers of neighbors from fewer or greater numbers using our systems-theoretic approach to measuring robustness of interaction networks as a function of the network structure, i.e., who is sensing whom. The metric quantifies the disagreement within the network due to disturbances and noise during consensus behavior and can be evaluated over a parameterized family of hypothesized sensing strategies (here the parameter is number of neighbors). We use this approach to further show that for the range of flocks studied the optimal number of neighbors does not depend on the number of birds within a flock; rather, it depends on the shape, notably the thickness, of the flock. The results suggest that robustness to uncertainty may have been a factor in the evolution of flocking for starlings. More generally, our results elucidate the role of the interaction network on uncertainty management in collective behavior, and motivate the application of our approach to other biological networks. PMID:23382667

  19. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2016-07-01

    Full Text Available In recent years, deep neural networks (DNN have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30,000X compared to state-of-the-art microprocessors while providing power efficiency of 84,000 GigaOps/s/W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things sensors.

  20. Three-terminal ferroelectric synapse device with concurrent learning function for artificial neural networks

    International Nuclear Information System (INIS)

    Nishitani, Y.; Kaneko, Y.; Ueda, M.; Fujii, E.; Morie, T.

    2012-01-01

    Spike-timing-dependent synaptic plasticity (STDP) is demonstrated in a synapse device based on a ferroelectric-gate field-effect transistor (FeFET). STDP is a key of the learning functions observed in human brains, where the synaptic weight changes only depending on the spike timing of the pre- and post-neurons. The FeFET is composed of the stacked oxide materials with ZnO/Pr(Zr,Ti)O 3 (PZT)/SrRuO 3 . In the FeFET, the channel conductance can be altered depending on the density of electrons induced by the polarization of PZT film, which can be controlled by applying the gate voltage in a non-volatile manner. Applying a pulse gate voltage enables the multi-valued modulation of the conductance, which is expected to be caused by a change in PZT polarization. This variation depends on the height and the duration of the pulse gate voltage. Utilizing these characteristics, symmetric and asymmetric STDP learning functions are successfully implemented in the FeFET-based synapse device by applying the non-linear pulse gate voltage generated from a set of two pulses in a sampling circuit, in which the two pulses correspond to the spikes from the pre- and post-neurons. The three-terminal structure of the synapse device enables the concurrent learning, in which the weight update can be performed without canceling signal transmission among neurons, while the neural networks using the previously reported two-terminal synapse devices need to stop signal transmission for learning.

  1. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations.

    Science.gov (United States)

    Gokmen, Tayfun; Vlasov, Yurii

    2016-01-01

    In recent years, deep neural networks (DNN) have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU) devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30, 000 × compared to state-of-the-art microprocessors while providing power efficiency of 84, 000 GigaOps∕s∕W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration, and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things) sensors.

  2. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    Science.gov (United States)

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-01-01

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead. PMID:23807687

  3. D-MSR: a distributed network management scheme for real-time monitoring and process control applications in wireless industrial automation.

    Science.gov (United States)

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-06-27

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  4. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    Science.gov (United States)

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  5. Reducing domestic heating demand: Managing the impact of behavior-changing feedback devices via marketing.

    Science.gov (United States)

    Jensen, Thorben; Chappin, Émile J L

    2017-07-15

    Feedback devices can be used to inform households about their energy-consumption behavior. This may persuade them to practice energy conservation. The use of feedback devices can also-via word of mouth-spread among households and thereby support the spread of the incentivized behavior, e.g. energy-efficient heating behavior. This study investigates how to manage the impact of these environmental innovations via marketing. Marketing activities can support the diffusion of devices. This study aims to identify the most effective strategies of marketing feedback devices. We did this by adapting an agent-based model to simulate the roll-out of a novel feedback technology and heating behavior within households in a virtual city. The most promising marketing strategies were simulated and their impacts were analyzed. We found it particularly effective to lend out feedback devices to consumers, followed by leveraging the social influence of well-connected individuals, and giving away the first few feedback devices for free. Making households aware of the possibility of purchasing feedback devices was found to be least effective. However, making households aware proved to be most cost-efficient. This study shows that actively managing the roll-out of feedback devices can increase their impacts on energy-conservation both effectively and cost-efficiently. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Contribution to the Management of Traffic in Networks

    Directory of Open Access Journals (Sweden)

    Filip Chamraz

    2014-01-01

    Full Text Available The paper deals with Admission control methods (AC in IMS networks (IP multimedia subsystem as one of the elements that help ensure QoS (Quality of service. In the paper we are trying to choose the best AC method for selected IMS network to allow access to the greatest number of users. Of the large number of methods that were tested and considered good we chose two. The paper compares diffusion method and one of the measurement based method, specifically „Simple Sum“. Both methods estimate effective bandwidth to allow access for the greatest number of users/devices and allow them access to prepaid services or multimedia content.

  7. Engineering Silver Nanowire Networks: From Transparent Electrodes to Resistive Switching Devices.

    Science.gov (United States)

    Du, Haiwei; Wan, Tao; Qu, Bo; Cao, Fuyang; Lin, Qianru; Chen, Nan; Lin, Xi; Chu, Dewei

    2017-06-21

    Metal nanowires (NWs) networks with high conductance have shown potential applications in modern electronic components, especially the transparent electrodes over the past decade. In metal NW networks, the electrical connectivity of nanoscale NW junction can be modulated for various applications. In this work, silver nanowire (Ag NW) networks were selected to achieve the desired functions. The Ag NWs were first synthesized by a classic polyol process, and spin-coated on glass to fabricate transparent electrodes. The as-fabricated electrode showed a sheet resistance of 7.158 Ω □ -1 with an optical transmittance of 79.19% at 550 nm, indicating a comparable figure of merit (FOM, or Φ TC ) (13.55 × 10 -3 Ω -1 ). Then, two different post-treatments were designed to tune the Ag NWs for not only transparent electrode but also for threshold resistive switching (RS) application. On the one hand, the Ag NW film was mechanically pressed to significantly improve the conductance by reducing the junction resistance. On the other hand, an Ag@AgO x core-shell structure was deliberately designed by partial oxidation of Ag NWs through simple ultraviolet (UV)-ozone treatment. The Ag core can act as metallic interconnect and the insulating AgO x shell acts as a switching medium to provide a conductive pathway for Ag filament migration. By fabricating Ag/Ag@AgO x /Ag planar structure, a volatile threshold switching characteristic was observed and an on/off ratio of ∼100 was achieved. This work showed that through different post-treatments, Ag NW network can be engineered for diverse functions, transforming from transparent electrodes to RS devices.

  8. Spiking Neural Networks with Unsupervised Learning Based on STDP Using Resistive Synaptic Devices and Analog CMOS Neuron Circuit.

    Science.gov (United States)

    Kwon, Min-Woo; Baek, Myung-Hyun; Hwang, Sungmin; Kim, Sungjun; Park, Byung-Gook

    2018-09-01

    We designed the CMOS analog integrate and fire (I&F) neuron circuit can drive resistive synaptic device. The neuron circuit consists of a current mirror for spatial integration, a capacitor for temporal integration, asymmetric negative and positive pulse generation part, a refractory part, and finally a back-propagation pulse generation part for learning of the synaptic devices. The resistive synaptic devices were fabricated using HfOx switching layer by atomic layer deposition (ALD). The resistive synaptic device had gradual set and reset characteristics and the conductance was adjusted by spike-timing-dependent-plasticity (STDP) learning rule. We carried out circuit simulation of synaptic device and CMOS neuron circuit. And we have developed an unsupervised spiking neural networks (SNNs) for 5 × 5 pattern recognition and classification using the neuron circuit and synaptic devices. The hardware-based SNNs can autonomously and efficiently control the weight updates of the synapses between neurons, without the aid of software calculations.

  9. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  10. Multinational Firms and the Management of Global Networks

    DEFF Research Database (Denmark)

    De Marchi, Valentina; Maria, Eleonora Di; Ponte, Stefano

    2014-01-01

    This paper aims at enriching the literature on international business (IB) studies to include insights from Global Value Chain (GVC) analysis to better explain how MNCs can orchestrate a global network organization. A first important contribution of the GVC literature is that it shifts the focus...... from single firms to their value chains, providing instruments to study how activities are split and organized among different firms at the industry level, and how MNCs can implement different governing mechanisms within a network-based setting. The GVC literature also highlights that retailers (as...... can manage their network relationships in a global scenario. Finally, through their focus on upgrading, GVC studies suggest that knowledge flows and innovation dynamics taking place within value chains are as important as those taking place within the MNC’s organizational border. We conclude...

  11. Algorithm for Wireless Sensor Networks Based on Grid Management

    Directory of Open Access Journals (Sweden)

    Geng Zhang

    2014-05-01

    Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.

  12. Network Management Services Based On The Openflow Environment

    Directory of Open Access Journals (Sweden)

    Paweł Wilk

    2014-01-01

    Full Text Available The subject of this article is network management through web service calls, which allows software applications to exert an influence on network traffic. In this manner, software can make independent decisions concerning the direction of requests so that they can be served as soon as possible. This is important because only proper cooperation including all architecture layers can ensure the best performance, especially when software that largely depends on computer networks and utilizes them heavily is involved. To demonstrate that the approach described above is feasible and can be useful at the same time, this article presents a switch-level load balancer developed using OpenFlow. Client software communicates with the balancer through REST web service calls, which are used to provide information on current machine load and its ability to serve incoming requests. The result is a cheap, highly customizable and extremely fast load balancer with considerable potential for further development.

  13. Resource management for heterogeneous networks in LTE systems

    CERN Document Server

    Hu, Rose Qingyang

    2014-01-01

    This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Hetero...

  14. Auction based spectrum management of cognitive radio networks

    DEFF Research Database (Denmark)

    Chang, H. B.; Chen, K.-C.; Prasad, Ramjee

    2009-01-01

    (PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...... to the PRN, the overall spectrum utilization, the profit of the service provider, the spectrum access opportunity of the CR-MSs are increased to achieve cowin situation for every party in cognitive radio networks.......Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...

  15. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    Science.gov (United States)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  16. Performance Gains of Propellant Management Devices for Liquid Hydrogen Depots

    Science.gov (United States)

    Hartwig, Jason W.; McQuillen, John B.; Chato, David J.

    2013-01-01

    This paper presents background, experimental design, and preliminary experimental results for the liquid hydrogen bubble point tests conducted at the Cryogenic Components Cell 7 facility at the NASA Glenn Research Center in Cleveland, Ohio. The purpose of the test series was to investigate the parameters that affect liquid acquisition device (LAD) performance in a liquid hydrogen (LH2) propellant tank, to mitigate risk in the final design of the LAD for the Cryogenic Propellant Storage and Transfer Technology Demonstration Mission, and to provide insight into optimal LAD operation for future LH2 depots. Preliminary test results show an increase in performance and screen retention over the low reference LH2 bubble point value for a 325 2300 screen in three separate ways, thus improving fundamental LH2 LAD performance. By using a finer mesh screen, operating at a colder liquid temperature, and pressurizing with a noncondensible pressurant gas, a significant increase in margin is achieved in bubble point pressure for LH2 screen channel LADs.

  17. Critical Assessment of Implantable Drug Delivery Devices in Glaucoma Management

    Directory of Open Access Journals (Sweden)

    Dharani Manickavasagam

    2013-01-01

    Full Text Available Glaucoma is a group of heterogeneous disorders involving progressive optic neuropathy that can culminate into visual impairment and irreversible blindness. Effective therapeutic interventions must address underlying vulnerability of retinal ganglion cells (RGCs to degeneration in conjunction with correcting other associated risk factors (such as elevated intraocular pressure. However, realization of therapeutic outcomes is heavily dependent on suitable delivery system that can overcome myriads of anatomical and physiological barriers to intraocular drug delivery. Development of clinically viable sustained release systems in glaucoma is a widely recognized unmet need. In this regard, implantable delivery systems may relieve the burden of chronic drug administration while potentially ensuring high intraocular drug bioavailability. Presently there are no FDA-approved implantable drug delivery devices for glaucoma even though there are several ongoing clinical studies. The paper critically assessed the prospects of polymeric implantable delivery systems in glaucoma while identifying factors that can dictate (a patient tolerability and acceptance, (b drug stability and drug release profiles, (c therapeutic efficacy, and (d toxicity and biocompatibility. The information gathered could be useful in future research and development efforts on implantable delivery systems in glaucoma.

  18. Energy management and multi-layer control of networked microgrids

    Science.gov (United States)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  19. Large scale network management. Condition indicators for network stations, high voltage power conductions and cables

    International Nuclear Information System (INIS)

    Eggen, Arnt Ove; Rolfseng, Lars; Langdal, Bjoern Inge

    2006-02-01

    In the Strategic Institute Programme (SIP) 'Electricity Business enters e-business (eBee)' SINTEF Energy research has developed competency that can help the energy business employ ICT systems and computer technology in an improved way. Large scale network management is now a reality, and it is characterized by large entities with increasing demands on efficiency and quality. These are goals that can only be reached by using ICT systems and computer technology in a more clever way than what is the case today. At the same time it is important that knowledge held by experienced co-workers is consulted when formal rules for evaluations and decisions in ICT systems are developed. In this project an analytical concept for evaluation of networks based information in different ICT systems has been developed. The method estimating the indicators to describe different conditions in a network is general, and indicators can be made to fit different levels of decision and network levels, for example network station, transformer circuit, distribution network and regional network. Moreover, the indicators can contain information about technical aspects, economy and HSE. An indicator consists of an indicator name, an indicator value, and an indicator colour based on a traffic-light analogy to indicate a condition or a quality for the indicator. Values on one or more indicators give an impression of important conditions in the network, and make up the basis for knowing where more detailed evaluations have to be conducted before a final decision on for example maintenance or renewal is made. A prototype has been developed for testing the new method. The prototype has been developed in Excel, and especially designed for analysing transformer circuits in a distribution network. However, the method is a general one, and well suited for implementation in a commercial computer system (ml)

  20. Prediction-based Dynamic Energy Management in Wireless Sensor Networks

    Science.gov (United States)

    Wang, Xue; Ma, Jun-Jie; Wang, Sheng; Bi, Dao-Wei

    2007-01-01

    Energy consumption is a critical constraint in wireless sensor networks. Focusing on the energy efficiency problem of wireless sensor networks, this paper proposes a method of prediction-based dynamic energy management. A particle filter was introduced to predict a target state, which was adopted to awaken wireless sensor nodes so that their sleep time was prolonged. With the distributed computing capability of nodes, an optimization approach of distributed genetic algorithm and simulated annealing was proposed to minimize the energy consumption of measurement. Considering the application of target tracking, we implemented target position prediction, node sleep scheduling and optimal sensing node selection. Moreover, a routing scheme of forwarding nodes was presented to achieve extra energy conservation. Experimental results of target tracking verified that energy-efficiency is enhanced by prediction-based dynamic energy management.