WorldWideScience

Sample records for network device management

  1. Erlang-Based Sensor Network Management For Heterogeneous Devices

    Directory of Open Access Journals (Sweden)

    Michal Niec

    2012-01-01

    Full Text Available The paper describes a system designed to manage and collect data from the network of heterogeneous sensors. It was implemented using Erlang OTP and CouchDB for maximum fault tolerance, scalability and ease of deployment. It is resistant to poor network quality, shows high tolerance for software errors and power failures, operates on flexible data model. Additionally, it is available to users through an Web application, which shows just how easy it is to use the server HTTP API to communicate with it. The whole platform was implemented and tested on variety of devices like PC, Mac, ARM-based embedded devices and Android tablets.

  2. Remote discovery and management of end-user devices in heterogeneous private networks

    NARCIS (Netherlands)

    Delphinanto, A.; Hillen, B.A.G.; Passchier, I.; Schoonhoven, B.H.A. van; Hartog, F.T.H. den

    2009-01-01

    End-to-end broadband service delivery requires remote management of devices in the home network, beyond the home gateway (HG). The service provider can only put limited requirements to these of-the-shelf devices, and therefore has to make intelligent use of their given control and management

  3. Remote management of non-TR-069 UPnP end-user devices in a private network

    NARCIS (Netherlands)

    Hillen, B.A.G.; Passchier, I.; Schoonhoven, B.H.A. van; Hartog, F.T.H. den

    2009-01-01

    End-to - end broadband service delivery requires remote management of devices in the home network, beyond the home gateway (HG). The service provider can only put limited requirements to these of-the-shelf devices, and therefore has to make intelligent use of their given control and management

  4. Coordinated reactive power management in power networks with wind turbines and FACTS devices

    Energy Technology Data Exchange (ETDEWEB)

    Amaris, Hortensia, E-mail: hamaris@ing.uc3m.e [University Carlos III of Madrid, Electrical Engineering Department, 28911 Leganes, Madrid (Spain); Alonso, Monica, E-mail: moalonso@ing.uc3m.e [University Carlos III of Madrid, Electrical Engineering Department, 28911 Leganes, Madrid (Spain)

    2011-07-15

    Highlights: {yields} Coordinated reactive power management among variable speed wind farms and static var compensator to improve the voltage stability in the network. {yields} Optimization formulation including the reactive power capability from double-fed induction generators (from the induction machine and the grid side converter). {yields} Application of genetic algorithm in power networks with wind farms. -- Abstract: Reactive power management is a critical issue when dealing with the planning and operation of power networks with high wind energy penetration. This paper is intended to introduce a coordinated Reactive Power Planning strategy among Doubly-Fed Induction Generator (DFIG) variable speed wind turbines and Flexible AC Transmission Systems (FACTS) devices. According to this strategy, the reactive power capability from DFIG wind turbines is obtained and the limitations on deliverable power are deduced for each operation point. Furthermore, instead of using the reactive power limit as it is traditionally done, the reactive power injection from Static Var Compensator (SVC) is related to the existing physical limits of the control variables. The optimization strategy is based on genetic algorithms and includes directly in its formulation both the reactive power capability from wind turbines and the reactive power injection from SVC units. An existing 140-bus power system is used to validate the performance and effectiveness of the proposed method.

  5. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  6. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  7. Protecting and securing networked medical devices.

    Science.gov (United States)

    Riha, Chris

    2004-01-01

    Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.

  8. A novel network module for medical devices.

    Science.gov (United States)

    Chen, Ping-Yu

    2008-01-01

    In order to allow medical devices to upload the vital signs to a server on a network without manually configuring for end-users, a new network module is proposed. The proposed network module, called Medical Hub (MH), functions as a bridge to fetch the data from all connecting medical devices, and then upload these data to the server. When powering on, the MH can immediately establish network configuration automatically. Network Address Translation (NAT) traversal is also supported by the MH with the UPnP Internet Gateway Device (IGD) methodology. Besides the network configuration, other configuration in the MH is automatically established by using the remote management protocol TR-069. On the other hand, a mechanism for updating software automatically according to the variant connected medical device is proposed. With this mechanism, newcome medical devices can be detected and supported by the MH without manual operation.

  9. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of organisationalbehaviour developed by Miles and Snow (1978), this paper argues that thepatterns of network behaviour practiced by firms greatly depend on the businesstypology of the company. That is, a company's business typology will to a certaindegree dictate the network identity of the company. In this paper evidence...

  10. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  11. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  12. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Directory of Open Access Journals (Sweden)

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  13. Resource management for device-to-device underlay communication

    CERN Document Server

    Song, Lingyang; Xu, Chen

    2013-01-01

    Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication.This

  14. Networked Attached Devices at SNS

    CERN Document Server

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  15. Safety first! managing risks for a daisy chain of medical devices connected to the IT-network - first experiences applying IEC 80001-1.

    Science.gov (United States)

    Ahlbrandt, Janko; Röhrig, Rainer

    2013-01-01

    The best way to ensure patient safety is to eliminate errors. To avoid errors and resulting harm from medical devices, there are rules and laws in Germany to ensure a certain quality and process [1,2]. This does not cover scenarios where devices are connected to a data network, forming a medical IT network. Arising risks need to be addressed by operating organizations, such as hospitals. International standard IEC 80001-1 offers a process for this and defines roles and responsibilities [3]. The aim of our study was to assess the application of risk management for a small initial project. We studied a daisy chain of medical devices connected to the IT network. The number of involved proprietary protocols and interface-definitions complicates the risk management, if just for the number of involved manufacturers. Identified risks could all be addressed and did not block the setup's deployment. Risk management creates an extra effort, but can reduce harm and potential financial liabilities. We can recommend starting with small projects to familiarize with the process.

  16. Device configuration-management system

    Energy Technology Data Exchange (ETDEWEB)

    Nowell, D.M.

    1981-01-01

    The Fusion Chamber System, a major component of the Magnetic Fusion Test Facility, contains several hundred devices which report status to the Supervisory Control and Diagnostic System for control and monitoring purposes. To manage the large number of diversity of devices represented, a device configuration management system was required and developed. Key components of this software tool include the MFTF Data Base; a configuration editor; and a tree structure defining the relationships between the subsystem devices. This paper will describe how the configuration system easily accomodates recognizing new devices, restructuring existing devices, and modifying device profile information.

  17. OSI Network Management.

    Science.gov (United States)

    Harris, Ethan

    1990-01-01

    Management of heterogeneous networks is complicated by the persistence of proprietary management schemes. The need for integration of network management capabilities is pressing. The International Organization for Standardization is developing standards for managing networks as part of the Open Systems Interconnection (OSI) effort. OSI management…

  18. Reducing Energy Waste Due to Idle Network Devices

    OpenAIRE

    Khan, Rafiullah; Khan, Sarmad Ullah

    2017-01-01

    Network devices always demand full time Internet connectivity for remote access, VoIP & Instant Messaging (IM) clients and other Internet based applications. Their built-in low power management features are usually disabled by users due to their incapability of maintaining network connectivity. The concept of Network Connectivity Proxy (NCP) has recently been proposed as an effective mechanism for reducing energy waste by impersonating presence of sleeping devices. However, proposed strat...

  19. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically...

  20. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  1. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... to isolate some of the forthcoming changes and outlines a map for network management. We will try to avoid summarising the increasingly extensive literature about organisations which are characterised by networks and restrict our focus to management in inter-organisational networks. Inter......Management literature’s many descriptions of the current and future challenges and new trends within organisation and management forms depict a motley and kaleidoscopic picture of the future. However, one idea reoccurs throughout most of the literature – the organisational network. Some are even...

  2. Integrating Network Management for Cloud Computing Services

    Science.gov (United States)

    2015-06-01

    DeviceConfigIsControl- lable is calculated based on whether the device is powered up, whether the device can be reachable via SSH /Telnet from the management network...lines of C# and C++ code, plus a number of internal libraries . At its core, it is a highly-available RESTful web service with persistent storage. Below

  3. Ensuring effective device management.

    Science.gov (United States)

    Sandham, John

    2013-10-01

    In an article that first appeared in the August 2013 issue of HEJ's sister magazine, The Clinical Services Journal, John Sandham IEng MIET MIHEEM, discusses the need to put in place effective healthcare technology management policies, and highlights some of the barriers, including lack of management expertise, and insufficient commitment, that are making achieving this goal more difficult and, in the process, may be contributing to hospitals and other healthcare facilities being unable to comply with regulatory standards in this important area.

  4. Managing Knowledge Networks.

    Science.gov (United States)

    Contractor, Noshir S.; Monge, Peter R.

    2002-01-01

    Describes a multitheoretical, multilevel (MTML) model to study the management of knowledge networks. Considers theoretical mechanisms for emergence of knowledge networks and presents empirical findings about the emergence of knowledge networks. Concludes that it is necessary to utilize MTML models to integrate multiple social and communication…

  5. Joint interference management and resource allocation for device-to-device (D2D) communications underlying downlink/uplink decoupled (DUDe) heterogeneous networks

    KAUST Repository

    Celik, Abdulkadir

    2017-07-31

    In this paper, resource allocation and co-tier/cross-tier interference management are investigated for D2D-enabled heterogeneous networks (HetNets) where tiers 1, 2, and 3 consist of macrocells, smallcells, and D2D pairs, respectively. We first propose a D2D-enabled fractional frequency reuse scheme for uplink (UL) HetNets where macrocell subregions are preassigned to different subbands (SBs) in order to mitigate the tier-1↔tier-1 interference. Nevertheless, cell-edge macrocell user equipments (MUEs) with high transmission powers still form dead-zones for nearby smallcell UEs (SUEs) and D2D UEs (DUEs). One of the simple but yet novel means of the dead-zone alleviation is associating the cell-edge MUEs with nearby smallcells, which is also known as downlink (DL)/UL decoupling (DUDe). Subject to quality of service (QoS) requirements and power constraints, we formulate a joint SB assignment and resource block (RB) allocation optimization as a mixed integer non-linear programming (MINLP) problem to maximize the D2D sum rate and minimize the co-tier/cross-tier interference. Based on tolerable interference limit, we propose a fast yet high-performance suboptimal solution to jointly assign available SBs and RBs to smallcells. A D2D mode selection and resource allocation framework is then developed for DUEs. As traditional DL/UL Coupled (DUCo) scheme generates significant interference proportional to cellular user density and user association bias factor, results obtained from the combination of proposed methods and developed algorithms reveal the potential of DUDe for co-tier/cross-tier interference mitigation which opens more room for spectrum reuse of DUEs.

  6. Electronic device aspects of neural network memories

    Science.gov (United States)

    Lambe, J.; Moopenn, A.; Thakoor, A. P.

    1985-01-01

    The basic issues related to the electronic implementation of the neural network model (NNM) for content addressable memories are examined. A brief introduction to the principles of the NNM is followed by an analysis of the information storage of the neural network in the form of a binary connection matrix and the recall capability of such matrix memories based on a hardware simulation study. In addition, materials and device architecture issues involved in the future realization of such networks in VLSI-compatible ultrahigh-density memories are considered. A possible space application of such devices would be in the area of large-scale information storage without mechanical devices.

  7. Managing collaborative innovation networks

    DEFF Research Database (Denmark)

    Stevens, Vidar; Agger, Annika

    2017-01-01

    . Empirical research on the management of collaborative policy innovation processes is, however, scarce. Therefore, we review in this article a case to add new insights to the causal link between collaboration, management, and innovation. Specifically, we examine the management strategies which helped......Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...

  8. Managing the Cooperative Network.

    Science.gov (United States)

    Segal, JoAn S.

    1983-01-01

    Discussion of the management of not-for-profit corporations which provide computerized library networks highlights marketing, nonprofit constraints, multiple goals, consumer demands, professional commitment, external influences, motivation and control, dependence on charisma, management and altruism, hybrid organizations, and rational management.…

  9. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  10. Embedded Network Protocols for Mobile Devices

    Science.gov (United States)

    Galataki, Despo; Radulescu, Andrei; Verstoep, Kees; Fokkink, Wan

    Embedded networks for chip-to-chip networks are emerging as communication infrastructure in mobile devices. We present three novel embedded network protocols: a sliding window protocol, a protocol for opening and closing connections, and a bandwidth reservation protocol. The design of these protocols is tailored to the low power and low cost requirements of mobile devices. The model checker SPIN played an important role in the design and analysis of these protocols. Large instances of the protocols could be analyzed successfully using the distributed model checker DiVinE.

  11. Signal processing devices and networks

    Science.gov (United States)

    Graveline, S. W.

    1985-02-01

    According to an axiom employed with respect to electronic warfare (EW) behavior, system effectiveness increases directly with the amount of information recovered from an intercepted signal. The evolution in EW signal processing capability has proceeded accordingly. After an initiation of EW systems as broadband receivers, the most significant advance was related to the development of digital instantaneous frequency measurement (DIFM) devices. The use of such devices provides significant improvements regarding signal identification and RF measurement to within a few MHz. An even more accurate processing device, the digital RF memory (DRFM), allows frequency characterization to within a few Hz. This invention was made in response to the need to process coherent pulse signals. Attention is given to the generic EW system, the modern EW system, and the generic receiver function for a modern EW system showing typical output signals.

  12. Management of space networks

    Science.gov (United States)

    Markley, R. W.; Williams, B. F.

    1993-01-01

    NASA has proposed missions to the Moon and Mars that reflect three areas of emphasis: human presence, exploration, and space resource development for the benefit of Earth. A major requirement for such missions is a robust and reliable communications architecture. Network management--the ability to maintain some degree of human and automatic control over the span of the network from the space elements to the end users on Earth--is required to realize such robust and reliable communications. This article addresses several of the architectural issues associated with space network management. Round-trip delays, such as the 5- to 40-min delays in the Mars case, introduce a host of problems that must be solved by delegating significant control authority to remote nodes. Therefore, management hierarchy is one of the important architectural issues. The following article addresses these concerns, and proposes a network management approach based on emerging standards that covers the needs for fault, configuration, and performance management, delegated control authority, and hierarchical reporting of events. A relatively simple approach based on standards was demonstrated in the DSN 2000 Information Systems Laboratory, and the results are described.

  13. Elettronika Virtual Network Management

    OpenAIRE

    Marco Fiore; Giuseppe Modugnio; Doru Ursutiu; Alexandra Teodor; Atilla Valadi

    2009-01-01

    This article introduces a simple and efficient implementation of a remote control system for the telecommunication networks. The paper deals with the automatization of transmission sites, the unattended monitoring and the ease of management of those. For the hardware’s remote control we introduce a user friendly software interface between the user and the stations.

  14. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Directory of Open Access Journals (Sweden)

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  15. Network Information Management Subsystem

    Science.gov (United States)

    Chatburn, C. C.

    1985-01-01

    The Deep Space Network is implementing a distributed data base management system in which the data are shared among several applications and the host machines are not totally dedicated to a particular application. Since the data and resources are to be shared, the equipment must be operated carefully so that the resources are shared equitably. The current status of the project is discussed and policies, roles, and guidelines are recommended for the organizations involved in the project.

  16. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  17. Innovation networks : Managing the networked organization

    NARCIS (Netherlands)

    Aalbers, Rick; Dolfsma, Wilfred

    2015-01-01

    Organizations are complex social systems that are not easy to understand, yet they must be managed if a company is to succeed. This book explains networks and how managers and organizations can navigate them to produce successful strategic innovation outcomes. Although managers are increasingly

  18. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... resource constraints in Bluetooth networks and adapt to mobility and frequent changes of the network topology, as well as to bursty traffic of Internet data applications, which are supposedly very common in Bluetooth. Some performance characteristics of these approaches are illustrated by analysis as well...

  19. Network management and sustainable safety.

    NARCIS (Netherlands)

    2007-01-01

    There is a trend at the regional level to no longer concentrate traffic on motorways only, but to divert some of it to the secondary road network. This trend is known as Network Management. Because the secondary road network is less safe than the main road network, this strategy will inevitably

  20. The Feasibility, Semantics, and Scope of Mobile Wireless Device-to-Device Networking

    OpenAIRE

    Wirtz, Hanno

    2015-01-01

    Wireless networking technology, as prevalently realized according to the IEEE 802.11 standard, successfully complements wired access to local networks and the Internet. Current mobile devices, such as smartphones, manifest wireless networking within everyday mobile scenarios and diverse and dynamic device-to-device (D2D) communication contexts that are independent from any network infrastructure, motivating the research directions of Mobile Ad-Hoc, Delay Tolerant, and Opportunistic Networking...

  1. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  2. Designing and managing networks: possibilities and limitations for network management

    NARCIS (Netherlands)

    2005-01-01

    markdownabstract__Abstract__ If most decision-making processes aimed at solving societal problems have a network-like character, then a key question is how to deal with networks so that they can achieve valuable solutions to societal problems. Managing networks differs considerably from the

  3. Cable networks, services, and management

    CERN Document Server

    2015-01-01

    Cable Networks, Services, and Management is the first book to cover cable networks, services, and their management, in-depth, for network operators, engineers, researchers, and students. Thirteen experts in various fields have contributed their knowledge of network architectures and services, Operations, Administration, Maintenance, Provisioning, Troubleshooting (OAMPT) for residential and business services, cloud, Software Defined Networks (SDN), as well as virtualization concepts and their applications as part of the future directions of cable networks. The book begins by introducing architecture and services for Data Over Cable Service Interface Specification (DOCSIS) 3.0/ 3.1, Converged Cable Access Platform (CCAP), Content Distribution Networks (CDN, IP TV, and Packet Cable and Wi-Fi for Residential Services. Topics that are discussed in proceeding chapters include: operational systems and management architectures, service orders, provisioning, fault manageme t, performance management, billing systems a...

  4. The impact of wireless device access on content delivery networks

    OpenAIRE

    Denney, Justin; Race, Nicholas

    2003-01-01

    Content delivery network architectures are initiatives designed to support the effective delivery of continuous and discrete media to end-users. Mobile devices are now capable of exploiting services such as content delivery, but with the protocols governing the content delivery networks designed for wired networked topologies; an assessment of the impact of mobile devices on the network has never been undertaken. Wireless devices access causes significant issues in the ability of the media tr...

  5. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  6. Role of management devices in enacting strategy

    DEFF Research Database (Denmark)

    Harritz, Daniel

    2016-01-01

    Purpose - This study illustrates the role of management devices in enacting strategy and strategic decisions, resulting in the development of a Shared Service Centre (SSC) in a Danish municipality. It shows how devices interact in defending, rejecting and reframing strategy, leading to the closure...... role of management devices. Practical implications - The findings facilitate a deeper understanding of factors triggering strategic development in the public sector. Also, it identifies aspects leading to failures by investigating how different devices allow local actors to stay connected and affect...

  7. Managing Innovation Networks

    DEFF Research Database (Denmark)

    Awate, Snehal Suyash; Møller Larsen, Marcus; Mudambi, Ram

    In this article, we treat innovation as a multidimensional construct spanning people, technologies, and geographies. We study how these dimensions interact and impact firms' inventor networks and the ultimate innovation performance. We identify five distinct planes in which inventor networks reside...... of the costs and benefits of being centrally located on multiplex network versus having an equal distribution of ties between the different network layers. Using patent data on the global wind power industry, we find evidence suggesting that being centrally positioned on a multiplex network with an equal...

  8. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  9. The network management expert system prototype for Sun Workstations

    Science.gov (United States)

    Leigh, Albert

    1990-01-01

    Networking has become one of the fastest growing areas in the computer industry. The emergence of distributed workstations make networking more popular because they need to have connectivity between themselves as well as with other computer systems to share information and system resources. Making the networks more efficient and expandable by selecting network services and devices that fit to one's need is vital to achieve reliability and fast throughput. Networks are dynamically changing and growing at a rate that outpaces the available human resources. Therefore, there is a need to multiply the expertise rapidly rather than employing more network managers. In addition, setting up and maintaining networks by following the manuals can be tedious and cumbersome even for an experienced network manager. This prototype expert system was developed to experiment on Sun Workstations to assist system and network managers in selecting and configurating network services.

  10. Management strategies of Bring Your Own Device

    Directory of Open Access Journals (Sweden)

    Li Peixuan

    2017-01-01

    Full Text Available The rapid development of mobile Internet and mobile terminals promote business office system from PC to mobile terminals gradually. Thus Bring Your Own Device (BYOD has become one of the important development trends of enterprise office mode. We analyse the driving factors of implementing Bring Your Own Device, then point out some problems in the process of implementing Bring Your Own Device. Further, we propose the corresponding management strategies of Bring Your Own Device in order to provide references for enterprises to meet the need of mobile office.

  11. Throughput, Energy and Overhead of Multicast Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez Marcano, Nestor Javier; Heide, Janus; Lucani Rötter, Daniel Enrique

    2016-01-01

    Cooperation strategies in mobile networks typically rely in short range technologies, like LTE-A Device to Device (D2D) communications, for data exchange between devices forming mobile clouds. These communications provide a better device experience since the clouds offload the network. Nevertheless......, this assumes that the throughput gains and energy savings in multicasting are much larger between devices than the base station to the receivers. However, current mobile networks suffer from many different issues varying the performance in data rates, which calls into question these assumptions. Therefore...

  12. Cloud services, networking, and management

    CERN Document Server

    da Fonseca, Nelson L S

    2015-01-01

    Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content. Self-contained chapters for readers with specific interests. Includes commercial applications on Cloud (video services and games).

  13. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  14. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  15. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  16. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  17. Noise management by molecular networks.

    Directory of Open Access Journals (Sweden)

    Frank J Bruggeman

    2009-09-01

    Full Text Available Fluctuations in the copy number of key regulatory macromolecules ("noise" may cause physiological heterogeneity in populations of (isogenic cells. The kinetics of processes and their wiring in molecular networks can modulate this molecular noise. Here we present a theoretical framework to study the principles of noise management by the molecular networks in living cells. The theory makes use of the natural, hierarchical organization of those networks and makes their noise management more understandable in terms of network structure. Principles governing noise management by ultrasensitive systems, signaling cascades, gene networks and feedback circuitry are discovered using this approach. For a few frequently occurring network motifs we show how they manage noise. We derive simple and intuitive equations for noise in molecule copy numbers as a determinant of physiological heterogeneity. We show how noise levels and signal sensitivity can be set independently in molecular networks, but often changes in signal sensitivity affect noise propagation. Using theory and simulations, we show that negative feedback can both enhance and reduce noise. We identify a trade-off; noise reduction in one molecular intermediate by negative feedback is at the expense of increased noise in the levels of other molecules along the feedback loop. The reactants of the processes that are strongly (cooperatively regulated, so as to allow for negative feedback with a high strength, will display enhanced noise.

  18. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  19. On Managed Services Lanes and their Use in Home Networks

    NARCIS (Netherlands)

    Hartog, F.T.H. den; Nooren, P.A.; Delphinanto, A.; Fledderus, E.R

    2013-01-01

    Home networks show an increasing level of heterogeneity regarding the devices connected, network technologies used, and services supported. Heterogeneity inhibits quality assurance for new services, such as online gaming, energy management, and health care. This paper focuses on the role that the

  20. Network Connection Management

    CERN Multimedia

    IT Department, Communication Systems and Network Group

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure a smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions....

  1. Network Connection Management

    CERN Multimedia

    IT Department

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions. Thank ...

  2. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk

    2014-01-01

    assigned, licensed spectrum; thus, it is under full control of the cellular network. D2D communication creates a market potential for new services, new approaches to efficient spectrum use, and security concepts. This is especially true if D2D communication is extended to larger communication groups...... organized in meshed clusters. In this article, we discuss the potential and shortcomings of D2D communication as proposed today, advocating for the use of network coding as an enabling technology for enhanced security and communication efficiency using the PlayNCool and CORE protocols as key examples...

  3. [Design and application of implantable medical device information management system].

    Science.gov (United States)

    Cao, Shaoping; Yin, Chunguang; Zhao, Zhenying

    2013-03-01

    Through the establishment of implantable medical device information management system, with the aid of the regional joint sharing of resources, we further enhance the implantable medical device traceability management level, strengthen quality management, control of medical risk.

  4. Performance evaluation of cellular phone network based portable ECG device.

    Science.gov (United States)

    Hong, Joo-Hyun; Cha, Eun-Jong; Lee, Tae-Soo

    2008-01-01

    In this study, cellular phone network based portable ECG device was developed and three experiments were performed to evaluate the accuracy, reliability and operability, applicability during daily life of the developed device. First, ECG signals were measured using the developed device and Biopac device (reference device) during sitting and marking time and compared to verify the accuracy of R-R intervals. Second, the reliable data transmission to remote server was verified on two types of simulated emergency event using patient simulator. Third, during daily life with five types of motion, accuracy of data transmission to remote server was verified on two types of event occurring. By acquiring and comparing subject's biomedical signal and motion signal, the accuracy, reliability and operability, applicability during daily life of the developed device were verified. Therefore, cellular phone network based portable ECG device can monitor patient with inobtrusive manner.

  5. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  6. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  7. Digital devices: big challenge in color management

    Science.gov (United States)

    Vauderwange, Oliver; Curticapean, Dan; Dreβler, Paul; Wozniak, Peter

    2014-09-01

    The paper will present how the students learn to find technical solutions in color management by using adequate digital devices and recognize the specific upcoming tasks in this area. Several issues, problems and their solutions will be discussed. The scientific background offer specific didactical solutions in this area of optics. Color management is the major item of this paper. Color management is a crucial responsibility for media engineers and designers. Print, screen and mobile applications must independently display the same colors. Predictability and consistency in the color representation are the aims of a color management system. This is only possible in a standardized and audited production workflow. Nowadays digital media have a fast-paced development process. An increasing number of different digital devices with different display sizes and display technologies are a great challenge for every color management system. The authors will present their experience in the field of color management. The design and development of a suitable learning environment with the required infrastructure is in the focus. The combination of theoretical and practical lectures creates a deeper understanding in the area of the digital color representation.

  8. Tunable photonic bandgap fiber based devices for optical networks

    DEFF Research Database (Denmark)

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    , for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...

  9. Intelligent device management in the selfcare marketplace.

    Science.gov (United States)

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  10. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  11. Increased Participation and Conversation Using Networked Devices

    Science.gov (United States)

    Danielson, Christopher; Meyer, Dan

    2016-01-01

    For many the phrase "teaching math online" evokes a vision of teaching and learning that is not based in physical classrooms. Perhaps teachers and students are even interacting asynchronously. In math classrooms in the United States, the increasing availability of devices (e.g. laptops, Chromebooks™, smartphones, and tablets) and…

  12. Mobile Devices as Adjunctive Pain Management Tools

    Science.gov (United States)

    Gao, Kenneth; Kong, Lingjun; Wiederhold, Mark D.

    2014-01-01

    Abstract Approximately 108 million people in North America and Europe suffer from chronic pain. Virtual reality (VR) is a promising method for pain management in a clinical setting due to the distracting properties of an immersive virtual environment. In this study, we demonstrated the potential use of mobile phones as a means of delivering an easily accessible, immersive experience. Thirty-one patients tested VR pain distraction. Objective measurements of heart rate correlated to decreased anxiety, while, subjectively, patients also reported reduced levels of discomfort. The positive results of this study indicate that mobile phones can provide an immersive experience sufficient to deliver pain management distraction. Because mobile devices are widely available, the potential for developing pain management programs that are accessible has become a realistic possibility. PMID:24892202

  13. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  14. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  15. Delay reduction in multi-hop device-to-device communication using network coding

    KAUST Repository

    Douik, Ahmed S.

    2015-08-12

    This paper considers the problem of reducing the broadcast delay of wireless networks using instantly decodable network coding (IDNC) based device-to-device (D2D) communications. In D2D-enabled networks, devices help hasten the recovery of the lost packets of devices in their transmission range by sending network coded packets. To solve the problem, the different events occurring at each device are identified so as to derive an expression for the probability distribution of the decoding delay. The joint optimization problem over the set of transmitting devices and the packet combinations of each is formulated. Due to the high complexity of finding the optimal solution, this paper focuses on cooperation without interference between the transmitting users. The optimal solution, in such interference-less scenario, is expressed using a graph theory approach by introducing the cooperation graph. Extensive simulations compare the decoding delay experienced in the Point to Multi-Point (PMP), the fully connected D2D (FC-D2D) and the more practical partially connected D2D (PC-D2D) configurations and suggest that the PC-D2D outperforms the FC-D2D in all situations and provides an enormous gain for poorly connected networks.

  16. Wireless microsensor network solutions for neurological implantable devices

    Science.gov (United States)

    Abraham, Jose K.; Whitchurch, Ashwin; Varadan, Vijay K.

    2005-05-01

    The design and development of wireless mocrosensor network systems for the treatment of many degenerative as well as traumatic neurological disorders is presented in this paper. Due to the advances in micro and nano sensors and wireless systems, the biomedical sensors have the potential to revolutionize many areas in healthcare systems. The integration of nanodevices with neurons that are in communication with smart microsensor systems has great potential in the treatment of many neurodegenerative brain disorders. It is well established that patients suffering from either Parkinson"s disease (PD) or Epilepsy have benefited from the advantages of implantable devices in the neural pathways of the brain to alter the undesired signals thus restoring proper function. In addition, implantable devices have successfully blocked pain signals and controlled various pelvic muscles in patients with urinary and fecal incontinence. Even though the existing technology has made a tremendous impact on controlling the deleterious effects of disease, it is still in its infancy. This paper presents solutions of many problems of today's implantable and neural-electronic interface devices by combining nanowires and microelectronics with BioMEMS and applying them at cellular level for the development of a total wireless feedback control system. The only device that will actually be implanted in this research is the electrodes. All necessary controllers will be housed in accessories that are outside the body that communicate with the implanted electrodes through tiny inductively-coupled antennas. A Parkinson disease patient can just wear a hat-system close to the implantable neural probe so that the patient is free to move around, while the sensors continually monitor, record, transmit all vital information to health care specialist. In the event of a problem, the system provides an early warning to the patient while they are still mobile thus providing them the opportunity to react and

  17. Silicon photonic integrated devices for datacenter optical networks

    Science.gov (United States)

    Fiorentino, Marco; Chen, Chin-Hui; Kurczveil, Géza; Liang, Di; Peng, Zhen; Beausoleil, Raymond

    2014-03-01

    The evolution of computing infrastructure and workloads has put an enormous pressure on datacenter networks. It is expected that bandwidth will scale without increases in the network power envelope and total cost of ownership. Networks based on silicon photonic devices promise to help alleviate these problems, but a viable development path for these technologies is not yet fully outlined. In this paper, we report our progress on developing components and strategies for datacenter silicon photonics networks. We will focus on recent progress on compact, low-threshold hybrid Si lasers and the CWDM transceivers based on these lasers as well as DWDM microring resonator-based transceivers.

  18. Wearable Device Control Platform Technology for Network Application Development

    Directory of Open Access Journals (Sweden)

    Heejung Kim

    2016-01-01

    Full Text Available Application development platform is the most important environment in IT industry. There are a variety of platforms. Although the native development enables application to optimize, various languages and software development kits need to be acquired according to the device. The coexistence of smart devices and platforms has rendered the native development approach time and cost consuming. Cross-platform development emerged as a response to these issues. These platforms generate applications for multiple devices based on web languages. Nevertheless, development requires additional implementation based on a native language because of the coverage and functions of supported application programming interfaces (APIs. Wearable devices have recently attracted considerable attention. These devices only support Bluetooth-based interdevice communication, thereby making communication and device control impossible beyond a certain range. We propose Network Application Agent (NetApp-Agent in order to overcome issues. NetApp-Agent based on the Cordova is a wearable device control platform for the development of network applications, controls input/output functions of smartphones and wearable/IoT through the Cordova and Native API, and enables device control and information exchange by external users by offering a self-defined API. We confirmed the efficiency of the proposed platform through experiments and a qualitative assessment of its implementation.

  19. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Intelligent Automation Inc. (IAI) proposes an innovative Security-Enhanced Autonomous Network Management (SEANM) scheme for reliable communication in space...

  20. SAFETY ON UNTRUSTED NETWORK DEVICES (SOUND)

    Science.gov (United States)

    2017-10-10

    Service ( DDoS )) will eventually succeed. As attackers rattle the proverbial doorknob looking for a way in, each failure is observable and should serve...4.4.2.1 Concept Denial of service (DoS) and distributed denial of service ( DDoS ) attacks exploit a basic design principle of the internet; any... DDoS Distributed Denial of Service DISA Defense Information Systems Agency DM Decision Management DoD Department of Defense DoS Denial of

  1. Establishing And Managing Development Networks In Africa ...

    African Journals Online (AJOL)

    Establishing And Managing Development Networks In Africa: Perspectives On The African Virtual Library And Information Network (Avlin) ... In times like this when libraries are facing problems with access and acquisition of materials, networking becomes very important. This paper discusses issues relating to networking in ...

  2. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Science.gov (United States)

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  3. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  4. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  5. Leaner and meaner: Network coding in SIMD enabled commercial devices

    DEFF Research Database (Denmark)

    W. Sørensen, Chres; Paramanathan, Achuthan; Cabrera, Juan A.

    2016-01-01

    into energy use that may reduce the battery life of a device. This paper focuses not only on providing a comprehensive measurement study of the energy cost of RLNC in eight different computing platforms, but also explores novel approaches (e.g., tunable sparse network coding) and hardware optimizations...... 2x to as high as 20x. Finally, our results show that the latest generation of mobile processors reduce dramatically the energy per bit consumed for carrying out network coding operations compared to previous generations, thus making network coding a viable technology for the upcoming 5G...

  6. Cooperative device-to-device communication in cognitive radio cellular networks

    CERN Document Server

    Li, Peng

    2014-01-01

    This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks. By providing an extensive review of recent advances in D2D communication, the authors demonstrate that the quality of D2D links significantly affects offloading performance in cellular networks, which motivates the design of cooperative D2D communication. After presenting the architecture of cooperative D2D communication, the challenges of capacity maximization and energy efficiency are addressed by optimi

  7. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  8. The Device Centric Communication System for 5G Networks

    Science.gov (United States)

    Biswash, S. K.; Jayakody, D. N. K.

    2017-01-01

    The Fifth Generation Communication (5G) networks have several functional features such as: Massive Multiple Input and Multiple Output (MIMO), Device centric data and voice support, Smarter-device communications, etc. The objective for 5G networks is to gain the 1000x more throughput, 10x spectral efficiency, 100 x more energy efficiency than existing technologies. The 5G system will provide the balance between the Quality of Experience (QoE) and the Quality of Service (QoS), without compromising the user benefit. The data rate has been the key metric for wireless QoS; QoE deals with the delay and throughput. In order to realize a balance between the QoS and QoE, we propose a cellular Device centric communication methodology for the overlapping network coverage area in the 5G communication system. The multiple beacon signals mobile tower refers to an overlapping network area, and a user must be forwarded to the next location area. To resolve this issue, we suggest the user centric methodology (without Base Station interface) to handover the device in the next area, until the users finalize the communication. The proposed method will reduce the signalling cost and overheads for the communication.

  9. Using Bayesian belief networks in adaptive management.

    Science.gov (United States)

    J.B. Nyberg; B.G. Marcot; R. Sulyma

    2006-01-01

    Bayesian belief and decision networks are relatively new modeling methods that are especially well suited to adaptive-management applications, but they appear not to have been widely used in adaptive management to date. Bayesian belief networks (BBNs) can serve many purposes for practioners of adaptive management, from illustrating system relations conceptually to...

  10. Communication devices for network-hopping communications and methods of network-hopping communications

    Science.gov (United States)

    Buttles, John W

    2013-04-23

    Wireless communication devices include a software-defined radio coupled to processing circuitry. The system controller is configured to execute computer programming code. Storage media is coupled to the system controller and includes computer programming code configured to cause the system controller to configure and reconfigure the software-defined radio to operate on each of a plurality of communication networks according to a selected sequence. Methods for communicating with a wireless device and methods of wireless network-hopping are also disclosed.

  11. The Impact Of Network Management On Outcomes In Governance Networks

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); A.J. Steijn (Bram); J. Edelenbos (Jurian)

    2010-01-01

    markdownabstract__Abstract__ There is a large amount of literature and research on network management strategies. However, only a limited portion of this literature examines the relationship between network management strategies and outcomes (for an exception, see Meier and O'Toole 2001). Most of

  12. Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    DEFF Research Database (Denmark)

    Pratas, Nuno; Popovski, Petar

    2015-01-01

    Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii......) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which......, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while...

  13. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  14. Novel Opportunistic Network Routing Based on Social Rank for Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Tong Wang

    2017-01-01

    Full Text Available In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G mobile communication networks, among which device-to-device (D2D communication is one of the key technologies. Due to the intermittent connection of nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files. In opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous network overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT is proposed in this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is put forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph among people is established when they socially relate to each other in social rank replication. The results under the scenario show an advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT over the compared algorithms in terms of delivery ratio, average delivery latency, and overhead ratio.

  15. Adaptive Capacity Management in Bluetooth Networks

    OpenAIRE

    Son, L.T.

    2004-01-01

    With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low power, and low cost mobile ad hoc solution for the global interconnection of all mobile devices. To implement Bluetooth network as a true mobile ad hoc wireless network operating in short radio range, h...

  16. Connectivity Analysis of Millimeter-Wave Device-to-Device Networks with Blockage

    Directory of Open Access Journals (Sweden)

    Haejoon Jung

    2016-01-01

    Full Text Available We consider device-to-device (D2D communications in millimeter-wave (mm Wave for the future fifth generation (5G cellular networks. While the mm Wave systems can support multiple D2D pairs simultaneously through beamforming with highly directional antenna arrays, the mm Wave channel is significantly more susceptible to blockage compared to microwave; mm Wave channel studies indicate that if line-of-sight (LoS paths are blocked, reliable mm Wave communications may not be achieved for high data-rate applications. Therefore, assuming that an outage occurs in the absence of the LoS path between two wireless devices by obstructions, we focus on connectivity of the mm Wave D2D networks. We consider two types of D2D communications: direct and indirect schemes. The connectivity performances of the two schemes are investigated in terms of (i the probability to achieve a fully connected network PFC and (ii the average number of reliably connected devices γ. Through analysis and simulation, we show that, as the network size increases, PFC and γ decrease. Also, PFC and γ decrease, when the blockage parameter increases. Moreover, simulation results indicate that the hybrid direct and indirect scheme can improve both PFC and γ up to about 35% compared to the nonhybrid scheme.

  17. Fairness and resource allocation in device-to-device wireless regional area network

    NARCIS (Netherlands)

    Shi, H.

    2014-01-01

    With the rapid development in wireless devices, applications and networks, radio frequencies have become scarce resources. Therefore, it is critical to make efficient use of the radio frequencies. A promising way to solve this problem is the use of cognitive radio (CR). In CR, radio frequencies are

  18. Impact of stand-by energy losses in electronic devices on smart network performance

    Directory of Open Access Journals (Sweden)

    Mandić-Lukić Jasmina S.

    2012-01-01

    Full Text Available Limited energy resources and environmental concerns due to ever increasing energy consumption, more and more emphasis is being put on energy savings. Smart networks are promoted worldwide as a powerful tool used to improve the energy efficiency through consumption management, as well as to enable the distributed power generation, primarily based on renewable energy sources, to be optimally explored. To make it possible for the smart networks to function, a large number of electronic devices is needed to operate or to be in their stand-by mode. The consumption of these devices is added to the consumption of many other electronic devices already in use in households and offices, thus giving rise to the overall power consumption and threatening to counteract the primary function of smart networks. This paper addresses the consumption of particular electronic devices, with an emphasis placed on their thermal losses when in stand-by mode and their total share in the overall power consumption in certain countries. The thermal losses of electronic devices in their stand-by mode are usually neglected, but it seems theoretically possible that a massive increase in their number can impact net performance of the future smart networks considerably so that above an optimum level of energy savings achieved by their penetration, total consumption begins to increase. Based on the current stand-by energy losses from the existing electronic devices, we propose that the future penetration of smart networks be optimized taking also into account losses from their own electronic devices, required to operate in stand-by mode.

  19. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  20. Management issues in multilayered network architectures

    Science.gov (United States)

    Piergigli, Mauro; Vercelli, Roberto; Zucchinali, A.

    1996-12-01

    The importance of managing networks and services is finally being accepted by both operators/service providers and HW/SW manufacturers. Standards are thus coming for managing solutions based on any new emerging technology. However standards and commercial solutions have different level of completeness and performance depending on the related managed technology. Thus, being real systems often composed of a mix of different technologies, the quality of their overall management is limited by the less mature and effective single technology management system. Today broadband networks can be seen as a layered structure including ATM, SDH and WDM optical layers. While the management of SDH is quite mature and significant results are reached for ATM management, the management of the WDM optical layer is still in its infancy. Therefore the WDM layer management is a critical factor in the development of the overall broadband network management. The paper, after few considerations on general public network management issues, presents some solutions currently under study for the WDM optical layer management. Although the improvement of the weaker single technology management system surely improves the quality of the overall layered network management, this is just one step along the path for optimizing it. The objective is in fact the integration of the single layer management systems into a global one, avoiding duplications and improving efficiency and effectiveness. The paper presents at the end some considerations about this topic that is rapidly getting hot because of the potential economical benefits such as integration can offer.

  1. Network Management of the SPLICE Computer Network.

    Science.gov (United States)

    1982-12-01

    and the Lawrence Livermore Nttionl Laboratory Octopus lietwork [Ref. 24]. Additionally, the :oiex Distributed Network Coatrol Systems 200 and 330...Alexander A., litftqiifivl 93 24. University of Calif~cnia Lavr i ce LJ~vermoce Laboratory Letter Wloe Requa): to -aptN -1raq. Ope, maya & Postgraduaate

  2. AVAILABILITY RESEARCH OF REMOTE DEVICES FOR WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2016-05-01

    Full Text Available We consider the wireless network under attack, aimed at "broadcast storm" initiation, in order to determine the availability of stand-alone units and the ability to carry out their functional tasks under information exposure. We determine a set of conditions for such type of attacks on the part of potential information interloper. The functional analysis of the systems based on wireless technology is made. We examine the remote device of a self-organizing wireless network as a queuing system M/M/1/n. Model dependencies are shown for normal system performance and at information exposure on the part of potential information interloper. Analytical simulation of wireless network functioning is carried out in the normal mode and under the attack aimed at "broadcast storm" initiation. An experiment is described which provides statistical information on operation of network remote devices. We present experiment results on carrying out attack at typical system transferring data by broabcast net scanning package at different noise intensities on the part of information interloper. The proposed model can be used to determine the technical characteristics of wireless ad-hoc network, develop recommendations for node configuration, aimed at countering "broadcast storm".

  3. Towards a quantum network of room temperature quantum devices

    Science.gov (United States)

    Jordaan, Bertus; Shahrokhshahi, Reihaneh; Namazi, Mehdi; Goham, Connor; Figueroa, Eden

    2017-04-01

    Progressing quantum technologies to room temperature operation is key to unlock the potential and economical viability of novel many-device architectures. Along these lines, warm vapor alleviates the need for laser trapping and cooling in vacuum or cooling to cryogenic temperatures. Here we report our progress towards building a prototypical quantum network, containing several high duty cycle room-temperature quantum memories interconnected using high rate single photon sources. We have already demonstrated important capabilities, such as memory-built photon-shaping techniques, compatibility with BB84-like quantum communication links, and the possibility of interfacing with low bandwidth (MHz range), cavity enhanced, SPDC-based photon source tuned to the Rb transitions. This body of works suggest that an elementary quantum network of room temperature devices is already within experimental reach.

  4. Communications and Information: Network Management. Volume 1

    Science.gov (United States)

    1999-07-02

    local units to reduce the risks of remote management . When approved, the global or regional NM element provides guidance on accommodating this...Management X Setting parameters X X Changing network configuration X X Moves, adds, changes X X X Remote management X X Router management X Load

  5. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  6. Unique device identifiers for coronary stent postmarket surveillance and research: a report from the Food and Drug Administration Medical Device Epidemiology Network Unique Device Identifier demonstration.

    Science.gov (United States)

    Tcheng, James E; Crowley, Jay; Tomes, Madris; Reed, Terrie L; Dudas, Joseph M; Thompson, Kweli P; Garratt, Kirk N; Drozda, Joseph P

    2014-10-01

    Although electronic product identification in the consumer sector is ubiquitous, unique identification of medical devices is just being implemented in 2014. To evaluate unique device identifiers (UDIs) in health care, the US Food and Drug Administration (FDA) funded the Medical Device Epidemiology Network initiative, including a demonstration of the implementation of coronary stent UDI data in the information systems of a multihospital system (Mercy Health). This report describes the first phase of the demonstration. An expert panel of interventional cardiologists nominated by the American College of Cardiology and the Society for Cardiovascular Angiography and Interventions was convened with representatives of industry, health system members of the Healthcare Transformation Group, the American College of Cardiology National Cardiovascular Data Registry, and FDA to articulate concepts needed to best use UDI-associated data. The expert panel identified 3: (1) use cases for UDI-associated data (eg, research), (2) a supplemental data set of clinically relevant attributes (eg, stent dimensions), and (3) governance and administrative principles for the authoritative management of these data. Eighteen use cases were identified, encompassing clinical care, supply chain management, consumer information, research, regulatory, and surveillance domains. In addition to the attributes of the FDA Global Unique Device Identification Database, 9 additional coronary stent-specific attributes were required to address use case requirements. Recommendations regarding governance were elucidated as foundational principles for UDI-associated data management. This process for identifying requisite extensions to support the effective use of UDI-associated data should be generalizable. Implementation of a UDI system for medical devices must anticipate both global and device-specific information. Copyright © 2014 Mosby, Inc. All rights reserved.

  7. Traffic Management for Satellite-ATM Networks

    Science.gov (United States)

    Goyal, Rohit; Jain, Raj; Fahmy, Sonia; Vandalore, Bobby; Goyal, Mukul

    1998-01-01

    Various issues associated with "Traffic Management for Satellite-ATM Networks" are presented in viewgraph form. Specific topics include: 1) Traffic management issues for TCP/IP based data services over satellite-ATM networks; 2) Design issues for TCP/IP over ATM; 3) Optimization of the performance of TCP/IP over ATM for long delay networks; and 4) Evaluation of ATM service categories for TCP/IP traffic.

  8. A Single-Walled Carbon Nanotube Network Gas Sensing Device

    Directory of Open Access Journals (Sweden)

    I-Ju Teng

    2011-08-01

    Full Text Available The goal of this research was to develop a chemical gas sensing device based on single-walled carbon nanotube (SWCNT networks. The SWCNT networks are synthesized on Al2O3-deposted SiO2/Si substrates with 10 nm-thick Fe as the catalyst precursor layer using microwave plasma chemical vapor deposition (MPCVD. The development of interconnected SWCNT networks can be exploited to recognize the identities of different chemical gases by the strength of their particular surface adsorptive and desorptive responses to various types of chemical vapors. The physical responses on the surface of the SWCNT networks cause superficial changes in the electric charge that can be converted into electronic signals for identification. In this study, we tested NO2 and NH3 vapors at ppm levels at room temperature with our self-made gas sensing device, which was able to obtain responses to sensitivity changes with a concentration of 10 ppm for NO2 and 24 ppm for NH3.

  9. Network management systems for active distribution networks. A feasibility study

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, D.A.

    2004-07-01

    A technical feasibility study on network management systems for active distribution networks is reported. The study investigated the potential for modifying a Distribution Network Operator (DNO) Supervisory Control and Data Acquisition System (SCADA) to give some degree of active management. Government incentives have encouraged more and more embedded generation being connected to the UK distribution networks and further acceleration of the process should support the 2010 target for a reduction in emissions of carbon dioxide. The report lists the objectives of the study and summarises what has been achieved; it also discusses limitations, reliability and resilience of existing SCADA. Safety and operational communications are discussed under staff safety and operational safety. Recommendations that could facilitate active management through SCADA are listed, together with suggestions for further study. The work was carried out as part of the DTI New and Renewable Energy Programme managed by Future Energy Solutions.

  10. Communication method for high density wireless networks, terminal, cluster master device, central node, and system therefor

    NARCIS (Netherlands)

    Havinga, Paul J.M.; van Hoesel, L.F.W.; Bijwaard, D.

    2009-01-01

    Large-scale wireless sensor and actuator networks(LWSANs) are networks that consist of many sensor and/or actuator devices (i.e. >1,000 devices). These sensor and/or actuator devices (also called nodes) communicate wirelessly to deliver their sensor readings to one or more gateway devices in the

  11. Instantly decodable network coding for real-time device-to-device communications

    KAUST Repository

    Douik, Ahmed

    2016-01-04

    This paper studies the delay reduction problem for instantly decodable network coding (IDNC)-based device-to-device (D2D) communication-enabled networks. Unlike conventional point-to-multipoint (PMP) systems in which the wireless base station has the sufficient computation abilities, D2D networks rely on battery-powered operations of the devices. Therefore, a particular emphasis on the computation complexity needs to be addressed in the design of delay reduction algorithms for D2D networks. While most of the existing literature on IDNC directly extend the delay reduction PMP schemes, known to be NP-hard, to the D2D setting, this paper proposes to investigate and minimize the complexity of such algorithms for battery-powered devices. With delay minimization problems in IDNC-based systems being equivalent to a maximum weight clique problems in the IDNC graph, the presented algorithms, in this paper, can be applied to different delay aspects. This paper introduces and focuses on the reduction of the maximum value of the decoding delay as it represents the most general solution. The complexity of the solution is reduced by first proposing efficient methods for the construction, the update, and the dimension reduction of the IDNC graph. The paper, further, shows that, under particular scenarios, the problem boils down to a maximum clique problem. Due to the complexity of discovering such maximum clique, the paper presents a fast selection algorithm. Simulation results illustrate the performance of the proposed schemes and suggest that the proposed fast selection algorithm provides appreciable complexity gain as compared to the optimal selection one, with a negligible degradation in performance. In addition, they indicate that the running time of the proposed solution is close to the random selection algorithm.

  12. Network management tools for a GPS datalink network

    Science.gov (United States)

    Smyth, Padhraic; Chauvin, Todd; Oliver, Gordon; Statman, Joseph

    1991-01-01

    The availability of GPS (Global Position Satellite) information in real-time via a datalink system is shown to significantly increase the capacity of flight test and training ranges in terms of missions supported. This increase in mission activity. imposes demands on mission planning in the range-operations environment. In this context, network management tools which can improve the capability of range personnel to plan, monitor, and control network resources, are of significant interest. The application of both simulation and artificial intelligence techniques is described to develop such network managements tools.

  13. Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed S.

    2015-05-01

    From its introduction to its quindecennial, network coding have built a strong reputation in enhancing packet recovery process and achieving maximum information flow in both wires and wireless networks. Traditional studies focused on optimizing the throughput of the network by proposing complex schemes that achieve optimal delay. With the shift toward distributed computing at mobile devices, throughput and complexity become both critical factors that affect the efficiency of a coding scheme. Instantly decodable network coding imposed itself as a new paradigm in network coding that trades off this two aspects. This paper presents a survey of instantly decodable network coding schemes that are proposed in the literature. The various schemes are identified, categorized and evaluated. Two categories can be distinguished namely the conventional centralized schemes and the distributed or cooperative schemes. For each scheme, the comparison is carried out in terms of reliability, performance, complexity and packet selection methodology. Although the performance is generally inversely proportional to the computation complexity, numerous successful schemes from both the performance and complexity viewpoint are identified.

  14. Optical Networks Solutions planning - performances - management

    DEFF Research Database (Denmark)

    Fenger, Christian

    2002-01-01

    are kept optical and not converted into the optical domain. The focus is on the scientific results achieved throughout the Ph.D. period. Five subjects – all increasing the understanding of optical networks – are studied. Static wavelength routed optical networks are studied. Management on terms....... An explicit solution for network blocking probability has been derived, and fixed point equations for alternate routing are derived. Secondly is self similar traffic studied and the effect on optical networks considered. The Synchronous Optical Hierarchy is suggested as a new type of network to overcome...

  15. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2017-10-01

    Full Text Available In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU devices to convolutional neural networks (CNNs. We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  16. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  17. Training Deep Convolutional Neural Networks with Resistive Cross-Point Devices.

    Science.gov (United States)

    Gokmen, Tayfun; Onen, Murat; Haensch, Wilfried

    2017-01-01

    In a previous work we have detailed the requirements for obtaining maximal deep learning performance benefit by implementing fully connected deep neural networks (DNN) in the form of arrays of resistive devices. Here we extend the concept of Resistive Processing Unit (RPU) devices to convolutional neural networks (CNNs). We show how to map the convolutional layers to fully connected RPU arrays such that the parallelism of the hardware can be fully utilized in all three cycles of the backpropagation algorithm. We find that the noise and bound limitations imposed by the analog nature of the computations performed on the arrays significantly affect the training accuracy of the CNNs. Noise and bound management techniques are presented that mitigate these problems without introducing any additional complexity in the analog circuits and that can be addressed by the digital circuits. In addition, we discuss digitally programmable update management and device variability reduction techniques that can be used selectively for some of the layers in a CNN. We show that a combination of all those techniques enables a successful application of the RPU concept for training CNNs. The techniques discussed here are more general and can be applied beyond CNN architectures and therefore enables applicability of the RPU approach to a large class of neural network architectures.

  18. Transmitting patient and device data via GSM--central management for decentral mobile medical devices.

    Science.gov (United States)

    Bachmor, T; Schöchlin, J; Bolz, A

    2002-01-01

    Equipping medical devices with long range telemetry opens completely new possibilities for emergency response, home care and remote diagnosis. Mobile communications nowadays seem to be a generally accepted part of our modern world, but bridging the gap between new (consumer-) technologies and medical devices still is a challenge today. Providing a telemetry link (GSM) is just the trivial part--ensuring security, reliability and service management are the more critical tasks that need to be addressed. Therefore, a complete system concept consists of an automatic fleet management (e.g. periodic device-initiated service calls) as well as customer relationship management (CRM), including technical service and a trouble-ticket system.

  19. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  20. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  1. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  2. Managing RFID sensors networks with a general purpose RFID middleware.

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  3. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  4. Network resource and applications management at SLAC

    Energy Technology Data Exchange (ETDEWEB)

    Logg, C.A.; Cottrell, R.L.A.

    1996-02-01

    The Stanford Linear Accelerator Center (SLAC) has a heterogeneous networked computing environment with a variety of transmission media, protocols, equipment from multiple vendors, Local Areas Network (LAN) and Wide Area Network (WAN) connections, workstations, servers, legacy mainframes, operating systems, network services and applications, and users of various skill levels. New technologies are continually being deployed as they become available. All of these components work together (most of the time) but result in a complex distributed computing environment (henceforth referred to as the system) which requires automated monitoring and management for the maintenance of high quality performance with limited personnel and budgets. There is no Network Management Station (NMS) product which comes close to doing the job of monitoring and managing the LAN and WAN for SLAC. However, by making use of Ping, Simple Network Management Protocol (SNMP) and its Management Information Bases (MIBs), as well as network applications (trace-route, File Transfer Protocol (FTP), Remote Procedure Calls (RPCs), Remote Shell (rsh), et.al.), an NMS (Netview for AIX), and the accounting and monitoring facilities provided by the server operating systems, the challenge is surmountable.

  5. Cognitive resource management for heterogeneous cellular networks

    CERN Document Server

    Liu, Yongkang

    2014-01-01

    This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in

  6. A software risk management capability model for medical device software

    OpenAIRE

    Burton, John

    2008-01-01

    peer-reviewed The Medical Device industry is currently one of the fastest growing industries in the world and a guarantee of the integrity of medical device software has become increasingly important. Failure of the software can have potentially catastrophic effects, leading to injury of patients or even death. Consequently there is a tremendous onus on medical device manufacturers to demonstrate that sufficient attention is devoted to the area of software risk management throughout the so...

  7. Secure Remote Network Administration and Power Management

    Science.gov (United States)

    2004-06-01

    connectors without the use of a repeater can affect network performance detrimentally. A repeater is essentially an amplifier used in series to boost......assistance, phone lines at both the local and remote locations are required, but the touchtone controller allows other devices to share the Telco line

  8. A Categorized Resource Sharing Mechanism for Device-to-Device Communications in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jie Chen

    2016-01-01

    Full Text Available Device-to-Device (D2D communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized, is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the resource with cellular user equipment (UE simultaneously, by adjusting the transmit powers of these D2D transmitters. At the same time, D2D pairs in the first group and the third group share resource with cellular UE based on the transmit power minimization principle. Simulation results show that the proposed scheme can achieve relatively higher network throughput and lower transmit power consumption of the D2D system.

  9. Methods, media and systems for managing a distributed application running in a plurality of digital processing devices

    Science.gov (United States)

    Laadan, Oren; Nieh, Jason; Phung, Dan

    2012-10-02

    Methods, media and systems for managing a distributed application running in a plurality of digital processing devices are provided. In some embodiments, a method includes running one or more processes associated with the distributed application in virtualized operating system environments on a plurality of digital processing devices, suspending the one or more processes, and saving network state information relating to network connections among the one or more processes. The method further include storing process information relating to the one or more processes, recreating the network connections using the saved network state information, and restarting the one or more processes using the stored process information.

  10. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    their network capacities. However, in order to provide more advanced video services than simply porting the traditional television services to the network, the service provider needs to do more than just augment the network capacity. Advanced traffic management capability is one of the relevant abilities...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  11. Reactive power management of power networks with wind generation

    CERN Document Server

    Amaris, Hortensia; Ortega, Carlos Alvarez

    2012-01-01

    As the energy sector shifts and changes to focus on renewable technologies, the optimization of wind power becomes a key practical issue. Reactive Power Management of Power Networks with Wind Generation brings into focus the development and application of advanced optimization techniques to the study, characterization, and assessment of voltage stability in power systems. Recent advances on reactive power management are reviewed with particular emphasis on the analysis and control of wind energy conversion systems and FACTS devices. Following an introduction, distinct chapters cover the 5 key

  12. Fighting The Network: Manet Management In Support Of Littoral Operations

    Science.gov (United States)

    2016-03-01

    can include API , SNMP and other network management communications schemas. The dynamism and fluidity of tactical networks challenge traditional...Wave Relay MPU-4 radios have an onboard management API that allows routers to be configured and monitored using an HTTPS interface, CodeMettle... API . The unified network management approach enables the network operator to perceive and proactively manipulate the network. Human perception

  13. Network centric operations in crisis management

    NARCIS (Netherlands)

    Ven, J. van de; Rijk, R. van; Essens, P.; Frinking, E.

    2008-01-01

    This paper describes the approach to implement network centric operations (NCO) in the Dutch crisis management domain. NCO resolves a number of important shortcomings related to the supply and flow of information experienced in current verbal communication-based crisis management. First, we provide

  14. Social networks in cardiovascular disease management.

    Science.gov (United States)

    Shaya, Fadia T; Yan, Xia; Farshid, Maryam; Barakat, Samer; Jung, Miah; Low, Sara; Fedder, Donald

    2010-12-01

    Cardiovascular disease remains the leading cause of death in the USA. Social networks have a positive association with obesity, smoking cessation and weight loss. This article summarizes studies evaluating the impact of social networks on the management of cardiovascular disease. The 35 studies included in the article describe the impact of social networks on a decreased incidence of cardiovascular disease, depression and mortality. In addition, having a large-sized social network is also associated with better outcomes and improved health. The role of pharmacists is beginning to play an important role in the patient-centered medical home, which needs to be incorporated into social networks. The patient-centered medical home can serve as an adaptive source for social network evolvement.

  15. Strategies for Managing Mobile Devices for Use by Hospitalized Inpatients.

    Science.gov (United States)

    Dykes, Patricia C; Stade, Diana; Dalal, Anuj; Clements, Marsha; Collins, Sarah; Chang, Frank; Fladger, Anne; Getty, George; Hanna, John; Kandala, Ravali; Lehmann, Lisa S; Leone, Kathleen; Massaro, Anthony F; Mlaver, Eli; McNally, Kelly; Ravindran, Sucheta; Schnock, Kumiko; Bates, David W

    2015-01-01

    Despite the potential advantages, implementation of mobile devices and ongoing management pose challenges in the hospital environment. Our team implemented the PROSPECT (Promoting Respect and Ongoing Safety through Patient-centeredness, Engagement, Communication and Technology) project at Brigham and Women's Hospital. The goal of PROSPECT is to transform the hospital environment by providing a suite of e-tools to facilitate teamwork among nurses, physicians, patients and to engage patients and care partners in their plan of care. In this paper, we describe the device-related decisions and challenges faced including device and accessory selection, integration, information and device security, infection control, user access, and ongoing operation and maintenance. We relate the strategies that we used for managing mobile devices and lessons learned based on our experiences.

  16. Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Jun Huang

    2015-08-01

    Full Text Available Device-to-Device (D2D communication has recently emerged as a promising technology to improve the capacity and coverage of cellular systems. To successfully implement D2D communications underlaying a cellular network, resource allocation for D2D links plays a critical role. While most of prior resource allocation mechanisms for D2D communications have focused on interference within a single-cell system, this paper investigates the resource allocation problem for a multicell cellular network in which a D2D link reuses available spectrum resources of multiple cells. A repeated game theoretic approach is proposed to address the problem. In this game, the base stations (BSs act as players that compete for resource supply of D2D, and the utility of each player is formulated as revenue collected from both cellular and D2D users using resources. Extensive simulations are conducted to verify the proposed approach and the results show that it can considerably enhance the system performance in terms of sum rate and sum rate gain.

  17. Document management guidelines for distributed project networks

    CERN Document Server

    Hameri, A P; Høimyr, Nils-Joar

    1999-01-01

    This paper provides the project engineer with guidelines or a checklist on tasks that must be considered, defined and documented before the project can successfully implement a document management system in geographically distributed project environment. Topics ranging from configuration management, approval process, document types, user administration and document naming are covered. The underlying cases of the paper are that of CERN (European Laboratory for Particle Physics) and its latest accelerator project, together with the Nordisk Industrifond -funded Connecting Distributed Competencies (NI#: 98082) project, with a focus on distributed shipbuilding processes. Keywords: distributed project management, product data management, networking, document management, virtual workspaces

  18. Perioperative Management of Multiple Noncardiac Implantable Electronic Devices.

    Science.gov (United States)

    Ramos, Juan A; Brull, Sorin J

    2015-12-01

    The number of patients with noncardiac implantable electronic devices is increasing, and the absence of perioperative management standards, guidelines, practice parameters, or expert consensus statements presents clinical challenges. A 69-year-old woman presented for latissimus dorsi breast reconstruction. The patient had previously undergone implantation of a spinal cord stimulator, a gastric pacemaker, a sacral nerve stimulator, and an intrathecal morphine pump. After consultation with device manufacturers, the devices with patient programmability were switched off. Bipolar cautery was used intraoperatively. Postoperatively, all devices were interrogated to ensure appropriate functioning before home discharge. Perioperative goals include complete preoperative radiologic documentation of device component location, minimizing electromagnetic interference, and avoiding mechanical damage to implanted device components.

  19. A centralized feedback control model for resource management in wireless networks

    NARCIS (Netherlands)

    Yang, Y.; Haverkort, Boudewijn R.H.M.; Heijenk, Geert; Cloth, L.; Hiltunen, M.; van Moorsel, A.

    2007-01-01

    In a wireless environment, guaranteeing QoS constraints is challenging because applications at multiple devices share the same limited radio bandwidth in the network. In this paper we introduce and study a resource management model for centralized wireless networks, using feedback control theory.

  20. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Directory of Open Access Journals (Sweden)

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  1. Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Directory of Open Access Journals (Sweden)

    Yong Deng

    2016-01-01

    Full Text Available The explosive use of smart devices enabled the emergence of collective resource sharing among mobile individuals. Mobile users need to cooperate with each other to improve the whole network’s quality of service. By modeling the cooperative behaviors in a mobile crowd into an evolutionary Prisoner’s dilemma game, we investigate the relationships between cooperation rate and some main influence factors, including crowd density, communication range, temptation to defect, and mobility attributes. Using evolutionary game theory, our analysis on the cooperative behaviors of mobile takes a deep insight into the cooperation promotion in a dynamical network with selfish autonomous users. The experiment results show that mobile user’s features, including speed, moving probability, and reaction radius, have an obvious influence on the formation of a cooperative mobile social network. We also found some optimal status when the crowd’s cooperation rate reaches the best. These findings are important if we want to establish a mobile social network with a good performance.

  2. IPv6 Tactical Network Management

    Science.gov (United States)

    2009-09-01

    Advertisement messages and is required. Broadcast addresses are used to send traffic to all nodes on a subnet. There are no IPv6 broadcast addresses...dopplerVUE worked as advertised with a few exceptions. This experiment was not representative of a “true” network with an assortment of servers, routers, and...Applications Camera RAM Speed Sony Laptop NOC Vista Home Premium 1, 2, 3 Attached, not used 2 GB 2 GHz Toshiba Laptop Casualty Site Vista

  3. Strategic Management of Network Resources

    DEFF Research Database (Denmark)

    Antero, Michelle; Riis, Philip Holst

    2011-01-01

    This paper applies the resource-based view (RBV) theory to a case study aimed at identifying the complementary resources among partners in the ERPCorp ecosystem of development and implementation of Enterprise Resource Planning (ERP) for small and medium enterprises (SMEs) in Denmark. The paper an...... that the strategy, if implemented successfully, maintains competitive advantage for the ERPCorp ecosystem through effectively combining resources and leveraging lock-in and network effects....

  4. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  5. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  6. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  7. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    -based IS. There are several reasons for this: (a) Networked IS are large and complex systems; (b) in most cases, one has to deal with a number of existing - probably heterogenous - technical hardware and software platforms and link them together in a network; (c) differences in organizational culture, work......In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... communication between geographically dispersed organizational units. Examples include logistics systems, airline booking systems, and CSCW systems. We assume that the design and implementation of networked IS is significantly more difficult and risky than the development of traditional "stand-alone" computer...

  8. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Energy Technology Data Exchange (ETDEWEB)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  9. Management continuity in local health networks

    Directory of Open Access Journals (Sweden)

    Mylaine Breton

    2012-04-01

    Full Text Available Introduction: Patients increasingly receive care from multiple providers in a variety of settings. They expect management continuity that crosses boundaries and bridges gaps in the healthcare system. To our knowledge, little research has been done to assess coordination across organizational and professional boundaries from the patients' perspective. Our objective was to assess whether greater local health network integration is associated with management continuity as perceived by patients. Method: We used the data from a research project on the development and validation of a generic and comprehensive continuity measurement instrument that can be applied to a variety of patient conditions and settings. We used the results of a cross-sectional survey conducted in 2009 with 256 patients in two local health networks in Quebec, Canada. We compared four aspects of management continuity between two contrasting network types (highly integrated vs. poorly integrated. Results: The scores obtained in the highly integrated network are better than those of the poorly integrated network on all dimensions of management continuity (coordinator role, role clarity and coordination between clinics, and information gaps between providers except for experience of care plan. Conclusion: Some aspects of care coordination among professionals and organizations are noticed by patients and may be valid indicators to assess care coordination.

  10. A Knowledge Management System Using Bayesian Networks

    Science.gov (United States)

    Ribino, Patrizia; Oliveri, Antonio; Re, Giuseppe Lo; Gaglio, Salvatore

    In today's world, decision support and knowledge management processes are strategic and interdependent activities in many organizations. The companies' interest on a correct knowledge management is grown, more than interest on the mere knowledge itself. This paper proposes a Knowledge Management System based on Bayesian networks. The system has been tested collecting and using data coming from projects and processes typical of ICT companies, and provides a Document Management System and a Decision Support system to share documents and to plan how to best use firms' knowledge.

  11. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  12. Medical device risk management and its economic impact

    Directory of Open Access Journals (Sweden)

    Katerina Krsteva Jakimovska

    2013-10-01

    Full Text Available The importance of medical devices in everyday users/patients lives is imensse. This is the reason why emphasis must be put on safety during their use. Satisfactory safety level can be achived by implementation of quality and risk management standards. Medical device manufacturers must learn to deal with the potential risks by using theoretical and practical examples and measures in order to protect their users/patients and themselves from suffering huge losses arising from adverse events or recall of their products. The best moment for implementation of risk management methods and analysis begins from the device design and development through manufacturing, sales and distribution. These way medical device manufacturers will succseed in protecting their users/patients from serious adverse events and at the same time protect their brand and society status, while minimizing economic losses.

  13. FY1995 optoelectronic devices and circuits for terabit class network; 1995 nendo terabit kyu network yo hikari denshi device kairo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    The necessary technology realizing Terabit class optical network is the signal multiplexing both in temporal and spectral domains. Controllability of ultrafast optoelectronic systems is therefore the priority issue. Specifically we chose semiconductor lasers as the key devices. The methodology for performance improvement and the creation of novel functionality are investigated. Firstly compression of semiconductor laser pulse reached the world record of 65 femto second. Secondly a proposal was made to control mode locked semiconductor lasers via subharmonic synchronization and a substantial phase noise reduction was demonstrated. Thirdly a new technology was developed to realize broadband anti-reflection coating on semiconductor laser amplifier facet, bringing about significant performance improvement. To compensate the dispersion induced signal distortion a broadband semiconductor laser amplifier four wave mixing was analyzed and also demonstrated experimentally. (NEDO)

  14. Analysis and Tools for Improved Management of Connectionless and Connection-Oriented BLE Devices Coexistence.

    Science.gov (United States)

    Del Campo, Antonio; Cintioni, Lorenzo; Spinsante, Susanna; Gambi, Ennio

    2017-04-07

    With the introduction of low-power wireless technologies, like Bluetooth Low Energy (BLE), new applications are approaching the home automation, healthcare, fitness, automotive and consumer electronics markets. BLE devices are designed to maximize the battery life, i.e., to run for long time on a single coin-cell battery. In typical application scenarios of home automation and Ambient Assisted Living (AAL), the sensors that monitor relatively unpredictable and rare events should coexist with other sensors that continuously communicate health or environmental parameter measurements. The former usually work in connectionless mode, acting as advertisers, while the latter need a persistent connection, acting as slave nodes. The coexistence of connectionless and connection-oriented networks, that share the same central node, can be required to reduce the number of handling devices, thus keeping the network complexity low and limiting the packet's traffic congestion. In this paper, the medium access management, operated by the central node, has been modeled, focusing on the scheduling procedure in both connectionless and connection-oriented communication. The models have been merged to provide a tool supporting the configuration design of BLE devices, during the network design phase that precedes the real implementation. The results highlight the suitability of the proposed tool: the ability to set the device parameters to allow us to keep a practical discovery latency for event-driven sensors and avoid undesired overlaps between scheduled scanning and connection phases due to bad management performed by the central node.

  15. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  16. Online professional networks for physicians: risk management.

    Science.gov (United States)

    Hyman, Jon L; Luks, Howard J; Sechrest, Randale

    2012-05-01

    The rapidly developing array of online physician-only communities represents a potential extraordinary advance in the availability of educational and informational resources to physicians. These online communities provide physicians with a new range of controls over the information they process, but use of this social media technology carries some risk. The purpose of this review was to help physicians manage the risks of online professional networking and discuss the potential benefits that may come with such networks. This article explores the risks and benefits of physicians engaging in online professional networking with peers and provides suggestions on risk management. Through an Internet search and literature review, we scrutinized available case law, federal regulatory code, and guidelines of conduct from professional organizations and consultants. We reviewed the OrthoMind.com site as a case example because it is currently the only online social network exclusively for orthopaedic surgeons. Existing case law suggests potential liability for orthopaedic surgeons who engage with patients on openly accessible social network platforms. Current society guidelines in both the United States and Britain provide sensible rules that may mitigate such risks. However, the overall lack of a strong body of legal opinions, government regulations as well as practical experience for most surgeons limit the suitability of such platforms. Closed platforms that are restricted to validated orthopaedic surgeons may limit these downside risks and hence allow surgeons to collaborate with one another both as clinicians and practice owners. Educating surgeons about the pros and cons of participating in these networking platforms is helping them more astutely manage risks and optimize benefits. This evolving online environment of professional interaction is one of few precedents, but the application of risk management strategies that physicians use in daily practice carries over

  17. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  18. Device features for managing patients with heart failure.

    Science.gov (United States)

    Varma, Niraj; Wilkoff, Bruce

    2011-04-01

    Implanted devices in heart failure patients improve survival, but requires correct prescription, programming, and monitoring. Requirements change since heart failure is a dynamic condition. Repeated episodes of acute decompensation increase mortality. Events involve several processes converging to manifest with fluid congestion. Implantable devices identify changes such as those in rhythm, device function or hemodynamics. Incorporation of remote monitoring technology (TRUST Trial), enables tracking of these parameters and prompt notification of deviations, even if the patient remains asymptomatic. This may facilitate management of large patient volumes and enable pre-emptive treatment to improve outcomes in these high-risk patients.

  19. A Game-theoretic Framework for Network Coding Based Device-to-Device Communications

    KAUST Repository

    Douik, Ahmed

    2016-06-29

    This paper investigates the delay minimization problem for instantly decodable network coding (IDNC) based deviceto- device (D2D) communications. In D2D enabled systems, users cooperate to recover all their missing packets. The paper proposes a game theoretic framework as a tool for improving the distributed solution by overcoming the need for a central controller or additional signaling in the system. The session is modeled by self-interested players in a non-cooperative potential game. The utility functions are designed so as increasing individual payoff results in a collective behavior achieving both a desirable system performance in a shared network environment and the Nash equilibrium. Three games are developed whose first reduces the completion time, the second the maximum decoding delay and the third the sum decoding delay. The paper, further, improves the formulations by including a punishment policy upon collision occurrence so as to achieve the Nash bargaining solution. Learning algorithms are proposed for systems with complete and incomplete information, and for the imperfect feedback scenario. Numerical results suggest that the proposed game-theoretical formulation provides appreciable performance gain against the conventional point-to-multipoint (PMP), especially for reliable user-to-user channels.

  20. ATCA Shelf Manager EPICS device support for ITER CODAC Core System

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Bruno, E-mail: bsantos@ipfn.ist.utl.pt [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Carvalho, Paulo F.; Rodrigues, A.P.; Carvalho, Bernardo B.; Sousa, Jorge; Batista, António J.N.; Correia, Miguel; Combo, Álvaro M.; Cruz, Nuno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Correia, Carlos M.B.A. [Centro de Instrumentação, Departamento de Física, Universidade de Coimbra, 3004-516 Coimbra (Portugal); Gonçalves, Bruno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-10-15

    Highlights: • This architecture targets the health management integration into the NDS. • The developed solution supports the ShM redundancy features, specified by ATCA. • The average RTT was around 59 ms and in 99.9% of the cases was less than 130 ms. • Without losing any update cycle, can monitor a system shelf with approximately 400 sensors. • This solution enables the user to configure the entire system in DB files and st.cmd. - Abstract: The ITER CODAC Core System (CCS) is responsible for plant Instrumentation and Control (I&C) supervising and monitoring. This system uses the Enhanced Physics and Industrial Control System (EPICS) Channel Access (CA) protocol as the interface with the Plant Operation Network (PON). This paper presents a generic EPICS device support developed for the integration of the ATCA Shelf Manager (ShM) into the ITER CCS, providing scalability and easy configuration. The device support uses the available HTTP interface on Shelf Manager in the communication layer. Both HTTP server and sensors/actuators definitions can be configured using the EPICS database file and the Input/Output Controller (IOC) initialization file. A proposal based on this device is also presented, targeting the Nominal Device Support (NDS) for health management. The EPICS device support running in an IOC provides Process Variables (PV) to the PON network with the system information and these PVs can be used by all CA clients, such as EPICS user interface clients, alarm systems and archive systems. Operation with redundant ATCA ShMs and device support scalability tests were performed and the results are presented.

  1. Conceptual Design of a Nano-Networking Device

    Directory of Open Access Journals (Sweden)

    Sebastian Canovas-Carrasco

    2016-12-01

    Full Text Available Nanotechnology is an emerging scientific area whose advances, among many others, have a positive direct impact on the miniaturization of electronics. This unique technology enables the possibility to design and build electronic components as well as complete devices (called nanomachines or nanodevices at the nano scale. A nanodevice is expected to be an essential element able to operate in a nanonetwork, where a huge number of them would coordinate to acquire data, process the information gathered, and wirelessly transmit those data to end-points providing innovative services in many key scenarios, such as the human body or the environment. This paper is aimed at studying the feasibility of this type of device by carefully examining their main component parts, namely the nanoprocessor, nanomemory, nanoantenna, and nanogenerator. To this end, a thorough state-of-the-art review is conveyed to discuss, substantiate, and select the most suitable current technology (commercial or pre-commercial for each component. Then, we further contribute by developing a complete conceptual nanodevice layout taking into consideration its ultra-small size (similar to a blood cell and its very restricted capabilities (e.g., processing, memory storage, telecommunication, and energy management. The required resources as well as the power consumption are realistically estimated.

  2. Resource Management in Broadband Communication Networks

    DEFF Research Database (Denmark)

    Hansen, Mads Stenhuus

    2003-01-01

    This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered....... The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants...... at developing a demonstration platform, where software agents handled virtually all aspects of controlling an ATM-based network. In the beginning of the part about simulated ants it is explained how scientists believe ants in nature find their way through the environment between their nest and food sources...

  3. Resource Management in Tactical Military Networks

    Science.gov (United States)

    2006-12-01

    FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION , INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION Resource Management in Tactical Military Networks...Martin Lies, Peter Sevenich, Christoph Karg, Christoph Barz Nr: 2 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION , INFORMATIONSVERARBEITUNG UND ERGONOMIE...Communication with IPSec in Tunnelmode Nr: 3 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION , INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION IPSec in

  4. Managing records in networked environment using EDRMS ...

    African Journals Online (AJOL)

    Managing records in networked environment using EDRMS applications: a case study of Rand Water. ... and archival story of Rand Water representing water sector challenges and opportunities that organisations such as this are faced with in consideration of the ever-improving technologies and strategies at their disposal.

  5. Buffer Management Simulation in ATM Networks

    Science.gov (United States)

    Yaprak, E.; Xiao, Y.; Chronopoulos, A.; Chow, E.; Anneberg, L.

    1998-01-01

    This paper presents a simulation of a new dynamic buffer allocation management scheme in ATM networks. To achieve this objective, an algorithm that detects congestion and updates the dynamic buffer allocation scheme was developed for the OPNET simulation package via the creation of a new ATM module.

  6. Mobility management in satellite networks

    Science.gov (United States)

    Johanson, Gary A.

    1995-01-01

    This paper addresses the methods used or proposed for use in multi-beam and/or multi-satellite networks designed to provide Mobile Satellite Services (MSS). Specific topics include beam crossover in the North American Mobile Satellite (MSAT) system as well as registration and live call hand-off for a multi-regional geosynchronous (GEO) satellite based system and a global coverage Low Earth Orbiting (LEO) system. In the MSAT system, the individual satellite beams cover very large geographic areas so the need for live call hand-off was not anticipated. This paper discusses the methods used to keep track of the beam location of the users so that incoming call announcements or other messages may be directed to them. Proposed new GEO systems with large numbers of beams will provide much smaller geographic coverage in individual beams and thus the need arises to keep track of the user's location as well as to provide live call hand-off as the user traverses from beam to beam. This situation also occurs in proposed LEO systems where the problems are worsened by the need for satellite to satellite hand-off as well as beam to beam hand-off within a single satellite. The paper discusses methods to accomplish these handoffs and proposes system architectures to address the various hand-off scenarios.

  7. Using NetMaster to manage IBM networks

    Science.gov (United States)

    Ginsburg, Guss

    1991-01-01

    After defining a network and conveying its importance to support the activities at the JSC, the need for network management based on the size and complexity of the IBM SNA network at JSC is demonstrated. Network Management consists of being aware of component status and the ability to control resources to meet the availability and service needs of users. The concerns of the user are addressed as well as those of the staff responsible for managing the network. It is explained how NetMaster (a network management system for managing SNA networks) is used to enhance reliability and maximize service to SNA network users through automated procedures. The following areas are discussed: customization, problem and configuration management, and system measurement applications of NetMaster. Also, several examples are given that demonstrate NetMaster's ability to manage and control the network, integrate various product functions, as well as provide useful management information.

  8. Measurement campaign on connectivity of mesh networks formed by mobile devices

    DEFF Research Database (Denmark)

    Pietrarca, Beatrice; Sasso, Giovanni; Perrucci, Gian Paolo

    2007-01-01

    This paper reports the results of a measurement campaign on the connectivity level of mobile devices using Bluetooth (BT) to form cooperative mobile mesh networks. Such mobile mesh networks composed of mobile devices are the basis for any peer-to-peer communication like wireless grids or social...

  9. Re-engineering Nascom's network management architecture

    Science.gov (United States)

    Drake, Brian C.; Messent, David

    1994-01-01

    The development of Nascom systems for ground communications began in 1958 with Project Vanguard. The low-speed systems (rates less than 9.6 Kbs) were developed following existing standards; but, there were no comparable standards for high-speed systems. As a result, these systems were developed using custom protocols and custom hardware. Technology has made enormous strides since the ground support systems were implemented. Standards for computer equipment, software, and high-speed communications exist and the performance of current workstations exceeds that of the mainframes used in the development of the ground systems. Nascom is in the process of upgrading its ground support systems and providing additional services. The Message Switching System (MSS), Communications Address Processor (CAP), and Multiplexer/Demultiplexer (MDM) Automated Control System (MACS) are all examples of Nascom systems developed using standards such as, X-windows, Motif, and Simple Network Management Protocol (SNMP). Also, the Earth Observing System (EOS) Communications (Ecom) project is stressing standards as an integral part of its network. The move towards standards has produced a reduction in development, maintenance, and interoperability costs, while providing operational quality improvement. The Facility and Resource Manager (FARM) project has been established to integrate the Nascom networks and systems into a common network management architecture. The maximization of standards and implementation of computer automation in the architecture will lead to continued cost reductions and increased operational efficiency. The first step has been to derive overall Nascom requirements and identify the functionality common to all the current management systems. The identification of these common functions will enable the reuse of processes in the management architecture and promote increased use of automation throughout the Nascom network. The MSS, CAP, MACS, and Ecom projects have indicated

  10. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  11. Service and multimedia data transmission in IoT networks using hybrid communication devices

    Directory of Open Access Journals (Sweden)

    Saveliev Anton

    2017-01-01

    Full Text Available Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization of IoT network, using hybrid modules. These devices provide flexibility, scalability, energy efficiency and multi-use of network for the transfer of various types of data. This approach takes into account software and hardware features of the devices used for data transmission in IoT networks, which helps to automate connecting the modules chosen by user.

  12. Identification of Measures and Indicators for the IT Security of Networked Medical Devices: A Delphi Study.

    Science.gov (United States)

    Leber, Stefan; Ammenwerth, Elske

    2017-01-01

    The networking of medical devices or systems in a hospital network is the foundation for modern medical diagnostics and therapy. This, however, makes possible numerous hazards that could lead to risks for patients, clinical processes or data and information. The aim of the work was to develop a catalogue of measures and indicators for the effective support of the IT risk management process in a health facility. Through a qualitative and quantitative Delphi study among 21 experts, it was possible to identify an initial 51 practice-relevant measures of IT risk management that a hospital should implement. Additionally, 27 indicators were defined which can be used to measure the impact of these measures. Of the 51 measures, 35 were seen as especially important, particularly organizational measures. Of the 27 indicators, six were seen as especially important, particularly indicators to measure networking effectiveness. The study also investigated the impact of the measures on the indicators. A case study is planned to investigate the practicability of the identified measures and indicators.

  13. Network Coding Applications and Implementations on Mobile Devices

    DEFF Research Database (Denmark)

    Fitzek, Frank; Pedersen, Morten Videbæk; Heide, Janus

    2010-01-01

    Network coding has attracted a lot of attention lately. The goal of this paper is to demonstrate that the implementation of network coding is feasible on mobile platforms. The paper will guide the reader through some examples and demonstrate uses for network coding. Furthermore the paper will also...... show that the implementation of network coding is feasible today on commercial mobile platforms....

  14. Service and multimedia data transmission in IoT networks using hybrid communication devices

    OpenAIRE

    Saveliev Anton; Malov Dmitry; Tamashakin Michael; Budkov Victor

    2017-01-01

    Employment of various protocols and technologies in IoT networks leads to the lack of module unification and increase in incompatible technical solutions. Modern IoT networks are not designed for streaming audio/video data, so their application field is limited. Also, modern IoT networks should have connection areas for devices transferring data to the Internet, and consider hardware and software specific characteristics of these devices. We offer one-size-fits-all solution for organization o...

  15. Managing the energy efficiency of a process sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Karjalainen, S.; Karjalainen, T. (Univ. of Oulu, Measurement and Sensor Lab., Kajaani (Finland)). email: seppo.karjalainen@oulu.fi

    2009-07-01

    A wireless data transfer is nowadays quite easy and affordable to implement in most cases. If the wireless sensor network (Wsrn) is deployed in a very difficult environment or requires great data transfer speeds, as in many industrial and process environments, this might not always be the case. The main reason slowing the deployment of WSNs is the difficulty of supplying enough energy to the sensor nodes. In most cases all of the energy the node consumes must be stored or produced at the node. The difficulty of supplying enough energy for the nodes can shorten the maintenance interval of the nodes to an unpractical level. In this research project we study the possibilities of managing the energy efficiency (saving energy, producing energy) of a wireless process measurement system. The main focus areas of the project are saving and producing energy at the network nodes. Energy consumption is the main limitation while designing WSNs. To extend each sensor node's lifetime it is necessary to reduce power dissipation as much as possible. A sensor node is a complex device comprising of various parts, each of which must be carefully selected and utilized in order to reach the lowest possible energy consumption. The level of energy efficiency of a sensor network is greatly affected by the way we balance the goal of low energy consumption with the other requirements placed on the network. The requirements for a deployed WSN depend on the application and the operating environment. Hence, the generalization of the requirements in detail is not practical. Nonetheless sensor network applications possess several characteristics, based on which general requirements for the node platforms, protocols and applications can be defined. The relative importance of each requirement depends heavily on the application area. In this project we produce a report covering all the various aspects of managing the energy efficiency in a wireless sensor network. The physical components and

  16. Network resource control for grid workflow management systems

    NARCIS (Netherlands)

    Strijkers, R.J.; Cristea, M.; Korkhov, V.; Marchal, D.; Belloum, A.; Laat, C.de; Meijer, R.J.

    2010-01-01

    Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network

  17. Managing online identity and diverse social networks on Facebook

    National Research Council Canada - National Science Library

    Kirsty Young

    2013-01-01

    .... The data revealed that adult users successfully manage their online identity and provide effective models for adolescents, particularly in relation to the management of diverse social networks where...

  18. The Managing Epilepsy Well Network:: Advancing Epilepsy Self-Management.

    Science.gov (United States)

    Sajatovic, Martha; Jobst, Barbara C; Shegog, Ross; Bamps, Yvan A; Begley, Charles E; Fraser, Robert T; Johnson, Erica K; Pandey, Dilip K; Quarells, Rakale C; Scal, Peter; Spruill, Tanya M; Thompson, Nancy J; Kobau, Rosemarie

    2017-03-01

    Epilepsy, a complex spectrum of disorders, affects about 2.9 million people in the U.S. Similar to other chronic disorders, people with epilepsy face challenges related to management of the disorder, its treatment, co-occurring depression, disability, social disadvantages, and stigma. Two national conferences on public health and epilepsy (1997, 2003) and a 2012 IOM report on the public health dimensions of epilepsy highlighted important knowledge gaps and emphasized the need for evidence-based, scalable epilepsy self-management programs. The Centers for Disease Control and Prevention translated recommendations on self-management research and dissemination into an applied research program through the Prevention Research Centers Managing Epilepsy Well (MEW) Network. MEW Network objectives are to advance epilepsy self-management research by developing effective interventions that can be broadly disseminated for use in people's homes, healthcare providers' offices, or in community settings. The aim of this report is to provide an update on the MEW Network research pipeline, which spans efficacy, effectiveness, and dissemination. Many of the interventions use e-health strategies to eliminate barriers to care (e.g., lack of transportation, functional limitations, and stigma). Strengths of this mature research network are the culture of collaboration, community-based partnerships, e-health methods, and its portfolio of prevention activities, which range from efficacy studies engaging hard-to-reach groups, to initiatives focused on provider training and knowledge translation. The MEW Network works with organizations across the country to expand its capacity, help leverage funding and other resources, and enhance the development, dissemination, and sustainability of MEW Network programs and tools. Guided by national initiatives targeting chronic disease or epilepsy burden since 2007, the MEW Network has been responsible for more than 43 scientific journal articles, two

  19. Cross-layer fault tolerant data aggregation for improved network delay in healthcare management applications.

    Science.gov (United States)

    Yuan, Xiaojing; Liu, Haoying

    2009-01-01

    The escalation of American health care costs compels a new approach to manage chronic diseases. Wireless sensor networks (WSN) have been applied successfully in remote monitoring in military, aerospace, civil structure, and healthcare. However, existing wireless network framework cannot provide required quality of service (QoS) due to communication device failure, message loss caused by link error, collision, and hidden terminal for personalized disease management applications. In this paper, we present scalable network architecture and an operating mechanism that tolerates network structure changes caused by failure, with the application level data aggregation algorithm able to heal from the failure. We provide close form solutions that can achieve optimized network delay. Performance analysis was done to evaluate the significance of different nodes' failure in both homogeneous and heterogeneous sensor network and the effects of sensing and communication speed on failure impact in heterogeneous sensor networks.

  20. Software Health Management with Bayesian Networks

    Science.gov (United States)

    Mengshoel, Ole; Schumann, JOhann

    2011-01-01

    Most modern aircraft as well as other complex machinery is equipped with diagnostics systems for its major subsystems. During operation, sensors provide important information about the subsystem (e.g., the engine) and that information is used to detect and diagnose faults. Most of these systems focus on the monitoring of a mechanical, hydraulic, or electromechanical subsystem of the vehicle or machinery. Only recently, health management systems that monitor software have been developed. In this paper, we will discuss our approach of using Bayesian networks for Software Health Management (SWHM). We will discuss SWHM requirements, which make advanced reasoning capabilities for the detection and diagnosis important. Then we will present our approach to using Bayesian networks for the construction of health models that dynamically monitor a software system and is capable of detecting and diagnosing faults.

  1. Simulation of devices mobility to estimate wireless channel quality metrics in 5G networks

    Science.gov (United States)

    Orlov, Yu.; Fedorov, S.; Samuylov, A.; Gaidamaka, Yu.; Molchanov, D.

    2017-07-01

    The problem of channel quality estimation for devices in a wireless 5G network is formulated. As a performance metrics of interest we choose the signal-to-interference-plus-noise ratio, which depends essentially on the distance between the communicating devices. A model with a plurality of moving devices in a bounded three-dimensional space and a simulation algorithm to determine the distances between the devices for a given motion model are devised.

  2. Network resiliency through memory health monitoring and proactive management

    Science.gov (United States)

    Andrade Costa, Carlos H.; Cher, Chen-Yong; Park, Yoonho; Rosenburg, Bryan S.; Ryu, Kyung D.

    2017-11-21

    A method for managing a network queue memory includes receiving sensor information about the network queue memory, predicting a memory failure in the network queue memory based on the sensor information, and outputting a notification through a plurality of nodes forming a network and using the network queue memory, the notification configuring communications between the nodes.

  3. Risk management for medical devices in research projects

    Directory of Open Access Journals (Sweden)

    Sauter Christian

    2015-09-01

    Full Text Available In applied research for medical devices exists a conflict between effective research and regulations. While researchers need sufficient freedom the regulations require a complex technical documentation for a medical device. One relevant aspect of the regulations is risk management which takes time and therefore is ignored in many research projects. With adoptions to the standard the effort can be reduced: Identifying of risks can be focused on critical risks, measures can be categorised and only some categories need to be implemented. Research teams using this method can provide results which can be transferred into commercial products easier, cheaper and faster.

  4. Dynamic Privacy Management in Pervasive Sensor Networks

    Science.gov (United States)

    Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

  5. Plasticity in memristive devices for Spiking Neural Networks

    Directory of Open Access Journals (Sweden)

    Sylvain eSaïghi

    2015-03-01

    Full Text Available Memristive devices present a new device technology allowing for the realization of compact nonvolatile memories. Some of them are already in the process of industrialization. Additionally, they exhibit complex multilevel and plastic behaviors, which make them good candidates for the implementation of artificial synapses in neuromorphic engineering. However, memristive effects rely on diverse physical mechanisms, and their plastic behaviors differ strongly from one technology to another. Here, we present measurements performed on different memristive devices and the opportunities that they provide. We show that they can be used to implement different learning rules whose properties emerge directly from device physics: real time or accelerated operation, deterministic or stochastic behavior, long term or short term plasticity. We then discuss how such devices might be integrated into a complete architecture. These results highlight that there is no unique way to exploit memristive devices in neuromorphic systems. Understanding and embracing device physics is the key for their optimal use.

  6. Managing integrated oncology treatment in virtual networks.

    Science.gov (United States)

    Stanicki, Verena; Becker, Matthias; Böckmann, Britta

    2015-01-01

    Interdisciplinary and intersectoral coordinated healthcare management based on Clinical Practice Guidelines is essential to achieve high quality in oncological networks. The objective of our research project is to create a cookbook, which can be used by oncological networks as a template. The cookbook is based on guideline-compliant care processes. To develop these care processes, the three S3-guidelines breast, colon and prostate carcinoma have been formalized. The thus-obtained platform-independent process fragments were transformed into an underlying metamodel, which is based on HL7 and can be used for modeling clinical pathways. Additional, qualitative guided interviews were chosen to capitalize on the experts' (e.g. chief residents, resident specialists) wide knowledge and experience in oncological health care management. One of these use cases (tumor board scheduling) is developed for a healthcare management platform which is linked to a national electronic case record. The projected result of our approach is a cookbook which shows, how the treatment can be controlled by interdisciplinary and intersectoral care processes in an oncological network.

  7. Integration of a network aware traffic generation device into a computer network emulation platform

    CSIR Research Space (South Africa)

    Von Solms, S

    2014-07-01

    Full Text Available Flexible, open source network emulation tools can provide network researchers with significant benefits regarding network behaviour and performance. The evaluation of these networks can benefit greatly from the integration of realistic, network...

  8. The Networked Naturalist - Mobile devices for Citizen Science

    Science.gov (United States)

    Estrin, D.; Graham, E. A.

    2010-12-01

    Citizen science projects engage individual volunteers or groups to observe, measure, and contribute data to scientific studies. CENS is developing mobile phone and web-based tools for formal and informal observation of ecosystems. We are collaborating with national environmental education campaigns, such as Project BudBurst, and with the National Park Service to increase participation in citizen scientist campaigns and to support park service personnel in day to day data gathering. The overarching goals of the Networked Naturalist set of projects are to enhance participatory learning experiences through citizen science campaigns and to facilitate scientific and environmental data collection. Our experience with volunteers at UCLA and at the National Park Service has demonstrated that mobile phones are an efficient, effective and engaging method for collecting environmental and location data and hold great potential for both raising public awareness of environmental issues and collecting data that is valuable for both ecosystem management and research. CENS is an NSF-funded Science and Technology Center and this project represents collaboration among ecologists, computer scientist, and statisticians. Our mobile applications are free for download on Android and iPhone App stores and the source code is made available through open source licenses.

  9. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Ángel Leonardo Valdivieso Caraguay

    2017-03-01

    Full Text Available This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  10. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.

    Science.gov (United States)

    Caraguay, Ángel Leonardo Valdivieso; Villalba, Luis Javier García

    2017-03-31

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  11. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Science.gov (United States)

    Valdivieso Caraguay, Ángel Leonardo; García Villalba, Luis Javier

    2017-01-01

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors. PMID:28362346

  12. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

    Science.gov (United States)

    Busdicker, Mike; Upendra, Priyanka

    2017-09-02

    This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.

  13. Perioperative management of patients with cardiac implantable electronic devices.

    Science.gov (United States)

    Poveda-Jaramillo, R; Castro-Arias, H D; Vallejo-Zarate, C; Ramos-Hurtado, L F

    2017-05-01

    The use of implantable cardiac devices in people of all ages is increasing, especially in the elderly population: patients with pacemakers, cardioverter-defibrillators or cardiac resynchronization therapy devices regularly present for surgery for non-cardiac causes. This review was made in order to collect and analyze the latest evidence for the proper management of implantable cardiac devices in the perioperative period. Through a detailed exploration of PubMed, Academic Search Complete (EBSCO), ClinicalKey, Cochrane (Ovid), the search software UpToDate, textbooks and patents freely available to the public on Google, we selected 33 monographs, which matched the objectives of this publication. Copyright © 2016 Sociedad Española de Anestesiología, Reanimación y Terapéutica del Dolor. Publicado por Elsevier España, S.L.U. All rights reserved.

  14. Management of the Space Station Freedom onboard local area network

    Science.gov (United States)

    Miller, Frank W.; Mitchell, Randy C.

    1991-01-01

    An operational approach is proposed to managing the Data Management System Local Area Network (LAN) on Space Station Freedom. An overview of the onboard LAN elements is presented first, followed by a proposal of the operational guidelines by which management of the onboard network may be effected. To implement the guidelines, a recommendation is then presented on a set of network management parameters which should be made available in the onboard Network Operating System Computer Software Configuration Item and Fiber Distributed Data Interface firmware. Finally, some implications for the implementation of the various network management elements are discussed.

  15. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  16. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  17. Supply Chain Management in Industrial Symbiosis Networks

    DEFF Research Database (Denmark)

    Herczeg, Gabor

    2016-01-01

    Sustainable supply chain management deals with the design and operation of profitable supply chains that also respect limitations on natural resources, do no harm to the environment, and consider the social systems they operate in. In academic research on sustainable supply chain management...... sustainable develop- ment efforts, and emphasize synergistic relations, community, and collabora- tion. This thesis takes an operations and supply chain management perspec- tive on industrial symbiosis networks. More specifically, the thesis elaborates on the collaborative and competitive characteristics...... of industrial symbiosis. First, it discusses the supply chain integration and coordination challenges that appear in industrial symbiosis, on both an organizational and operational level. Secondly, the thesis discusses the organizational capabilities and re- sources relevant for the competitiveness...

  18. Risk management of developing assistive devices for elderly.

    Science.gov (United States)

    Cheng, Yu-Tien; Chuang, Huan-Ming; Pei, Chun

    2011-01-01

    This study uses the Delphi method in interviewing experts to identify critical risks in the development of assistive devices. Critical risks included product planning, technology development, production, performance, schedule management, and cost management, comprising 26 risk factors in 6 constructs. This study determined which factors were of high importance, finding a total of 7 market analysis errors. Mind mapping was used to create a knowledge map; and layer expansion was used to understand risk distribution to facilitate risk mitigation and monitoring. Organizational risk strategies could be developed to reduce risk and maintain stability while achieving the objective of developing new products. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  19. 3G, 4G and beyond bringing networks, devices and the web together

    CERN Document Server

    Sauter, Martin

    2012-01-01

    Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile devices, voice and multimedia services and the mobile web 2.0.  Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.  It discusses how these elements strongly influence each other and how network ca

  20. MSAT signalling and network management architectures

    Science.gov (United States)

    Garland, Peter; Keelty, J. Malcolm

    1989-01-01

    Spar Aerospace has been active in the design and definition of Mobile Satellite Systems since the mid 1970's. In work sponsored by the Canadian Department of Communications, various payload configurations have evolved. In addressing the payload configuration, the requirements of the mobile user, the service provider and the satellite operator have always been the most important consideration. The current Spar 11 beam satellite design is reviewed, and its capabilities to provide flexibility and potential for network growth within the WARC87 allocations are explored. To enable the full capabilities of the payload to be realized, a large amount of ground based Switching and Network Management infrastructure will be required, when space segment becomes available. Early indications were that a single custom designed Demand Assignment Multiple Access (DAMA) switch should be implemented to provide efficient use of the space segment. As MSAT has evolved into a multiple service concept, supporting many service providers, this architecture should be reviewed. Some possible signalling and Network Management solutions are explored.

  1. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  2. UPM: unified policy-based network management

    Science.gov (United States)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  3. User-centred and context-aware identity management in mobile ad-hoc networks

    CERN Document Server

    Arabo, Abdullahi

    2013-01-01

    The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) du...

  4. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Directory of Open Access Journals (Sweden)

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  5. Wireless Network of Collaborative Physiological Signal Devices in a U-Healthcare System

    Science.gov (United States)

    Jung, Joonyoung; Kim, Daeyoung

    We designed and implemented collaborative physiological signal devices in a u-healthcare(ubiquitous healthcare) system. In this system, wireless body area network (WBAN) such as ZigBee is used to communicate between physiological signal devices and the mobile system. WBAN device needs a specific function for ubiquitous healthcare application. We show several collaborative physiological devices and propose WBAN mechanism such as a fast scanning algorithm, a dynamic discovery and installation mechanism, a reliable data transmission, a device access control for security, and a healthcare profile for u-healthcare system.

  6. A centralized feedback control model for resource management in wireless networks

    NARCIS (Netherlands)

    Yang, Y.; Haverkort, Boudewijn R.H.M.; Heijenk, Geert

    In a wireless environment, guaranteeing QoS is challenging because applications at multiple devices share the same limited radio bandwidth. In this paper we introduce and study a resource management model for centralized wireless networks, using feedback control theory. Before applying in practice,

  7. Neural network system for traffic flow management

    Science.gov (United States)

    Gilmore, John F.; Elibiary, Khalid J.; Petersson, L. E. Rickard

    1992-09-01

    Atlanta will be the home of several special events during the next five years ranging from the 1996 Olympics to the 1994 Super Bowl. When combined with the existing special events (Braves, Falcons, and Hawks games, concerts, festivals, etc.), the need to effectively manage traffic flow from surface streets to interstate highways is apparent. This paper describes a system for traffic event response and management for intelligent navigation utilizing signals (TERMINUS) developed at Georgia Tech for adaptively managing special event traffic flows in the Atlanta, Georgia area. TERMINUS (the original name given Atlanta, Georgia based upon its role as a rail line terminating center) is an intelligent surface street signal control system designed to manage traffic flow in Metro Atlanta. The system consists of three components. The first is a traffic simulation of the downtown Atlanta area around Fulton County Stadium that models the flow of traffic when a stadium event lets out. Parameters for the surrounding area include modeling for events during various times of day (such as rush hour). The second component is a computer graphics interface with the simulation that shows the traffic flows achieved based upon intelligent control system execution. The final component is the intelligent control system that manages surface street light signals based upon feedback from control sensors that dynamically adapt the intelligent controller's decision making process. The intelligent controller is a neural network model that allows TERMINUS to control the configuration of surface street signals to optimize the flow of traffic away from special events.

  8. Creating legitimacy in water governance networks through complexity sensitive management

    NARCIS (Netherlands)

    J. Edelenbos (Jurian); I.F. van Meerkerk (Ingmar); E-H. Klijn (Erik-Hans)

    2013-01-01

    markdownabstractNetwork management is of major importance for the functioning and the performance of governance networks, including their democratic legitimacy (see for example Koppenjan and Klijn, 2004; Edelenbos & Klijn, 2006; Klijn et al., 2010; Meier & O’Toole, 2001, 2007). Network management is

  9. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  10. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  11. Cooperative Radio Resource Management for Heterogeneous Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Tragos, Elias; Luo, Jijun

    2009-01-01

    that an interworking model is flexible and generic enough to include any new type of network that might be designed in the future and that will require inclusion in the heterogeneous domain. Finally, ubiquitous communication systems and the challenge to deploy them successfully bring also the problem of how to manage...... of the network’s resources. This is also the reason why researchers look for systems that are adaptive and flexible and provide coverage in various deployment modes (wide area, metropolitan area and local area). Cooperation and coexistence then extends from interworking between different PHY layer modes...

  12. Strategy development management of Multimodal Transport Network

    Directory of Open Access Journals (Sweden)

    Nesterova Natalia S.

    2016-01-01

    Full Text Available The article gives a brief overview of works on the development of transport infrastructure for multimodal transportation and integration of Russian transport system into the international transport corridors. The technology for control of the strategy, that changes shape and capacity of Multi-modal Transport Network (MTN, is considered as part of the methodology for designing and development of MTN. This technology allows to carry out strategic and operational management of the strategy implementation based on the use of the balanced scorecard.

  13. Data management of protein interaction networks

    CERN Document Server

    Cannataro, Mario

    2012-01-01

    Interactomics: a complete survey from data generation to knowledge extraction With the increasing use of high-throughput experimental assays, more and more protein interaction databases are becoming available. As a result, computational analysis of protein-to-protein interaction (PPI) data and networks, now known as interactomics, has become an essential tool to determine functionally associated proteins. From wet lab technologies to data management to knowledge extraction, this timely book guides readers through the new science of interactomics, giving them the tools needed to: Generate

  14. Critical appraisal of cardiac implantable electronic devices: complications and management

    Directory of Open Access Journals (Sweden)

    Padeletti L

    2011-09-01

    Full Text Available Luigi Padeletti1, Giosuè Mascioli2, Alessandro Paoletti Perini1, Gino Grifoni1, Laura Perrotta1, Procolo Marchese3, Luca Bontempi3, Antonio Curnis31Istituto di Clinica Medica e Cardiologia, Università degli Studi di Firenze, Italia; 2Elettrofisiologia, Istituto Humanitas Gavazzeni, Bergamo, Italia; 3Elettrofisiologia, Spedali Civili, Brescia, ItaliaAbstract: Population aging and broader indications for the implant of cardiac implantable electronic devices (CIEDs are the main reasons for the continuous increase in the use of pacemakers (PMs, implantable cardioverter-defibrillators (ICDs and devices for cardiac resynchronization therapy (CRT-P, CRT-D. The growing burden of comorbidities in CIED patients, the greater complexity of the devices, and the increased duration of procedures have led to an augmented risk of infections, which is out of proportion to the increase in implantation rate. CIED infections are an ominous condition, which often implies the necessity of hospitalization and carries an augmented risk of in-hospital death. Their clinical presentation may be either at pocket or at endocardial level, but they can also manifest themselves with lone bacteremia. The management of these infections requires the complete removal of the device and subsequent, specific, antibiotic therapy. CIED failures are monitored by competent public authorities, that require physicians to alert them to any failures, and that suggest the opportune strategies for their management. Although the replacement of all potentially affected devices is often suggested, common practice indicates the replacement of only a minority of devices, as close follow-up of the patients involved may be a safer strategy. Implantation of a PM or an ICD may cause problems in the patients' psychosocial adaptation and quality of life, and may contribute to the development of affective disorders. Clinicians are usually unaware of the psychosocial impact of implanted PMs and ICDs. The

  15. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  16. Service and device discovery of nodes in a wireless sensor network

    NARCIS (Netherlands)

    Östmark, Å.; Lindgren, P.; van Halteren, Aart; Meppelink, L.

    2006-01-01

    Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework enabling the devices to present themselves and the resources they hold. The device

  17. An Implementation of a Network Configuration Management System ...

    African Journals Online (AJOL)

    The job of the network administrator becomes difficult as the number of hosts in a computer network increase. Network management requires the network administrator to have vital configuration information about hosts so as to provide viable solutions. In situations where the hosts span a large area or in several buildings as ...

  18. Twiddlenet: Metadata Tagging and Data Dissemination in Mobile Device Networks

    Science.gov (United States)

    2007-09-01

    and video. Preference was given to devices capable of generating these types of files; currently these are primarily smartphones or PDA’s. Metadata...implemented using a variety of iPaq and other PDA’s and smartphones . The applications are written in C#, and generally designed to be run on devices...34Providing HTTP Access to Web Servers Rinning," Nokia ., Tech. Rep. NRC-TR-2006-005, 2006. 71 INITIAL DISTRIBUTION LIST 1. Defense

  19. Distributed Prognostics and Health Management with a Wireless Network Architecture

    Science.gov (United States)

    Goebel, Kai; Saha, Sankalita; Sha, Bhaskar

    2013-01-01

    A heterogeneous set of system components monitored by a varied suite of sensors and a particle-filtering (PF) framework, with the power and the flexibility to adapt to the different diagnostic and prognostic needs, has been developed. Both the diagnostic and prognostic tasks are formulated as a particle-filtering problem in order to explicitly represent and manage uncertainties in state estimation and remaining life estimation. Current state-of-the-art prognostic health management (PHM) systems are mostly centralized in nature, where all the processing is reliant on a single processor. This can lead to a loss in functionality in case of a crash of the central processor or monitor. Furthermore, with increases in the volume of sensor data as well as the complexity of algorithms, traditional centralized systems become for a number of reasons somewhat ungainly for successful deployment, and efficient distributed architectures can be more beneficial. The distributed health management architecture is comprised of a network of smart sensor devices. These devices monitor the health of various subsystems or modules. They perform diagnostics operations and trigger prognostics operations based on user-defined thresholds and rules. The sensor devices, called computing elements (CEs), consist of a sensor, or set of sensors, and a communication device (i.e., a wireless transceiver beside an embedded processing element). The CE runs in either a diagnostic or prognostic operating mode. The diagnostic mode is the default mode where a CE monitors a given subsystem or component through a low-weight diagnostic algorithm. If a CE detects a critical condition during monitoring, it raises a flag. Depending on availability of resources, a networked local cluster of CEs is formed that then carries out prognostics and fault mitigation by efficient distribution of the tasks. It should be noted that the CEs are expected not to suspend their previous tasks in the prognostic mode. When the

  20. 75 FR 14170 - Medical Device Epidemiology Network: Developing Partnership Between the Center for Devices and...

    Science.gov (United States)

    2010-03-24

    ... Between the Center for Devices and Radiological Health and Academia; Public Workshop AGENCY: Food and Drug... the Center for Devices and Radiological Health and Academia.'' The purpose of the public workshop is to facilitate discussion among FDA and academic researchers with expertise in epidemiology and health...

  1. Transformation of legacy network management system to service oriented architecture

    Science.gov (United States)

    Sathyan, Jithesh; Shenoy, Krishnananda

    2007-09-01

    Service providers today are facing the challenge of operating and maintaining multiple networks, based on multiple technologies. Network Management System (NMS) solutions are being used to manage these networks. However the NMS is tightly coupled with Element or the Core network components. Hence there are multiple NMS solutions for heterogeneous networks. Current network management solutions are targeted at a variety of independent networks. The wide spread popularity of IP Multimedia Subsystem (IMS) is a clear indication that all of these independent networks will be integrated into a single IP-based infrastructure referred to as Next Generation Networks (NGN) in the near future. The services, network architectures and traffic pattern in NGN will dramatically differ from the current networks. The heterogeneity and complexity in NGN including concepts like Fixed Mobile Convergence will bring a number of challenges to network management. The high degree of complexity accompanying the network element technology necessitates network management systems (NMS) which can utilize this technology to provide more service interfaces while hiding the inherent complexity. As operators begin to add new networks and expand existing networks to support new technologies and products, the necessity of scalable, flexible and functionally rich NMS systems arises. Another important factor influencing NMS architecture is mergers and acquisitions among the key vendors. Ease of integration is a key impediment in the traditional hierarchical NMS architecture. These requirements trigger the need for an architectural framework that will address the NGNM (Next Generation Network Management) issues seamlessly. This paper presents a unique perspective of bringing service orientated architecture (SOA) to legacy network management systems (NMS). It advocates a staged approach in transforming a legacy NMS to SOA. The architecture at each stage is detailed along with the technical advantages and

  2. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-02-07

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  3. Picture this: Managed change and resistance in business network settings

    DEFF Research Database (Denmark)

    Kragh, Hanne; Andersen, Poul Houman

    2009-01-01

    This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...

  4. Speed Adaptation in Urban Road Network Management

    Directory of Open Access Journals (Sweden)

    Raiyn Jamal

    2016-06-01

    Full Text Available Various forecasting schemes have been proposed to manage traffic data, which is collected by videos cameras, sensors, and mobile phone services. However, these are not sufficient for collecting data because of their limited coverage and high costs for installation and maintenance. To overcome the limitations of these tools, we introduce a hybrid scheme based on intelligent transportation system (ITS and global navigation satellite system (GNSS. Applying the GNSS to calculate travel time has proven efficient in terms of accuracy. In this case, GNSS data is managed to reduce traffic congestion and road accidents. This paper introduces a short-time forecasting model based on real-time travel time for urban heterogeneous road networks. Travel time forecasting has been achieved by predicting travel speeds using an optimized exponential moving Average (EMA model. Furthermore for speed adaptation in heterogeneous road networks, it is necessary to introduce asuitable control strategy for longitude, based on the GNSS. GNSS products provide worldwide and real-time services using precise timing information and, positioning technologies.

  5. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers

    OpenAIRE

    Tesfaye, Mussie

    2012-01-01

    This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. Today supervisory control and data acquisition systems utilizing network connected programmable logic controllers are widely used in many industries and critical infrastructures. These n...

  6. J2EE-based integrated telecom network management

    Science.gov (United States)

    Xia, Zhongwu; Wei, Guo

    2004-04-01

    The paper will present a J2EE-based architecture of integrated telecom network management system, and also will introduce the MVC(Model, View and Control) design pattern in the architecture. Using J2EE and MVC design pattern, we can easily build multiple user interfaces (included Web-based), flexible, manageable, and extensible network management system.

  7. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  8. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  9. Research on University Network Teaching Platform (Blackboard in Teaching Management

    Directory of Open Access Journals (Sweden)

    Gou Zhao Xia

    2016-01-01

    Full Text Available With rapid development of online education; teaching platform based on the network, as a new instructional mode has become a hot topic in online teaching. In this paper, the he teaching situation and existing problems on online was analyzed by comparing the difference between network teaching platform and traditional classroom teaching. Then the strategies of network teaching management and the case, which is focusing on the characteristics of Blackboard with the application of network teaching management was presents.

  10. Management of seismic data on network

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Bu Heung [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    KIGAM has managed magnetic tapes written in seismic data acquired in Korea offshore and abroad since 1979. For now, it amounts about 13,000 tapes and other documents of seismic data are reserved by KIGAM also. For handling with them, FOX-PRO database management system has been used since 1993. In case of one user, it seems useful and convenient because the program is very easy to use and many well done utility was provided. In contrast with that, it has many problems also. For example, a user who wants to query information of these magnetic tapes must go magnetic tape room where the system is installed and he must know how to use the utilities of the FOX-PRO database management system. For the reason of above, the seismic data processing team attempted to change the FOX-PRO system with other client-server system supports networking on internet. After many testing and considering, they selected like as following hardware and software( System: PC with networking, OS: Linux and Unix, Software: Just Logic/SQL). The main reasons for selecting above system, first, any kinds of personal computer are available and easy to get. Secondly, Linux and Unix OS are good for using network. Especially, Linux is free and easy to get on many internet ftp sites. Lastly Just Logic/SQL is for client-server system, supports Linux OS and the programming style is very similar to C language. The contents of this report are as follows. In chapter 2, the Just Logic/SQL system structure and existing files through the sub-directories are showed and commented. In chapter 3, the statements using in Just Logic/SQL are explained and some examples are showed. In chapter 4, shows two example programs making seismic database including rack list, optical disk table respectively. The rack list table is the database of magnetic tapes managed by KIGAM. The optical disk table is the information record about how many, what tapes are converted to optical disk. (author). 4 tabs.

  11. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  12. PIYAS-Proceeding to Intelligent Service Oriented Memory Allocation for Flash Based Data Centric Sensor Devices in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanam Shahla Rizvi

    2009-12-01

    Full Text Available Flash memory has become a more widespread storage medium for modern wireless devices because of its effective characteristics like non-volatility, small size, light weight, fast access speed, shock resistance, high reliability and low power consumption. Sensor nodes are highly resource constrained in terms of limited processing speed, runtime memory, persistent storage, communication bandwidth and finite energy. Therefore, for wireless sensor networks supporting sense, store, merge and send schemes, an efficient and reliable file system is highly required with consideration of sensor node constraints. In this paper, we propose a novel log structured external NAND flash memory based file system, called Proceeding to Intelligent service oriented memorY Allocation for flash based data centric Sensor devices in wireless sensor networks (PIYAS. This is the extended version of our previously proposed PIYA [1]. The main goals of the PIYAS scheme are to achieve instant mounting and reduced SRAM space by keeping memory mapping information to a very low size of and to provide high query response throughput by allocation of memory to the sensor data by network business rules. The scheme intelligently samples and stores the raw data and provides high in-network data availability by keeping the aggregate data for a longer period of time than any other scheme has done before. We propose effective garbage collection and wear-leveling schemes as well. The experimental results show that PIYAS is an optimized memory management scheme allowing high performance for wireless sensor networks.

  13. Regenerable Photovoltaic Devices with a Hydrogel-Embedded Microvascular Network

    Science.gov (United States)

    Koo, Hyung-Jun; Velev, Orlin D.

    2013-01-01

    Light-driven degradation of photoactive molecules could be one of the major obstacles to stable long term operation of organic dye-based solar light harvesting devices. One solution to this problem may be mimicking the regeneration functionality of a plant leaf. We report an organic dye photovoltaic system that has been endowed with such microfluidic regeneration functionality. A hydrogel medium with embedded channels allows rapid and uniform supply of photoactive reagents by a convection-diffusion mechanism. A washing-activation cycle enables reliable replacement of the organic component in a dye-sensitized photovoltaic system. Repetitive restoration of photovoltaic performance after intensive device degradation is demonstrated. PMID:23912814

  14. Social Networks and Welfare in Future Animal Management.

    Science.gov (United States)

    Koene, Paul; Ipema, Bert

    2014-03-17

    It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal species. Social Network Analysis (SNA) facilitates the characterization of social networking at group, subgroup and individual levels. SNA is currently used for modeling the social behavior and management of wild animals and social welfare of zoo animals. It has been recognized for use with farm animals but has yet to be applied for management purposes. Currently, the main focus is on cattle, because in large groups (poultry), recording of individuals is expensive and the existence of social networks is uncertain due to on-farm restrictions. However, in many cases, a stable social network might be important to individual animal fitness, survival and welfare. For instance, when laying hens are not too densely housed, simple networks may be established. We describe here small social networks in horses, brown bears, laying hens and veal calves to illustrate the importance of measuring social networks among animals managed by humans. Emphasis is placed on the automatic measurement of identity, location, nearest neighbors and nearest neighbor distance for management purposes. It is concluded that social networks are important to the welfare of human-managed animal species and that welfare management based on automatic recordings will become available in the near future.

  15. Semantic Parameters to Manage an Innovation Network Using Managing as Designing Approach: The Virtual Innovation Society Network Case

    Directory of Open Access Journals (Sweden)

    Cristiane Chaves Gattaz

    2014-06-01

    Full Text Available The most recent operations and management frameworks in innovation have not been complete to explicit required knowledge to manage the cooperation of its networked open innovation value chain in the knowledge economy and open enterprise. Strategic actors from the Virtual Innovation Society network were interviewed to identify critical semantic parameters that address this issue. As a result, this study suggests the characterization of inter-dependent added-values and its performance metrics, under the “managing as designing” approach, as input for managing the externalities, the integration of the articulation between business operations, strategy and information technology, and waste of innovation. In this context, the identification of the main managerial indicators for future command and control of existing innovation network operations under the “managing as designing” approach becomes a new challenge for future research.   Keywords: Managing as Designing; Innovation Management; Network Managament; Operations Management; Virtual Networks.

  16. Security Frameworks for Machine-to-Machine Devices and Networks

    Science.gov (United States)

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  17. QoS and energy management in cognitive radio network case study approach

    CERN Document Server

    Mishra, Vishram; Lau, Chiew-Tong

    2017-01-01

    This book covers the important aspects involved in making cognitive radio devices portable, mobile and green, while also extending their service life. At the same time, it presents a variety of established theories and practices concerning cognitive radio from academia and industry. Cognitive radio can be utilized as a backbone communication medium for wireless devices. To effectively achieve its commercial application, various aspects of quality of service and energy management need to be addressed. The topics covered in the book include energy management and quality of service provisioning at Layer 2 of the protocol stack from the perspectives of medium access control, spectrum selection, and self-coexistence for cognitive radio networks.

  18. Collaborative Manufacturing Management in Networked Supply Chains

    Science.gov (United States)

    Pouly, Michel; Naciri, Souleiman; Berthold, Sébastien

    ERP systems provide information management and analysis to industrial companies and support their planning activities. They are currently mostly based on theoretical values (averages) of parameters and not on the actual, real shop floor data, leading to disturbance of the planning algorithms. On the other hand, sharing data between manufacturers, suppliers and customers becomes very important to ensure reactivity towards markets variability. This paper proposes software solutions to address these requirements and methods to automatically capture the necessary corresponding shop floor information. In order to share data produced by different legacy systems along the collaborative networked supply chain, we propose to use the Generic Product Model developed by Hitachi to extract, translate and store heterogeneous ERP data.

  19. Nanomaterials for LightManagement in Electro-Optical Devices

    Energy Technology Data Exchange (ETDEWEB)

    Truong, Vo-Van [Concordia University, Montréal, Québec, H4B 1R6, Canada; Singh, Jai [Charles Darwin University, Darwin, Australia; Tanemura, Sakae [Japan Fine Ceramics Center, Nagoya, Japan; Hu, Michael Z. [ORNL

    2012-01-01

    In the past decade, nanostructured materials and nanoparticles have emerged as the necessary ingredients for electrooptical applications and enhancement of device performance, in particular by making use of the light management aspects of the nanomaterials. The application areas that are being transformed profoundly include smart coating devices (e.g., electrochromic, photochromic, and thermochromic devices), solar energy, and sensing. Despite the large volume of work in the past on smart coating devices, and in particular on electrochromic devices and thermochromic fenestrations, for optical transmission or reflection control, applications remain limited because of slow response time and nonuniformity in the case of large surfaces. Recent works in the field indicate that nanostructured electrochromic coatings would be an integral part of the solution to the above problem. One aspect that can thus be focused on would be the fabrication and characterization of the nanostructured smart coating materials and their compatibility with other layers in the overall smart coating device. In the area of solar photovoltaics, nanomaterials have been used in designing light-trapping schemes for inorganic as well as organic solar cells. One particular category of solar cells that has attracted much interest is the plasmonic solar cells in which metallic nanoparticles are incorporated, helping in enhancing their energy conversion efficiency. Nanostructured solar cells would eventually develop into a 'game changing' technology for making solar cells that are affordable and highly efficient, providing a sizeable alternative energy source for our ever-increasing energy needs. Sensors based on the optical properties of constituting nanostructures and nanoparticles also form a most interesting class of bio- and electrochemical sensing devices. The possibility of synthetizing nanoparticles and structures of specifically desired sizes and shapes has indeed opened a whole new

  20. Wireless Charger Networking for Mobile Devices: Fundamentals, Standards, and Applications

    OpenAIRE

    Lu, Xiao; Niyato, Dusit; Wang, Ping; Kim, Dong In; Han, Zhu

    2014-01-01

    Wireless charging is a technique of transmitting power through an air gap to an electrical device for the purpose of energy replenishment. Recently, the wireless charging technology has been significantly advanced in terms of efficiency and functionality. This article first presents an overview and fundamentals of wireless charging. We then provide the review of standards, i.e., Qi and Alliance for Wireless Power (A4WP), and highlight on their communication protocols. Next, we propose a novel...

  1. A Categorized Resource Sharing Mechanism for Device-to-Device Communications in Cellular Networks

    OpenAIRE

    Jie Chen; Chang Liu; Husheng Li; Xulong Li; Shaoqian Li

    2016-01-01

    Device-to-Device (D2D) communications are considered one of the key technologies for 5G wireless communication systems. In this paper, a resource sharing mechanism, which applies different policies for different cases (thus being categorized), is proposed. In this scheme, all D2D pairs are divided into three groups by comparing the minimum transmit power with the maximum transmit power of each cellular UE. The proposed mechanism enables multiple D2D pairs in the second group to share the reso...

  2. Management of the Space Physics Analysis Network (SPAN)

    Science.gov (United States)

    Green, James L.; Thomas, Valerie L.; Butler, Todd F.; Peters, David J.; Sisson, Patricia L.

    1990-01-01

    Here, the purpose is to define the operational management structure and to delineate the responsibilities of key Space Physics Analysis Network (SPAN) individuals. The management structure must take into account the large NASA and ESA science research community by giving them a major voice in the operation of the system. Appropriate NASA and ESA interfaces must be provided so that there will be adequate communications facilities available when needed. Responsibilities are delineated for the Advisory Committee, the Steering Committee, the Project Scientist, the Project Manager, the SPAN Security Manager, the Internetwork Manager, the Network Operations Manager, the Remote Site Manager, and others.

  3. Network configuration management : paving the way to network agility.

    Energy Technology Data Exchange (ETDEWEB)

    Maestas, Joseph H.

    2007-08-01

    Sandia networks consist of nearly nine hundred routers and switches and nearly one million lines of command code, and each line ideally contributes to the capabilities of the network to convey information from one location to another. Sandia's Cyber Infrastructure Development and Deployment organizations recognize that it is therefore essential to standardize network configurations and enforce conformance to industry best business practices and documented internal configuration standards to provide a network that is agile, adaptable, and highly available. This is especially important in times of constrained budgets as members of the workforce are called upon to improve efficiency, effectiveness, and customer focus. Best business practices recommend using the standardized configurations in the enforcement process so that when root cause analysis results in recommended configuration changes, subsequent configuration auditing will improve compliance to the standard. Ultimately, this minimizes mean time to repair, maintains the network security posture, improves network availability, and enables efficient transition to new technologies. Network standardization brings improved network agility, which in turn enables enterprise agility, because the network touches all facets of corporate business. Improved network agility improves the business enterprise as a whole.

  4. Modeling management of research and education networks

    NARCIS (Netherlands)

    Galagan, D.V.

    2004-01-01

    Computer networks and their services have become an essential part of research and education. Nowadays every modern R&E institution must have a computer network and provide network services to its students and staff. In addition to its internal computer network, every R&E institution must have a

  5. Social Networks and Welfare in Future Animal Management

    NARCIS (Netherlands)

    Koene, P.; Ipema, A.H.

    2014-01-01

    It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal

  6. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of

  7. Survey-Based Measurement of Public Management and Policy Networks

    Science.gov (United States)

    Henry, Adam Douglas; Lubell, Mark; McCoy, Michael

    2012-01-01

    Networks have become a central concept in the policy and public management literature; however, theoretical development is hindered by a lack of attention to the empirical properties of network measurement methods. This paper compares three survey-based methods for measuring organizational networks: the roster, the free-recall name generator, and…

  8. 75 FR 391 - Medical Device Quality System Regulation Educational Forum on Risk Management Through the Product...

    Science.gov (United States)

    2010-01-05

    ... No. FDA-2009-N-0664] Medical Device Quality System Regulation Educational Forum on Risk Management... workshop is intended to provide information about FDA's Medical Device Quality Systems Regulation (QSR) to... Device Industry Coalition (FMDIC), is announcing a public workshop entitled ``Medical Device Quality...

  9. Managing computer networks using peer-to-peer technologies

    OpenAIRE

    Granville, Lisandro Zambenedetti; Rosa, Diego Moreira da; Panisson, André; Melchiors, Cristina; Almeida, Maria Janilce Bosquiroli; Tarouco,Liane Margarida Rockenbach

    2005-01-01

    Peer-to-peer systems and network management are usually related to each other because the traffic loads of P2P systems have to be controlled to avoid regular network services becoming unavailable due to network congestion. In this context, from a network operation point of view, P2P systems often mean problems. In this article we take a different perspective and look at P2P technologies as an alternative to improve current network management solutions. We introduce an approach where P2P netwo...

  10. Mobile Device Management horizons for CERN Managed iOS and Mac Self-Service

    CERN Multimedia

    CERN. Geneva; MUSZKOWSKI, Maciek; BIPPUS, Vincent Nicolas

    2015-01-01

    Overview of the MDM (Mobile Device Mamagement) market in the context of the CERN needs and a discussion of technical capabilities of a range of MDM products, followed by a presentation of two new functionalities implemented using an MDM: Self-service Kiosk for Mac and delegated-management solution for professional tablets.

  11. Maintenance Management in Network Utilities Framework and Practical Implementation

    CERN Document Server

    Gómez Fernández, Juan F

    2012-01-01

    In order to satisfy the needs of their customers, network utilities require specially developed maintenance management capabilities. Maintenance Management information systems are essential to ensure control, gain knowledge and improve-decision making in companies dealing with network infrastructure, such as distribution of gas, water, electricity and telecommunications. Maintenance Management in Network Utilities studies specified characteristics of maintenance management in this sector to offer a practical approach to defining and implementing  the best management practices and suitable frameworks.   Divided into three major sections, Maintenance Management in Network Utilities defines a series of stages which can be followed to manage maintenance frameworks properly. Different case studies provide detailed descriptions which illustrate the experience in real company situations. An introduction to the concepts is followed by main sections including: • A Literature Review: covering the basic concepts an...

  12. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  13. Public Management and Educational Performance: The Impact of Managerial Networking.

    Science.gov (United States)

    Meier, Kenneth J.; O'Toole, Laurence J., Jr.

    2003-01-01

    A 5-year performance analysis of managers in more than 500 school districts used a nonlinear, interactive, contingent model of management. Empirical support was found for key elements of the network-management portion of the model. Results showed that public management matters in policy implementation, but its impact is often nonlinear. (Contains…

  14. Self-management of Hybrid Networks: Introduction, Pros and Cons

    NARCIS (Netherlands)

    Fioreze, Tiago; Pras, Aiko; Lehnert, Ralf

    In the last decade ‘self-management’ has become a popular research theme within the networking community. While reading papers, one could get the impression that self-management is the obvious solution to solve many of the current network management problems. There are hardly any publications,

  15. Relationship Management in International Strategic Alliances and networks

    DEFF Research Database (Denmark)

    Andersen, Poul

    2011-01-01

    This chapter discusses relationship management in international strategic alliances and networks, building on and synthesizing parts of the relationship management literature. The chapter provides a model linking three generic relationship management tasks with three levels of management......, identifying nine focus areas for relationship management efforts. Rather than distinguishing between the management of external and internal resources, the integration of external and internal resources is the focus, meaning that all managerial tasks have both internal and external consequences...

  16. Practical RSA-PAKE for Low-Power Device in Imbalanced Wireless Networks

    OpenAIRE

    Taek-Young Youn; Sewon Lee; Seok Hie Hong; Young-Ho Park

    2014-01-01

    For enhancing the security of ubiquitous communication, we have to consider three keywords: mobility, wireless, and low computing capability. In this paper, we study one of suitable security protocols for the ubiquitous communication environment. We discuss RSA-based password-authenticated key exchange (RSA-PAKE) protocols for imbalanced wireless networks where a party uses a low-power device to communicate with another party equipped with a powerful computing device. For imbalanced wireless ...

  17. Energy Monitoring and Management Mechanism for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Papadakis Andreas

    2016-01-01

    Full Text Available In this work we discuss a mechanism for the monitoring and management of energy consumption in Wireless Sensor Networks. We consider that the Wireless Sensor Network consists of nodes that operate individually and collaborate with each other. After briefly discussing the typical network topologies and associating with the expected communications needs, we describe a conceptual framework for monitoring and managing the energy consumption on per process basis.

  18. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  19. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  20. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    KAUST Repository

    Elrasad, Amr Elsayed M.

    2016-05-15

    The increasing bandwidth demands in access networks motivates network operators, networking devices manufacturers, and standardization institutions to search for new approaches for access networks. These approaches should support higher bandwidth, longer distance between end user and network operator, and less energy consumption. Ethernet Passive Optical Network (EPON) is a favorable choice for broadband access networks. EPONs support transmission rates up to 10 Gbps. EPONs also support distance between end users and central office up to 20 Km. Moreover, optical networks have the least energy consumption among all types of networks. In this dissertation, we focus on reducing delay and saving energy in EPONs. Reducing delay is essential for delay-sensitive traffic, while minimizing energy consumption is an environmental necessity and also reduces the network operating costs. We identify five challenges, namely excess bandwidth allocation, frame delineation, congestion resolution, large round trip time delay in long-reach EPONs (LR-EPONs), and energy saving. We provide a Dynamic Bandwidth Allocation (DBA) approach for each challenge. We also propose a novel scheme that combines the features of the proposed approaches in one highly performing scheme. Our approach is to design novel DBA protocols that can further reduce the delay and be simultaneously simple and fair. We also present a dynamic bandwidth allocation scheme for Green EPONs taking into consideration maximizing energy saving under target delay constraints. Regarding excess bandwidth allocation, we develop an effective DBA scheme called Delayed Excess Scheduling (DES). DES achieves significant delay and jitter reduction and is more suitable for industrial deployment due to its simplicity. Utilizing DES in hybrid TDM/WDM EPONs (TWDM-EPONs) is also investigated. We also study eliminating the wasted bandwidth due to frame delineation. We develop an interactive DBA scheme, Efficient Grant Sizing Interleaved

  1. Software to manage transformers using intelligent electronic device

    Directory of Open Access Journals (Sweden)

    Marcio Zamboti Fortes

    2016-04-01

    Full Text Available Power companies usually answer the increase in power demand by building new generation facilities. Nevertheless, an efficient use of energy could reduce and delay the costs of investment in new power plants. This paper shows a software system to manage transformers and evaluate losses when they work with zero loads. This system contributes to reduce the waste of energy with some simple actions such as shutting off an unused transformer or reconnecting disabled equipment based on the customer’s demand. It uses real time measurements collected from Intelligent Electronic Devices as a base for software decisions. It also measures and reports the total power saving.

  2. Monitoring and Transmission via Wireless Network for an Assistive Device.

    Science.gov (United States)

    Chang, Yi-Chu; Chen, Chiun-Fan; Lin, Hua-Sheng; Chong, Fok-Ching; Luh, Jer-Junn; Lai, Jin-Shin

    2005-01-01

    Owing to the increasing number of disabled individuals, technical aids are acting more aggressively in the era of modern medicine. The M3S (Multiple Master Multiple Slave) system developed for the physically challenged, utilizes intelligent transmission and integration mechanisms to arrange all hooked-up devices with proper control. To overcome certain limitations of the system (e.g. distance), an RF (Radio Frequency) wireless module would be in charge of the wireless communication between a remote bus and a local bus. It is demonstrated here as assistance for parking assistive vehicles (e.g. powered wheelchair) located in a remote region, which also includes monitoring and usage of accessorial data transmissions shown in our man-machine interface.

  3. Software For Management Of A Packet-Radio Network

    Science.gov (United States)

    Smyth, Patrick J.; Chauvin, Todd H.; Oliver, Gordon P.; Statman, Joseph I.

    1994-01-01

    Network-management software assists in planning, monitoring, and controlling resources of Datalink network. Packet-message network featuring time-division multiple access, frequency and spatial diversity, and dynamic tree-structured routing scheme. Developed for communication between central control station on ground and instrumented aircraft flying over test range. Aircraft derives navigational data from satellites of Global Positioning System, and primary function of Datalink network feeding GPS position data from participating aircraft into control center in real time.

  4. Redirecting a client device from a first gateway to a second gateway for accessing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Norp, A.H.J.

    2014-01-01

    The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway

  5. [The management of implantable medical device and the application of the internet of things in hospitals].

    Science.gov (United States)

    Zhou, Li; Xu, Liang

    2011-11-01

    Implantable medical device is a special product which belongs to medical devices. It not only possesses product characteristics in common, but also has specificity for safety and effectiveness. Implantable medical device must be managed by the relevant laws and regulations of the State Food and Drug Administration. In this paper, we have used cardiac pacemakers as an example to describe the significance of the management of implantable medical device products and the application of the internet of things in hospitals.

  6. Ensuring Patient Safety by using Colored Petri Net Simulation in the Design of Heterogeneous, Multi-Vendor, Integrated, Life-Critical Wireless (802.x) Patient Care Device Networks.

    Science.gov (United States)

    Sloane, Elliot; Gehlot, Vijay

    2005-01-01

    Hospitals and manufacturers are designing and deploying the IEEE 802.x wireless technologies in medical devices to promote patient mobility and flexible facility use. There is little information, however, on the reliability or ultimate safety of connecting multiple wireless life-critical medical devices from multiple vendors using commercial 802.11a, 802.11b, 802.11g or pre-802.11n devices. It is believed that 802.11-type devices can introduce unintended life-threatening risks unless delivery of critical patient alarms to central monitoring systems and/or clinical personnel is assured by proper use of 802.11e Quality of Service (QoS) methods. Petri net tools can be used to simulate all possible states and transitions between devices and/or systems in a wireless device network, and can identify failure modes in advance. Colored Petri Net (CPN) tools are ideal, in fact, as they allow tracking and controlling each message in a network based on pre-selected criteria. This paper describes a research project using CPN to simulate and validate alarm integrity in a small multi-modality wireless patient monitoring system. A 20-monitor wireless patient monitoring network is created in two versions: one with non-prioritized 802.x CSM protocols and the second with simulated Quality of Service (QoS) capabilities similar to 802.11e (i.e., the second network allows message priority management.) In the standard 802.x network, dangerous heart arrhythmia and pulse oximetry alarms could not be reliably and rapidly communicated, but the second network's QoS priority management reduced that risk significantly.

  7. Combined Resource Allocation System for Device-to-Device Communication towards LTE Networks

    Directory of Open Access Journals (Sweden)

    Abbas Fakhar

    2016-01-01

    Full Text Available The LTE networks are being developed to grant mobile broadband services in the fourth generation (4G systems and allow operators to use spectrum more efficiently.D2D communication is a promising technique to provide wireless services and enhance spectrum exploitation in the LTE Heterogeneous Networks (HetNets.D2D communication in HetNets allows users to communicate with each other directly by reusing the resources when communicating via the base stations. But during the downlink period, both the D2D receiver and the Heterogeneous Users equipment’s (HUE experience interference caused by resource allocation. In this article, we identify and analyze the interference problem of HetNets caused by D2D transmitter during download. We propose a combined resource allocation and resource reuse method for LTE HetNets, where resource allocation to HUEs is employed on the basis of comparative fair algorithm and resource reuse to D2D users is employed on acquisitive empirical algorithm. This approach evaluates whether D2D mode is suitable or not by path loss evaluation, after that decreases the interference to HUE by selection of the minimum channel gain between HUE and D2D transmitter each time to mitigate interference. Our simulation results show that the efficiency and throughput of HetNets is improved by using the proposed method.

  8. Photon management of GaN-based optoelectronic devices via nanoscaled phenomena

    KAUST Repository

    Tsai, Yu-Lin

    2016-09-06

    Photon management is essential in improving the performances of optoelectronic devices including light emitting diodes, solar cells and photo detectors. Beyond the advances in material growth and device structure design, photon management via nanoscaled phenomena have also been demonstrated as a promising way for further modifying/improving the device performance. The accomplishments achieved by photon management via nanoscaled phenomena include strain-induced polarization field management, crystal quality improvement, light extraction/harvesting enhancement, radiation pattern control, and spectrum management. In this review, we summarize recent development, challenges and underlying physics of photon management in GaN-based light emitting diodes and solar cells. (C) 2016 Elsevier Ltd. All rights reserved.

  9. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  10. The Dynamics of network and dyad level supply management

    DEFF Research Database (Denmark)

    Ellegaard, Chris

    Various academic disciplines have treated the task of managing supply in the industrial company. These disciplines have focussed on various (inter-)organisational levels, e.g. the dyadic relation, the supply chain or the network. The present article argues that supply managers must manage both...... the dyadic supplier relations and the overall supply network of the company. By applying data from a longitudinal case study, this two-sided management task is investigated from a dynamic perspective. Three episodes from the case study, which describes the 14-year development of an industrial buyer......-supplier relation and its immediate network context, are presented. In analysing the data, the dynamic interdependency between management of one level and management of the other, will be demonstrated. The analysis reveals a need for an alternating approach to supply management, which takes the dynamic complexity...

  11. Remote management of heart failure using implantable electronic devices.

    Science.gov (United States)

    Morgan, John M; Kitt, Sue; Gill, Jas; McComb, Janet M; Ng, Ghulam Andre; Raftery, James; Roderick, Paul; Seed, Alison; Williams, Simon G; Witte, Klaus K; Wright, David Jay; Harris, Scott; Cowie, Martin R

    2017-08-07

    Remote management of heart failure using implantable electronic devices (REM-HF) aimed to assess the clinical and cost-effectiveness of remote monitoring (RM) of heart failure in patients with cardiac implanted electronic devices (CIEDs). Between 29 September 2011 and 31 March 2014, we randomly assigned 1650 patients with heart failure and a CIED to active RM or usual care (UC). The active RM pathway included formalized remote follow-up protocols, and UC was standard practice in nine recruiting centres in England. The primary endpoint in the time to event analysis was the 1st event of death from any cause or unplanned hospitalization for cardiovascular reasons. Secondary endpoints included death from any cause, death from cardiovascular reasons, death from cardiovascular reasons and unplanned cardiovascular hospitalization, unplanned cardiovascular hospitalization, and unplanned hospitalization. REM-HF is registered with ISRCTN (96536028). The mean age of the population was 70 years (range 23-98); 86% were male. Patients were followed for a median of 2.8 years (range 0-4.3 years) completing on 31 January 2016. Patient adherence was high with a drop out of 4.3% over the course of the study. The incidence of the primary endpoint did not differ significantly between active RM and UC groups, which occurred in 42.4 and 40.8% of patients, respectively [hazard ratio 1.01; 95% confidence interval (CI) 0.87-1.18; P = 0.87]. There were no significant differences between the two groups with respect to any of the secondary endpoints or the time to the primary endpoint components. Among patients with heart failure and a CIED, RM using weekly downloads and a formalized follow up approach does not improve outcomes.

  12. Modular Middleware for Gestural Data and Devices Management

    National Research Council Canada - National Science Library

    Fabrizio Milazzo; Vito Gentile; Giuseppe Vitello; Antonio Gentile; Salvatore Sorce

    2017-01-01

    .... The growing diffusion of low-cost acquisition devices has thus led to the development of a class of middleware aimed at ensuring a fast and easy integration of such devices within the actual HCI applications...

  13. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  14. Security Enhanced Multi-Domain Network Management for Joint Warrior Interoperability Demonstration (JWID)

    National Research Council Canada - National Science Library

    Marcinkowski, James; Miller, Roger

    2005-01-01

    .... To assist administrative personnel in maintaining and monitoring a computer network, commercial network management tools are used that collect data regarding network functionality and availability...

  15. Narrating Networks : Exploring the affordances of networks as storytelling devices in journalism

    NARCIS (Netherlands)

    Bounegru, Liliana; Venturini, Tommaso; Gray, Jonathan; Jacomy, Mathieu

    2017-01-01

    Networks have become the de facto diagram of the Big Data age (try searching Google Images for [big data AND visualisation] and see). The concept of networks has become central to many fields of human inquiry and is said to revolutionise everything from medicine to markets to military intelligence.

  16. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  17. Professional development and human resources management in networks

    Directory of Open Access Journals (Sweden)

    Evgeniy Rudnev

    2016-05-01

    Full Text Available Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future.

  18. MANAGING GLOBAL OPERATIONS NETWORKS IN MOTION

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Sørensen, Brian Vejrum

    2008-01-01

    in corporate strategic repositioning, re-configurations of sites, and changes to the underlying capabilities. The paper is based on cases of 3 Danish companies and their global supply networks. These networks are not in a steady state, they evolve as a consequence of the ongoing co-evolution between the focal...... organisation and network partners as well as various contexts that surround them. This paper addresses this ongoing co-evolution and finds a number of common patterns: strategic re-focusing of the focal organisation downstream; changing roles of individual sites within the supply network; and shifting...... capabilities and intensified need for transfer, assimilation and augmentation of activities and know-how within the network. Based on these the paper highlights some organisational effects and managerial challenges the companies face regarding rapid changes in their networks configurations and capabilities....

  19. ECO INVESTMENT PROJECT MANAGEMENT THROUGH TIME APPLYING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Tamara Gvozdenović

    2007-06-01

    Full Text Available he concept of project management expresses an indispensable approach to investment projects. Time is often the most important factor in these projects. The artificial neural network is the paradigm of data processing, which is inspired by the one used by the biological brain, and it is used in numerous, different fields, among which is the project management. This research is oriented to application of artificial neural networks in managing time of investment project. The artificial neural networks are used to define the optimistic, the most probable and the pessimistic time in PERT method. The program package Matlab: Neural Network Toolbox is used in data simulation. The feed-forward back propagation network is chosen.

  20. Light Management in Optoelectronic Devices with Disordered and Chaotic Structures

    KAUST Repository

    Khan, Yasser

    2012-07-01

    With experimental realization, energy harvesting capabilities of chaotic microstructures were explored. Incident photons falling into chaotic trajectories resulted in energy buildup for certain frequencies. As a consequence, many fold enhancement in light trapping was observed. These ellipsoid like chaotic microstructures demonstrated 25% enhancement in light trapping at 450nm excitation and 15% enhancement at 550nm excitation. Optimization of these structures can drive novel chaos-assisted energy harvesting systems. In subsequent sections of the thesis, prospect of broadband light extraction from white light emitting diodes were investigated, which is an unchallenged but quintessential problem in solid-state lighting. Size dependent scattering allows microstructures to interact strongly with narrow-band light. If disorder is introduced in spread and sizes of microstructures, broadband light extraction is possible. A novel scheme with Voronoi tessellation to quantify disorder in physical systems was also introduced, and a link between voronoi disorder and state disorder of statistical mechanics was established. Overall, in this thesis some nascent concepts regarding disorder and chaos were investigated to efficiently manage electromagnetic waves in optoelectronic devices.

  1. Analysis of the Functionality of Refillable Propellant Management Devices (PMD)

    Science.gov (United States)

    Winkelmann, Yvonne; Gaulke, Diana; Dreyer, Michael E.

    In order to restart a stage of a spacecraft it is necessary to position the liquid stable over the tank outlet. The gas-or vapor-free provision of the thrusters for the main engine start-up can be accomplished by the use of propellant management devices (PMDs). A propellant refillable reservoir (PRR) will supply the engine with the required amount of liquid propellant until the liquid outside the PRR has settled at the bottom of the tank. Hence, the reservoir will be refilled and the main engine can be restarted. This technique has been applied in case of storable propellants yet, e.g. in satellites or ATVs. For the application in a cryogenic upper stage demonstration and validation tests are still necessary. Ground experiments to simulate propulsed phases are evaluated. To demonstrate the functionality under propulsed conditions first filling, draining and draining with a constant fill level of the tank (refilling) are analyzed. Different inflows with respect to filling and varied outflow rates for the draining tests are investigated. Pressure losses in the LOX-PMD are measured during draining and compared to a previously accomplished estimation with an one-dimensional streamtube theory.

  2. Response of asymmetric carbon nanotube network devices to sub-terahertz and terahertz radiation

    Energy Technology Data Exchange (ETDEWEB)

    Gayduchenko, I., E-mail: igorandg@gmail.com, E-mail: gefedorov@mail.ru [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); National Research Centre “Kurchatov Institute,” Moscow 123128 (Russian Federation); Kardakova, A.; Voronov, B.; Finkel, M. [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Fedorov, G., E-mail: igorandg@gmail.com, E-mail: gefedorov@mail.ru [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Moscow Institute of Physics and Technology (State University), Dolgoprudny 141700 (Russian Federation); Jiménez, D. [Departament d' Enginyeria Electrònica, Escola d' Enginyeria, Universitat Autònoma de Barcelona, 08193 Bellaterra (Spain); Morozov, S. [Moscow Institute of Physics and Technology (State University), Dolgoprudny 141700 (Russian Federation); Presniakov, M. [National Research Centre “Kurchatov Institute,” Moscow 123128 (Russian Federation); Goltsman, G. [Physics Department, Moscow State Pedagogical University, Moscow 119991 (Russian Federation); Moscow Institute of Electronics and Mathematics, National Research University Higher School of Economics, Moscow 109028 (Russian Federation)

    2015-11-21

    Demand for efficient terahertz radiation detectors resulted in intensive study of the asymmetric carbon nanostructures as a possible solution for that problem. It was maintained that photothermoelectric effect under certain conditions results in strong response of such devices to terahertz radiation even at room temperature. In this work, we investigate different mechanisms underlying the response of asymmetric carbon nanotube (CNT) based devices to sub-terahertz and terahertz radiation. Our structures are formed with CNT networks instead of individual CNTs so that effects probed are more generic and not caused by peculiarities of an individual nanoscale object. We conclude that the DC voltage response observed in our structures is not only thermal in origin. So called diode-type response caused by asymmetry of the device IV characteristic turns out to be dominant at room temperature. Quantitative analysis provides further routes for the optimization of the device configuration, which may result in appearance of novel terahertz radiation detectors.

  3. Management and Fragmentation of a Network Program

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg

    This paper contains an analysis of the role of identity in interorganizational collaboration. The case is a network program that involved three parties: eight companies, one consulting institution and a research institution. The purpose of the network program was to develop and test concepts...

  4. Using Automated Learning Devices for Monkeys (ALDM) to study social networks.

    Science.gov (United States)

    Claidière, Nicolas; Gullstrand, Julie; Latouche, Aurélien; Fagot, Joël

    2017-02-01

    Social network analysis has become a prominent tool to study animal social life, and there is an increasing need to develop new systems to collect social information automatically, systematically, and reliably. Here we explore the use of a freely accessible Automated Learning Device for Monkeys (ALDM) to collect such social information on a group of 22 captive baboons (Papio papio). We compared the social network obtained from the co-presence of the baboons in ten ALDM testing booths to the social network obtained through standard behavioral observation techniques. The results show that the co-presence network accurately reflects the social organization of the group, and also indicate under which conditions the co-presence network is most informative. In particular, the best correlation between the two networks was obtained with a minimum of 40 days of computer records and for individuals with at least 500 records per day. We also show through random permutation tests that the observed correlations go beyond what would be observed by simple synchronous activity, to reflect a preferential choice of closely located testing booths. The use of automatized cognitive testing therefore presents a new way of obtaining a large and regular amount of social information that is necessary to develop social network analysis. It also opens the possibility of studying dynamic changes in network structure with time and in relation to the cognitive performance of individuals.

  5. Managing Virtual Networks on Large-Scale Projects

    National Research Council Canada - National Science Library

    Noll, David

    2006-01-01

    The complexity of Boeing's 787 Program is too great for the formal planned information and communication network structure to fully meet the needs of companies, managers, and employees located throughout the world...

  6. Device-Relaying in Cellular D2D Networks: A Fairness Perspective

    KAUST Repository

    Chaaban, Anas

    2015-10-24

    Device-to-Device (D2D) communication is envisioned to play a key role in 5G networks as a technique for meeting the demand for high data rates. In a cellular network, D2D allows not only direct communication between users, but also device relaying. In this paper, a simple instance of device-relaying is investigated, and its impact on fairness among users is studied. Namely, a cellular network consisting of two D2D-enabled users and a base-station (BS) is considered. Thus, the users who want to establish communication with the BS can act as relays for each other’s signals. While this problem is traditionally considered in the literature as a multiple-access channel with cooperation in the uplink, and a broadcast channel with cooperation in the downlink, we propose a different treatment of the problem as a multi-way channel. A simple communication scheme is proposed, and is shown to achieve significant gain in terms of fairness (measured by the symmetric rate supported) in comparison to the aforementioned traditional treatment.

  7. A Research and Management Agenda for Chain and Network Science

    NARCIS (Netherlands)

    Omta, S.W.F.; Trienekens, J.H.; Beers, G.

    2002-01-01

    In the present editorial we address key issues and research questions in the field of chain and network science. Theoretical approaches discussed in this editorial include Network Theory, Supply Chain Management and Industrial Organisation Theory. Major research themes derived from these approaches

  8. Next generation network performance management: a business perspective

    CSIR Research Space (South Africa)

    Harding, C

    2010-08-01

    Full Text Available This paper addresses a Next Generation Network (NGN) performance management model in a business context. The CSIR is currently in the process of the concept design for the new Next Generation Communications Network (NGCN) for a large South African...

  9. Managing the Environment : Effects of network ambition on agency performance

    NARCIS (Netherlands)

    Akkerman, A.; Torenvlied, R.

    2011-01-01

    The literature on network management in the public sector reports positive effects of network activity on agency performance. Current studies show however no differences between specific types of contacts in an agency's environment. The present article adopts an explorative design to study the

  10. Bayesian networks for mastitis management on dairy farms

    NARCIS (Netherlands)

    Steeneveld, Wilma|info:eu-repo/dai/nl/304833169; van der Gaag, Linda|info:eu-repo/dai/nl/073468517; Barkema, H.W.; Hogeveen, H.|info:eu-repo/dai/nl/126322864

    2009-01-01

    This manuscript presents the idea of providing dairy farmers with probability distributions to support decisions on mastitis management and illustrates its feasibility by two applications. Naive Bayesian networks were developed for both applications. The networks in the first application were used

  11. Magic from Social Networks that Talk to Management: Four Cases

    Science.gov (United States)

    Sugarman, Barry

    2010-01-01

    Purpose: The purpose of this paper is to understand how social networks can help to produce the "magic" of extraordinary results for organizations. Design/methodology/approach: In this exploratory study four cases (from published reports) are compared in order to illustrate different management approaches to utilizing the power of networks.…

  12. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P.; Abu-Mahfouz, Adnan M.

    2017-01-01

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management. PMID:28471390

  13. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P; Abu-Mahfouz, Adnan M

    2017-05-04

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  14. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Directory of Open Access Journals (Sweden)

    Musa Ndiaye

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs are becoming increasingly popular with the advent of the Internet of things (IoT. Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  15. Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network

    Directory of Open Access Journals (Sweden)

    Yan-Lin Tang

    2016-03-01

    Full Text Available Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD network in a star topology over a 200-square-kilometer metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate 10 times larger than previous results. Our results demonstrate that the MDIQKD network, combining the best of both worlds—security and practicality, constitutes an appealing solution to secure metropolitan communications.

  16. THE SUPPORTING OF EXPLOITATION AND MAINTENANCE MANAGEMENT WITHIN NETWORKED TECHNICAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Marcin DĄBROWSKI

    2015-04-01

    Full Text Available Network technical systems are complex systems, which include distribution networks with devices and engineering objects supporting their work. These kind of systems are used for media distribution, such as: drinking water, fuel, gas, heat, etc. One of specific features of this system is large territorial dispersion of technical objects within the system. The exploitation specificity of networked technical systems requires a special approach for implementing maintenance and repair work, taking into account the large territorial dispersion of their components and limited access to technical infra-structure. The features pointed above show the difference between networked technical system and the typical industri-al technical objects (e.g. available in manufacturing plants. This difference also requires the use of specific IT tools for maintenance management. This article discusses examples of selected tools in this class.

  17. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  18. Network design management and technical perspectives

    CERN Document Server

    Piliouras, Teresa C

    2004-01-01

    MAKING THE BUSINESS CASE FOR THE NETWORKManagement Overview of Network DesignDefine the Business ObjectivesDetermine Potential Risks, Dependencies, Costs andBenefitsIdentify Project RequirementsDevelop Project Implementation ApproachStrategic Positioning Using NetworksCase StudiesCalculation of Technology's Strategic ValueDealing with Major Design ChallengesOrganizational Concerns and RecommendationsTechnology Concerns and RecommendationsSimilarities and Differences between Voice and DataNetwork Design and PlanningMajor Trends and Technology EnablersSocietal TrendsService Provider TrendsMajor

  19. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    Science.gov (United States)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  20. Social Networks and Welfare in Future Animal Management

    Science.gov (United States)

    Koene, Paul; Ipema, Bert

    2014-01-01

    Simple Summary Living in a stable social environment is important to animals. Animal species have developed social behaviors and rules of approach and avoidance of conspecifics in order to co-exist. Animal species are kept or domesticated without explicit regard for their inherent social behavior and rules. Examples of social structures are provided for four species kept and managed by humans. This information is important for the welfare management of these species. In the near future, automatic measurement of social structures will provide a tool for daily welfare management together with nearest neighbor information. Abstract It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal species. Social Network Analysis (SNA) facilitates the characterization of social networking at group, subgroup and individual levels. SNA is currently used for modeling the social behavior and management of wild animals and social welfare of zoo animals. It has been recognized for use with farm animals but has yet to be applied for management purposes. Currently, the main focus is on cattle, because in large groups (poultry), recording of individuals is expensive and the existence of social networks is uncertain due to on-farm restrictions. However, in many cases, a stable social network might be important to individual animal fitness, survival and welfare. For instance, when laying hens are not too densely housed, simple networks may be established. We describe here small social networks in horses, brown bears, laying hens and veal calves to illustrate the importance of measuring social networks among animals managed by humans. Emphasis is placed on the automatic measurement of identity, location, nearest neighbors and nearest neighbor distance for

  1. QNAP 1263U Network Attached Storage (NAS)/ Storage Area Network (SAN) Device Users Guide

    Science.gov (United States)

    2016-11-01

    speed of the network itself. Many standards are in place for transferring data, including more standard ones such as File Transfer Protocol and Server ...Mapping the Network Drive 4 5.1 Windows 7 4 5.2 Windows 10 6 6. Connecting to the iSCSI on the NAS 6 7. Adding a New IQN to iSCSI ACL 7 8... Adding a New LUN 9 9. Finding an Initiator IQN for ACL 11 10. Virtualization Station 12 11. Code 12 11.1 iscsi setup.bat 13 11.2 reconnect

  2. Optical Network Models and Their Application to Software-Defined Network Management

    Directory of Open Access Journals (Sweden)

    Thomas Szyrkowiec

    2017-01-01

    Full Text Available Software-defined networking is finding its way into optical networks. Here, it promises a simplification and unification of network management for optical networks allowing automation of operational tasks despite the highly diverse and vendor-specific commercial systems and the complexity and analog nature of optical transmission. Common abstractions and interfaces are a fundamental component for software-defined optical networking. Currently, a number of models for optical networks are available. They all claim to provide open and vendor agnostic management of optical equipment. In this work, we survey and compare the most important models and propose an intent interface for creating virtual topologies which is integrated in the existing model ecosystem.

  3. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  4. Business communication in social networks: Content management and experiences

    Directory of Open Access Journals (Sweden)

    Miguel Ángel Nicolás

    2014-11-01

    Full Text Available Currently, management of communication in social networks has become an indispensable strategic activity and contributes directly to change the mode of relationship between business and its stakeholders. The first section of this paper presents a brief analysis of the results reported in different specialized national studies in social networks. We analyse the general activities that users prefer to do and activities that users value most brands on networks. If an organization wants to successfully manage their communication in social networks is very important to know the behaviour of the users and design strategies based on their status and economic activity. This paper presents a brief analysis of social branding through the classification of different corporate content posted on their networks.

  5. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  6. Traffic Management in ATM Networks Over Satellite Links

    Science.gov (United States)

    Goyal, Rohit; Jain, Raj; Goyal, Mukul; Fahmy, Sonia; Vandalore, Bobby; vonDeak, Thomas

    1999-01-01

    This report presents a survey of the traffic management Issues in the design and implementation of satellite Asynchronous Transfer Mode (ATM) networks. The report focuses on the efficient transport of Transmission Control Protocol (TCP) traffic over satellite ATM. First, a reference satellite ATM network architecture is presented along with an overview of the service categories available in ATM networks. A delay model for satellite networks and the major components of delay and delay variation are described. A survey of design options for TCP over Unspecified Bit Rate (UBR), Guaranteed Frame Rate (GFR) and Available Bit Rate (ABR) services in ATM is presented. The main focus is on traffic management issues. Several recommendations on the design options for efficiently carrying data services over satellite ATM networks are presented. Most of the results are based on experiments performed on Geosynchronous (GEO) latencies. Some results for Low Earth Orbits (LEO) and Medium Earth Orbit (MEO) latencies are also provided.

  7. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Directory of Open Access Journals (Sweden)

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  8. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  9. Decentralized Fault Management for Service Dependability in Ubiquitous Networks

    DEFF Research Database (Denmark)

    Grønbæk, Lars Jesper

    2010-01-01

    simulation model. Some of the main findings are: i) certain imperfection trade-off settings of the Diagnosis component lead to worse end-user service reliability than if no fault management is conducted, ii) using end-user service state information in the decision process can help improve service reliability......Obtaining reliable operation of end-user services in future ubiquitous networking environments is challenging. Faults occur and heterogeneous networks make it difficult to deploy network wide fault management mechanisms. This PhD lecture presents a study on the options an end-node has to mitigate......) unobservable and incomplete network state information, ii) unreliable observations, and iii) dynamic environments calling for adaptation in the fault management process. In the study, focus is on potential gains in the interaction between the components of Observation, Diagnosis, Decision and Remediation...

  10. Anesthesia management for MitraClip device implantation

    Directory of Open Access Journals (Sweden)

    Harikrishnan Kothandan

    2014-01-01

    Full Text Available Aims and Objectives: Percutaneous MitraClip implantation has been demonstrated as an alternative procedure in high-risk patients with symptomatic severe mitral regurgitation (MR who are not suitable (or denied mitral valve repair/replacement due to excessive co morbidity. The MitraClip implantation was performed under general anesthesia and with 3-dimensional transesophageal echocardiography (TEE and fluoroscopic guidance. Materials and Methods: Peri-operative patient data were extracted from the electronic and paper medical records of 21 patients who underwent MitraClip implantations. Results: Four MitraClip implantation were performed in the catheterization laboratory; remaining 17 were performed in the hybrid operating theatre. In 2 patients, procedure was aborted, in one due to migration of the Chiari network into the left atrium and in second one, the leaflets and chords of the mitral valve torn during clipping resulting in consideration for open surgery. In the remaining 19 patients, MitraClip was implanted and the patients showed acute reduction of severe MR to mild-moderate MR. All the patients had invasive blood pressure monitoring and the initial six patients had central venous catheterization prior to the procedure. Intravenous heparin was administered after the guiding catheter was introduced through the inter-atrial septum and activated clotting time was maintained beyond 250 s throughout the procedure. Protamine was administered at the end of the procedure. All the patients were monitored in the intensive care unit after the procedure. Conclusions: Percutaneous MitraClip implantation is a feasible alternative in high-risk patients with symptomatic severe MR. Anesthesia management requirements are similar to open surgical mitral valve repair or replacement. TEE plays a vital role during the MitraClip implantation.

  11. Policy Networks and Forest Resource Management in Ghana | Teye ...

    African Journals Online (AJOL)

    This paper employs a policy network model to explore the formal and informal interactions and structures which characterise forest management in Ghana. A comprehensive analysis of primary and secondary data reveals that forest management in Ghana has historically been influenced by complex relations of power and ...

  12. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  13. Toward effective strategies for energy efficient network management

    NARCIS (Netherlands)

    Vreeswijk, Jacob Dirk; van Berkum, Eric C.; van Arem, Bart; van Vliet, H.; Abadi, A.; Bauer e.a., D.

    2010-01-01

    Trade-offs in efficiency, equity and acceptability arise as a central feature in traffic management. Today's urban traffic network management strategies focus on overall system performance and often overlook the interests of the individual road user. In addition, the emphasis is on travel time

  14. Towards a New Framework of Idea Management as Actor Networks

    DEFF Research Database (Denmark)

    Jensen, Anna Rose Vagn

    2013-01-01

    investigations of managing activities in front-end idea development, an indicative analysis in the perspective of actor network theory is performed. The analysis show how managers and employees navigate in a complex environment of organizational structures, technical features and design, creativity and social...

  15. Bayesian belief networks: applications in ecology and natural resource management.

    Science.gov (United States)

    R.K. McCann; B.G. Marcot; R. Ellis

    2006-01-01

    We review the use of Bayesian belief networks (BBNs) in natural resource management and ecology. We suggest that BBNs are useful tools for representing expert knowledge of a system, evaluating potential effects of alternative management decisions, and communicating to nonexperts about resource decision issues. BBNs can be used effectively to represent uncertainty in...

  16. A proposed concept for a crustal dynamics information management network

    Science.gov (United States)

    Lohman, G. M.; Renfrow, J. T.

    1980-01-01

    The findings of a requirements and feasibility analysis of the present and potential producers, users, and repositories of space-derived geodetic information are summarized. A proposed concept is presented for a crustal dynamics information management network that would apply state of the art concepts of information management technology to meet the expanding needs of the producers, users, and archivists of this geodetic information.

  17. Hybrid Spintronic-CMOS Spiking Neural Network with On-Chip Learning: Devices, Circuits, and Systems

    Science.gov (United States)

    Sengupta, Abhronil; Banerjee, Aparajita; Roy, Kaushik

    2016-12-01

    Over the past decade, spiking neural networks (SNNs) have emerged as one of the popular architectures to emulate the brain. In SNNs, information is temporally encoded and communication between neurons is accomplished by means of spikes. In such networks, spike-timing-dependent plasticity mechanisms require the online programing of synapses based on the temporal information of spikes transmitted by spiking neurons. In this work, we propose a spintronic synapse with decoupled spike-transmission and programing-current paths. The spintronic synapse consists of a ferromagnet-heavy-metal heterostructure where the programing current through the heavy metal generates spin-orbit torque to modulate the device conductance. Low programing energy and fast programing times demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We perform a simulation study based on an experimentally benchmarked device-simulation framework to demonstrate the interfacing of such spintronic synapses with CMOS neurons and learning circuits operating in the transistor subthreshold region to form a network of spiking neurons that can be utilized for pattern-recognition problems.

  18. COMMUNICATION MANAGEMENT CRISIS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Ana Mª Enrique Jiménez

    2013-04-01

    Full Text Available It is often in the social networks where you detect the first signs of a potential crisis situation. Today, many companies decide to be present in social networks to communicate, listen and respond to their audiences openly with immediacy. A simple complaint is visible and propagates through the network in seconds, being capable of generating a negative impact on the corporate image of the organization. The same can happen to the contrary, ie, to praise the performance of a company, which may affect the creation or strengthening of the good reputation of the company. However, we know that this does not happen with the same intensity. In this paper we analyze the decisions and actions of two opposing companies, Nestlé and Panrico, in front of a possible crisis situation.

  19. The External Networking Behaviour of Public Managers

    DEFF Research Database (Denmark)

    Hansen, Morten Balle; Villadsen, Anders Ryom

    2017-01-01

    There has been an increasing focus on managerial external networking behaviour within public administration. While most previous quantitative research has analysed such behaviour one-dimensionally, we suggest a two-dimensional conceptualization based on the concepts of weak and strong ties....... Utilizing measures resembling previous research, we explore the utility of the approach in an exploratory study of Danish local government. Our findings suggest that the two dimensions of external networking behaviour are distinct. We discuss our approach compared to previous approaches and argue...

  20. Resource management for energy and spectrum harvesting sensor networks

    CERN Document Server

    Zhang, Deyu; Zhou, Haibo; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a ne...

  1. Communal Cooperation in Sensor Networks for Situation Management

    Science.gov (United States)

    Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin,Chunsheng

    2006-01-01

    Situation management is a rapidly evolving science where managed sources are processed as realtime streams of events and fused in a way that maximizes comprehension, thus enabling better decisions for action. Sensor networks provide a new technology that promises ubiquitous input and action throughout an environment, which can substantially improve information available to the process. Here we describe a NASA program that requires improvements in sensor networks and situation management. We present an approach for massively deployed sensor networks that does not rely on centralized control but is founded in lessons learned from the way biological ecosystems are organized. In this approach, fully distributed data aggregation and integration can be performed in a scalable fashion where individual motes operate based on local information, making local decisions that achieve globally-meaningful results. This exemplifies the robust, fault-tolerant infrastructure required for successful situation management systems.

  2. Dynamic Subsidy Method for Congestion Management in Distribution Networks

    OpenAIRE

    Huang, Shaojun; Wu, Qiuwei

    2016-01-01

    Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion management in distribution networks, including the market mechanism, the mathematical formulation through a two-level optimization, and the method solving the optimization by tightening the constraints...

  3. Managers look to the social network to seek information

    OpenAIRE

    Mckenzie M.L.

    2005-01-01

    Introduction. The purpose of this study was to explore how managers selected individuals to serve as information sources. The social context of a for-profit business environment offered opportunity to study information seeking among interacting line managers. Method. The qualitative methods of social network mapping and interview were used to capture the data. The study was conducted within a stand-alone business unit of a major US-based corporation. A total of 22 line-managers participated...

  4. Green Small Cell Operation of Ultra-Dense Networks Using Device Assistance

    Directory of Open Access Journals (Sweden)

    Gilsoo Lee

    2016-12-01

    Full Text Available As higher performance is demanded in 5G networks, energy consumption in wireless networks increases along with the advances of various technologies, so enhancing energy efficiency also becomes an important goal to implement 5G wireless networks. In this paper, we study the energy efficiency maximization problem focused on finding a suitable set of turned-on small cell access points (APs. Finding the suitable on/off states of APs is challenging since the APs can be deployed by users while centralized network planning is not always possible. Therefore, when APs in small cells are randomly deployed and thus redundant in many cases, a mechanism of dynamic AP turning-on/off is required. We propose a device-assisted framework that exploits feedback messages from the user equipment (UE. To solve the problem, we apply an optimization method using belief propagation (BP on a factor graph. Then, we propose a family of online algorithms inspired by BP, called DANCE, that requires low computational complexity. We perform numerical simulations, and the extensive simulations confirm that BP enhances energy efficiency significantly. Furthermore, simple, but practical DANCE exhibits close performance to BP and also better performance than other popular existing methods. Specifically, in a small-sized network, BP enhances energy efficiency 129%. Furthermore, in ultra-dense networks, DANCE algorithms successfully achieve orders of magnitude higher energy efficiency than that of the baseline.

  5. Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers

    Science.gov (United States)

    Li, Fei; Zhao, Wei; Guo, Ying

    2017-09-01

    Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.

  6. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Science.gov (United States)

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  7. Enterprise Social Networks from a Manager's Perspective

    DEFF Research Database (Denmark)

    Richter, Alexander; Hetmank, Corinna; Müller, Maria

    2016-01-01

    be supported best to trigger both learning and change processes in the enterprise. For such processes, managers have a strong multiplying and "role model" effect. Therefore, following a case study approach, we conducted 15 interviews with managers at different hierarchical levels at a financial services...

  8. Using smart mobile devices in social-network-based health education practice: a learning behavior analysis.

    Science.gov (United States)

    Wu, Ting-Ting

    2014-06-01

    Virtual communities provide numerous resources, immediate feedback, and information sharing, enabling people to rapidly acquire information and knowledge and supporting diverse applications that facilitate interpersonal interactions, communication, and sharing. Moreover, incorporating highly mobile and convenient devices into practice-based courses can be advantageous in learning situations. Therefore, in this study, a tablet PC and Google+ were introduced to a health education practice course to elucidate satisfaction of learning module and conditions and analyze the sequence and frequency of learning behaviors during the social-network-based learning process. According to the analytical results, social networks can improve interaction among peers and between educators and students, particularly when these networks are used to search for data, post articles, engage in discussions, and communicate. In addition, most nursing students and nursing educators expressed a positive attitude and satisfaction toward these innovative teaching methods, and looked forward to continuing the use of this learning approach. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. The External Networking Behaviour of Public Managers

    DEFF Research Database (Denmark)

    Hansen, Morten Balle; Villadsen, Anders Ryom

    2017-01-01

    There has been an increasing focus on managerial external networking behaviour within public administration. While most previous quantitative research has analysed such behaviour one-dimensionally, we suggest a two-dimensional conceptualization based on the concepts of weak and strong ties...

  10. Network Physics anounces first product to provide business-level management of the most complex and dynamic networks

    CERN Multimedia

    2003-01-01

    Network Physics, provider of business-level, traffic flow-based network management solutions, today announced the introduction of the Network Physics NP/BizFlow-1000. With the NP/BizFlow-1000, Fortune 1000 companies with complex and dynamic networks can analyze the flows that link business groups, critical applications, and network software and hardware (1 page).

  11. Design of acquisition devices management subsystem for IEEE 1073 compliant software agents.

    Science.gov (United States)

    Nagin, V A; Potapov, I V; Selishchev, S V

    2002-01-01

    The paper addresses the issue of device management system design for software agents compliant with IEEE 1073 device communication standard. Based on middleware architecture the device control layer represents a universal versatile object-oriented application-programming interface. The approach presented in the paper allows to implement plug-and-play integration and interoperability of medical acquisition devices within the medical device system be means of common middleware services. Adherence to Medical Data Information Base nomenclature, component part of IEEE 1073 communication standard, adds necessary consistency to presented component-based infrastructure.

  12. Anesthetic management of Amplatzer atrial septal defect closure device embolization to right ventricular outflow tract

    Directory of Open Access Journals (Sweden)

    S Das

    2016-01-01

    Full Text Available Percutaneous device closure of atrial septal defect (ASD is an alternative treatment to surgery with advantages of avoidance of surgery, short procedure time, early discharge from hospital, and lower rates of complications. However, percutaneous device closure is associated with infrequent life-threatening complications such as device embolization. We report a case device embolization of the ASD occlude device into right ventricular outflow tract resulting progressive hypoxia. The role of anesthesiologist as a team leader in managing such emergency is discussed.

  13. Flow control using audio tones in resonant microfluidic networks: towards cell-phone controlled lab-on-a-chip devices.

    Science.gov (United States)

    Phillips, Reid H; Jain, Rahil; Browning, Yoni; Shah, Rachana; Kauffman, Peter; Dinh, Doan; Lutz, Barry R

    2016-08-16

    Fluid control remains a challenge in development of portable lab-on-a-chip devices. Here, we show that microfluidic networks driven by single-frequency audio tones create resonant oscillating flow that is predicted by equivalent electrical circuit models. We fabricated microfluidic devices with fluidic resistors (R), inductors (L), and capacitors (C) to create RLC networks with band-pass resonance in the audible frequency range available on portable audio devices. Microfluidic devices were fabricated from laser-cut adhesive plastic, and a "buzzer" was glued to a diaphragm (capacitor) to integrate the actuator on the device. The AC flowrate magnitude was measured by imaging oscillation of bead tracers to allow direct comparison to the RLC circuit model across the frequency range. We present a systematic build-up from single-channel systems to multi-channel (3-channel) networks, and show that RLC circuit models predict complex frequency-dependent interactions within multi-channel networks. Finally, we show that adding flow rectifying valves to the network creates pumps that can be driven by amplified and non-amplified audio tones from common audio devices (iPod and iPhone). This work shows that RLC circuit models predict resonant flow responses in multi-channel fluidic networks as a step towards microfluidic devices controlled by audio tones.

  14. International E-Waste Management Network (IEMN)

    Science.gov (United States)

    EPA and the Environmental Protection Administration Taiwan (EPAT) have collaborated since 2011 to build global capacity for the environmentally sound management of waste electrical and electronic equipment (WEEE), which is commonly called e-waste.

  15. Intelligent Network Management and Functional Cerebellum Synthesis

    Science.gov (United States)

    Loebner, Egon E.

    1989-01-01

    Transdisciplinary modeling of the cerebellum across histology, physiology, and network engineering provides preliminary results at three organization levels: input/output links to central nervous system networks; links between the six neuron populations in the cerebellum; and computation among the neurons of the populations. Older models probably underestimated the importance and role of climbing fiber input which seems to supply write as well as read signals, not just to Purkinje but also to basket and stellate neurons. The well-known mossy fiber-granule cell-Golgi cell system should also respond to inputs originating from climbing fibers. Corticonuclear microcomplexing might be aided by stellate and basket computation and associate processing. Technological and scientific implications of the proposed cerebellum model are discussed.

  16. Bandwidth Management in Resource Constrained Networks

    Science.gov (United States)

    2012-03-01

    Control Protocol/Internet Protocol UDP User Datagram Protocol URL Uniform Resource Locator VPN Virtual Private Networks VSAT Very Small Aperture...grave registration site in Thailand in response to the tsunami. Researchers leveraged their Very Small Aperture Terminal ( VSAT ) to create an Internet...accessible Internet access for the communities “for all early responders, victims’ families, and government (local and federal)” through the use of two VSATs

  17. Integrated knowledge management in networks; Integriertes Wissensmanagement in Netzwerken

    Energy Technology Data Exchange (ETDEWEB)

    Schuh, G.; Schlick, C.; Lindemann, U. (eds.)

    2007-07-01

    Knowledge is a success factor for globally acting company networks as a. o. the aim-oriented knowledge transfer between partners is an essential condition for a successful cooperation. Several network specific problems impede however an efficient and effective knowledge management; e.g. the transfer of competition relevant data is a high sensitive theme. The authors describe how a relevant method can be selected, adapted and implemented to the application-specific boundary conditions. They integrate existing attempts processes and methods to establish an effective knowledge development and an efficient knowledge transfer in the network and take into account ''hard'' (IT-technical-oriented solution approaches) as also ''soft'' factors (e.g. cultural and personal aspects). So the authors present unified instruments for an integrated knowledge management in networks. (GL)

  18. Nonprofit Organizations in Disaster Response and Management: A Network Analysis

    Directory of Open Access Journals (Sweden)

    NAIM KAPUCU

    2018-01-01

    Full Text Available This paper tracks changes in the national disaster management system with regard to the nonprofit sector by looking at the roles ascribed to nonprofit organizations in the Federal Response Plan (FRP, National Response Plan (NRP, and National Response Framework (NRF. Additionally, the data collected from news reports and organizational after action reports about the inter-organizational interactions of emergency management agencies during the September 11th attacks and Hurricane Katrina are analyzed by using network analysis tools. The findings of the study indicate that there has been an increase in the interactions of the National Voluntary Organizations Active in Disasters (NVOAD network member organizations on par with policy changes in the NRP to involve nonprofit organizations in the national disaster planning process. In addition, those organizations close to the center of the network experienced enhanced communication and resource acquisition allowing them to successfully accomplish their missions, a finding that supports the development of strong network connections.

  19. CifNet network multi-well data management system

    Science.gov (United States)

    Li, Ning; Wang, Mingchao; Cui, Jian; Wang, Jianqiang; Wang, Caizhi

    2004-10-01

    The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3, ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.

  20. Single-chip multimedia network access using installed in-home cable and that can be remotely managed

    Science.gov (United States)

    Gandar, Marc; Mlynek, Daniel; Osseiran, Adam

    1998-02-01

    This paper describes a solution to multimedia networking using presently installed home cable. To reach this goal a concept based on a high performance single chip has been achieved. This concept has been validated in several applications and is now available in an open VHDL or silicon format. The flexibility of this network allows high-speed data and power multiplexing on the same wire. The MediaFlow solution, described in this paper, proposed a remote management tool for distributed device interconnection such as phone, hi-fi, video control and computers in the home. This management could either be locally or remotely controlled through ATM or ISDN networks. The concept allows a service provider to take over the installation, management and maintenance of the whole network.

  1. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  2. Data management issues in mobile ad hoc networks

    Science.gov (United States)

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  3. BGP-Based Routing Configuration Management for Multidomain Mobile Networks

    Science.gov (United States)

    2010-09-01

    extend the network management system to exterior routing configuration in dynamically changed topology. 1.0 INTRODUCTION Routing in the Internet ...in is mostly based on BGP protocol [1]. The Internet is in fact the composition of autonomous systems (AS), each of them is independently...Bruin, O. Bonaventure, Open Issues in Interdomain Routing: A Survey, IEEE Network Magazine,Volume 19, 11.2005 [7] D. Street, Global Information Grid

  4. An Intelligent Handover Management System for Future Generation Wireless Networks

    OpenAIRE

    Kassar Meriem; Kervella Brigitte; Pujolle Guy

    2008-01-01

    Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the contex...

  5. Monitoring water distribution systems: understanding and managing sensor networks

    OpenAIRE

    Ediriweera, D. D.; Marshall, I. W.

    2010-01-01

    Sensor networks are currently being trialed by the water distribution industry for monitoring complex distribution infrastructure. The paper presents an investigation in to the architecture and performance of a sensor system deployed for monitoring such a distribution network. The study reveals lapses in systems design and management, resulting in a fifth of the data being either missing or erroneous. Findings identify the importance of undertaking in-depth consideration of all aspects of a l...

  6. Topology Optimisation for Energy Management in Underwater Sensor Networks

    Science.gov (United States)

    2015-01-01

    sensing and communication models for underwater environment. The approximate Pareto - optimal surface is obtained as a trade-off between network...lifetime and probability of successful search over the surveillance region. Keywords: underwater sensor network; energy management; Pareto optimisation...horizon power trade-off problem with the probability π ss (Wettergren, 2008) of successful search as the cost function , where π ss is shown to be a

  7. Topology Optimization for Energy Management in Underwater Sensor Networks

    Science.gov (United States)

    2015-02-01

    and communication. This multi-objective cost functional leads to non-dominant optimization. Such a problem is formulated as a Pareto -optimal trade...K. Jha1 Thomas A. Wettergren2 Asok Ray1 Kushal Mukherjee3 Keywords: Underwater Sensor Network, Energy Management, Pareto Optimization, Adaptation...communication models for under- water environment. The approximate Pareto -optimal surface is obtained as a trade-off between network lifetime and probability

  8. Radio resource management in multi-tier cellular wireless networks

    CERN Document Server

    Hossain, Ekram; Niyato, Dusit

    2013-01-01

    Providing an extensive overview of the radio resource management problem in femtocell networks, this invaluable book considers both code division multiple access femtocells and orthogonal frequency-division multiple access femtocells. In addition to incorporating current research on this topic, the book also covers technical challenges in femtocell deployment, provides readers with a variety of approaches to resource allocation and a comparison of their effectiveness, explains how to model various networks using Stochastic geometry and shot noise theory, and much more.

  9. The SysMES Framework: System Management for Networked Embedded Systems and Clusters

    CERN Document Server

    Lara Martinez, Camilo Ernesto

    Automated system management for large distributed and heterogeneous environments is a common challenge in modern computer sciences. Desired properties of such a management system are, among others, a minimal dependency on human operators for problem recognition and solution, adaptability to increasing loads, fault tolerance and the flexibility to integrate new management resources at runtime. Existing tools address parts of these requirements however there is no single integrated framework which possesses all mentioned characteristics. SysMES was developed as an integrated framework for automated monitoring and management of networked devices. In order to achieve the requirements of scalability and fault tolerance, a fully distributed and decentralized architecture has been chosen. The framework comprises a monitoring module, a rule engine and an executive module for the execution of actions. A formal language has been defined which allows administrators to define complex spatial and temporal rule conditions ...

  10. SOCIAL KNOWLEDGE MANAGEMENT, RESEARCH AND INNOVATION NETWORKS FOR INCLUSION

    Directory of Open Access Journals (Sweden)

    Sandra Ace vedo Zapata

    2017-09-01

    Full Text Available The objective is to describe the social management of knowledge through research and innovation networks to promote social inclusion. The reflection of the exploratory stage is presented within the doctoral thesis analyzing the challenges of the universities in the achievement of social inclusion with networks of research and innovation. A descriptive work was done, with documentary tracking, systematization and analysis. The findings show that it is necessary to articulate efforts in interdisciplinary and transdisciplinary networks with different actors: state, company, education, scientists, technologists and vulnerable, excluded populations, to build policies and strategies for social inclusion.

  11. Soft hydrogels interpenetrating silicone--A polymer network for drug-releasing medical devices.

    Science.gov (United States)

    Steffensen, Søren L; Vestergaard, Merete H; Møller, Eva H; Groenning, Minna; Alm, Martin; Franzyk, Henrik; Nielsen, Hanne M

    2016-02-01

    Materials for the next generation of medical devices will require not only the mechanical stability of current devices, but must also possess other properties such as sustained release of drugs in a controlled manner over a prolonged period of time. This work focuses on creating such a sophisticated material by forming an interpenetrating polymer network (IPN) material through modification of silicone elastomers with a poly(2-hydroxyethyl methacrylate) (PHEMA)-based hydrogel. IPN materials with a PHEMA content in the range of 13%-38% (w/w) were synthesized by using carbon dioxide-based solvent mixtures under high pressure. These IPNs were characterized with regard to microstructure as well as ability of the hydrogel to form a surface-connected hydrophilic carrier network inside the silicone. A critical limit for hydrogel connectivity was found both via simulation and by visualization of water uptake in approximately 25% (w/w) PHEMA, indicating that entrapment of gel occurs at low gel concentrations. The optimized IPN material was loaded with the antibiotic ciprofloxacin, and the resulting drug release was shown to inhibit bacterial growth when placed on agar, thus demonstrating the potential of this IPN material for future applications in drug-releasing medical devices. © 2015 Wiley Periodicals, Inc.

  12. Distributed processing and network of data acquisition and diagnostics control for Large Helical Device (LHD)

    Energy Technology Data Exchange (ETDEWEB)

    Nakanishi, H.; Kojima, M.; Hidekuma, S. [National Inst. for Fusion Science, Toki, Gifu (Japan)

    1997-11-01

    The LHD (Large Helical Device) data processing system has been designed in order to deal with the huge amount of diagnostics data of 600-900 MB per 10-second short-pulse experiment. It prepares the first plasma experiment in March 1998. The recent increase of the data volume obliged to adopt the fully distributed system structure which uses multiple data transfer paths in parallel and separates all of the computer functions into clients and servers. The fundamental element installed for every diagnostic device consists of two kinds of server computers; the data acquisition PC/Windows NT and the real-time diagnostics control VME/VxWorks. To cope with diversified kinds of both device control channels and diagnostics data, the object-oriented method are utilized wholly for the development of this system. It not only reduces the development burden, but also widen the software portability and flexibility. 100Mbps EDDI-based fast networks will re-integrate the distributed server computers so that they can behave as one virtual macro-machine for users. Network methods applied for the LHD data processing system are completely based on the TCP/IP internet technology, and it provides the same accessibility to the remote collaborators as local participants can operate. (author)

  13. Design and developement of energy efficient miniature devices for energy harvesting, thermal management and biomedical applications

    OpenAIRE

    Çıkım, Taha Abdullah; Cikim, Taha Abdullah

    2014-01-01

    This thesis aims to make contributions to the literature in the field of energy efficient miniature devices for energy harvesting, thermal management and biomedical applications. In the first part, experimental results related to energy harvesting capability of a miniature power reclamation device based on external liquid flows are represented. The device’s reclamation principle depends on the conversion of mechanical energy into electrical energy. The mechanical energy in the device was gene...

  14. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  15. Project network-oriented materials management policy for complex projects

    DEFF Research Database (Denmark)

    Dixit, Vijaya; Srivastava, Rajiv K; Chaudhuri, Atanu

    2015-01-01

    This work devises a materials management policy integrated with project network characteristics of complex projects. It proposes a relative quantitative measure, overall criticality (OC), for prioritisation of items based on penalty incurred due to their non-availability. In complex projects...... managerial tacit knowledge which provides them enough flexibility to provide information in real form. Computed OC values can be used for items prioritisation and as shortage cost coefficient in inventory models. The revised materials management policy was applied to a shipbuilding project. OC values were...... analysed to justify the importance of incorporating project network characteristics and potential cost savings were calculated...

  16. Design Management in the Textile Industry - A Network Perspective

    DEFF Research Database (Denmark)

    Christensen, Poul Rind; Bang, Anne Louise

    In this paper we explore textile design activities and textile design management from an industrial network perspective. The textile industry is probably one of the most globalized manufacturing industries in the world and thus one of the most dispersed industries on the globe. Most studies...... on design management are framed inside the organisational context of the firm. In this study the role and practice of textile design is addressed in perspective of the global textile production network. The empirical data stems from six case studies exploring how different types of enterprises are organised...

  17. Management and development of local area network upgrade prototype

    Science.gov (United States)

    Fouser, T. J.

    1981-01-01

    Given the situation of having management and development users accessing a central computing facility and given the fact that these same users have the need for local computation and storage, the utilization of a commercially available networking system such as CP/NET from Digital Research provides the building blocks for communicating intelligent microsystems to file and print services. The major problems to be overcome in the implementation of such a network are the dearth of intelligent communication front-ends for the microcomputers and the lack of a rich set of management and software development tools.

  18. Microgrids in Active Network Management-Part II

    DEFF Research Database (Denmark)

    Palizban, Omid; Kauhaniemi, Kimmo; Guerrero, Josep M.

    2014-01-01

    The development of distribution networks for participation in active network management (ANM) and smart grids is introduced using the microgrid concept. In recent years, this issue has been researched and implemented by many experts. The second part of this paper describes those developed......, following planned or unplanned transitions to island mode, microgrids may develop instability. For this reason, the paper addresses the principles behind island-detection methods, black-start operation, fault management, and protection systems, along with a comprehensive review of power quality. Finally...

  19. Insertion algorithms for network model database management systems

    Science.gov (United States)

    Mamadolimov, Abdurashid; Khikmat, Saburov

    2017-12-01

    The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, forms partial order. When a database is large and a query comparison is expensive then the efficiency requirement of managing algorithms is minimizing the number of query comparisons. We consider updating operation for network model database management systems. We develop a new sequantial algorithm for updating operation. Also we suggest a distributed version of the algorithm.

  20. Writing orthotic device for the management of writer's cramp

    Directory of Open Access Journals (Sweden)

    Narayanasarma V. Singam

    2013-01-01

    Full Text Available Background: Oral therapies and chemodenervation procedures are often unrewarding in the treatment of focal, task-specific hand disorders such as writer's cramp or primary writing tremor. Methods: A portable writing orthotic device was evaluated on fifteen consecutively recruited writer's cramp and primary writing tremor subjects. We measured overall impairment at baseline and after two weeks of at-home use with the Writer’s Cramp Rating Scale (range = 0-8, higher is worse and writing quality and comfort with a visual analog scale (range = 0-10. Results: Compared to regular pen, the writing orthotic device improved the Writer's Cramp Rating Scale scores at first-test (p=0.001 and re-test (p=0.005 as well as writing quality and device comfort in writer's cramp subjects. Benefits were sustained at two weeks. Primary writing tremor subjects demonstrated no improvements.Conclusions: Writing orthotic devices exploiting a muscle-substitution strategy may yield immediate benefits in patients with writer's cramp.

  1. Considerations of Poka-Yoke device in total quality management

    OpenAIRE

    Claudiu Isac; Alin Isac

    2002-01-01

    Poka-Yoke is the Japanese term for mistake-proofing. Developed by Dr. Shigeo Shingo, Poka-Yoke employs devices on the process operations to prevent the special causes that result in defects, or to inexpensively inspect each item that is produced to determine whether it is acceptable or defective

  2. State of California; Northern Sierra Air Quality Management District; Wood Burning Devices

    Science.gov (United States)

    EPA is proposing to approve a revision to the Northern Sierra Air Quality Management District (NSAQMD) portion of the California State Implementation Plan (SIP) concerning emissions of particulate matter (PM) from wood burning devices.

  3. A new era for cardiac rhythm management devices : Solutions for transvenous lead complications

    NARCIS (Netherlands)

    Knops, R.E.

    2017-01-01

    Both pacemakers and cardiac defibrillators (ICD) have been designed to treat cardiac arrhythmias. These arrhythmias often lead to life-threatening conditions. Numerous studies have shown the benefits on survival and quality of life of these cardiac rhythm management (CRM) devices. These devices rely

  4. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  5. Madagascar's nascent locally managed marine area network ...

    African Journals Online (AJOL)

    Since 2004, the creation of locally managed marine areas (LMMAs) in Madagascar has exponentially increased, highlighting the need for improved information sharing between communities and between support organizations. Until recently, however, these LMMAs operated in relative isolation, with little communication or ...

  6. METHODOLOGY OF RESEARCH AND DEVELOPMENT MANAGEMENT OF REGIONAL NETWORK ECONOMY

    Directory of Open Access Journals (Sweden)

    O.I. Botkin

    2007-06-01

    Full Text Available Information practically of all the Russian regions economy branches and development by managing subjects is information − communicative the Internet technologies render huge influence on economic attitudes development in the environment of regional business: there are new forms of interaction of managing subjects and change is information − organizational structures of regional business management. Integrated image of the set forth above innovations is the regional network economy representing the interactive environment in which on high speed and with minimal transaction (R.H.Coase’s costs are performed social economic and commodity monetary attitudes between managing subjects of region with use of Internet global network interactive opportunities. The urgency of the regional network economy phenomenon research, first of all, is caused by necessity of a substantiation of regional network economy methodology development and management mechanisms development by its infrastructure with the purpose of regional business efficiency increase. In our opinion, the decision of these problems will be the defining factor of effective economic development maintenance and russian regions economy growth in the near future.

  7. Emerging Network Storage Management Standards for Intelligent Data Storage Subsystems

    Science.gov (United States)

    Podio, Fernando; Vollrath, William; Williams, Joel; Kobler, Ben; Crouse, Don

    1998-01-01

    This paper discusses the need for intelligent storage devices and subsystems that can provide data integrity metadata, the content of the existing data integrity standard for optical disks and techniques and metadata to verify stored data on optical tapes developed by the Association for Information and Image Management (AIIM) Optical Tape Committee.

  8. Perioperative Management of a Patient With an Intrathecal Drug Delivery Device Infusing Ziconotide: A Case Report.

    Science.gov (United States)

    Patel, Sephalie; Hafez, Osama; Sexton, Wade J; Edwards, David A

    2017-02-15

    Intrathecal ziconotide is used for the treatment of chronic pain and is delivered by an implanted drug delivery device. Anesthesiologists should be familiar with the perioperative management of the pump as well as the potential adverse events related to continued ziconotide infusion during general anesthesia. A case is presented demonstrating the perioperative management of an intrathecal drug delivery device infusing ziconotide in a patient presenting for radical cystectomy with pelvic lymphadenectomy and ileal conduit diversion.

  9. Perioperative Management of a Patient With an Intrathecal Drug Delivery Device Infusing Ziconotide.

    Science.gov (United States)

    Patel, Sephalie; Hafez, Osama; Sexton, Wade J; Edwards, David A

    2016-12-09

    Intrathecal ziconotide is used for the treatment of chronic pain and is delivered by an implanted drug delivery device. Anesthesiologists should be familiar with the perioperative management of the pump as well as the potential adverse events related to continued ziconotide infusion during general anesthesia. A case is presented demonstrating the perioperative management of an intrathecal drug delivery device infusing ziconotide in a patient presenting for radical cystectomy with pelvic lymphadenectomy and ileal conduit diversion.

  10. Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    Science.gov (United States)

    Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei

    2017-04-01

    Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.

  11. Integrated control of wind farms, FACTS devices and the power network using neural networks and adaptive critic designs

    Science.gov (United States)

    Qiao, Wei

    Worldwide concern about the environmental problems and a possible energy crisis has led to increasing interest in clean and renewable energy generation. Among various renewable energy sources, wind power is the most rapidly growing one. Therefore, how to provide efficient, reliable, and high-performance wind power generation and distribution has become an important and practical issue in the power industry. In addition, because of the new constraints placed by the environmental and economical factors, the trend of power system planning and operation is toward maximum utilization of the existing infrastructure with tight system operating and stability margins. This trend, together with the increased penetration of renewable energy sources, will bring new challenges to power system operation, control, stability and reliability which require innovative solutions. Flexible ac transmission system (FACTS) devices, through their fast, flexible, and effective control capability, provide one possible solution to these challenges. To fully utilize the capability of individual power system components, e.g., wind turbine generators (WTGs) and FACTS devices, their control systems must be suitably designed with high reliability. Moreover, in order to optimize local as well as system-wide performance and stability of the power system, real-time local and wide-area coordinated control is becoming an important issue. Power systems containing conventional synchronous generators, WTGs, and FACTS devices are large-scale, nonlinear, nonstationary, stochastic and complex systems distributed over large geographic areas. Traditional mathematical tools and system control techniques have limitations to control such complex systems to achieve an optimal performance. Intelligent and bio-inspired techniques, such as swarm intelligence, neural networks, and adaptive critic designs, are emerging as promising alternative technologies for power system control and performance optimization. This

  12. Clinical management of a western lowland gorilla (Gorilla gorilla gorilla) with a cardiac resynchronization therapy device.

    Science.gov (United States)

    Rush, Elizabeth Marie; Ogburn, Anna L; Monroe, Denise

    2011-06-01

    A 24-yr-old, male western lowland gorilla (Gorilla gorilla gorilla) was diagnosed with congestive heart failure using transesophageal and transthoracic echocardiology. New York Heart Association (NYHA) Class III was assigned to the severity of the condition. Over 16 mo, this progressed to NYHA Class IV despite increasing medical therapy. Repeated evaluations suggested that implantation of a cardiac resynchronization therapy device with a defibrillator (CRT-D) could benefit this animal based on clinical signs and underlying evidence of dyssynchrony and suspected fibrotic myocardial disease. Surgical implantation of leads into the right atrium, right ventricle, and left ventricle was accomplished. The CRT-D device was placed under the thoracic pectoral muscles during an initial surgical procedure. Improvement in the gorilla's clinical condition after implantation of the CRT-D device was immediate and dramatic. Subsequent scanning of the device was accomplished through operant conditioning. The data from these device interrogations included stored and real-time cardiac data, which were used to minimize recognized environmental stressors and change device settings. Over 4 yr, case management was critical to successful device use in treatment of the clinical disease. This involved medications, training for device interrogation, exercise to increase activity and improve body condition, and phlebotomy attempts. Dietary management was necessary to manipulate caloric and sodium intake and encourage medication compliance. Cardiac resynchronization therapy device implantation, although requiring specialized equipment and surgical skill, appears to be a viable option for treatment of fibrosing cardiomyopathy with systolic dysfunction in gorillas refractory to medical management. In addition to treatment, this device provides cardiovascular data at rest that could allow for early diagnosis and treatment of gorillas with this and other cardiac conditions in the future. This

  13. Managing CSCL Activity through networking models

    Directory of Open Access Journals (Sweden)

    Luis Casillas

    2014-04-01

    Full Text Available This study aims at managing activity carried out in Computer-Supported Collaborative Learning (CSCL environments. We apply an approach that gathers and manages the knowledge underlying huge data structures, resulting from collaborative interaction among participants and stored as activity logs. Our method comprises a variety of important issues and aspects, such as: deep understanding of collaboration among participants in workgroups, definition of an ontology for providing meaning to isolated data manifestations, discovering of knowledge structures built in huge amounts of data stored in log files, and development of high-semantic indicators to describe diverse primitive collaborative acts, and binding these indicators to formal descriptions defined in the collaboration ontology; besides our method includes gathering collaboration indicators from web forums using natural language processing (NLP techniques.

  14. Organizational Politics, Social Network, and Knowledge Management

    Science.gov (United States)

    Lee, Hyun Jung; Kang, Sora; Lee, Jongwon

    This research identifies the social relationship and structure among members as well as organization’s political inclination, through which, it also identifies the current status of knowledge management. The result shows that the socio-technological factors (individual, knowledge and IT factors) affect knowledge transfer and the knowledge transfer influences performance and that the members’ relationship based on the political inclination of the organization has a major moderating effect on the above two relation.

  15. The Network Configuration of an Object Relational Database Management System

    Science.gov (United States)

    Diaz, Philip; Harris, W. C.

    2000-01-01

    The networking and implementation of the Oracle Database Management System (ODBMS) requires developers to have knowledge of the UNIX operating system as well as all the features of the Oracle Server. The server is an object relational database management system (DBMS). By using distributed processing, processes are split up between the database server and client application programs. The DBMS handles all the responsibilities of the server. The workstations running the database application concentrate on the interpretation and display of data.

  16. New IEEE 11073 Standards for interoperable, networked Point-of-Care Medical Devices.

    Science.gov (United States)

    Kasparick, Martin; Schlichting, Stefan; Golatowski, Frank; Timmermann, Dirk

    2015-08-01

    Surgical procedures become more and more complex and the number of medical devices in an operating room (OR) increases continuously. Today's vendor-dependent solutions for integrated ORs are not able to handle this complexity. They can only form isolated solutions. Furthermore, high costs are a result of vendor-dependent approaches. Thus we present a service-oriented device communication for distributed medical systems that enables the integration and interconnection between medical devices among each other and to (medical) information systems, including plug-and-play functionality. This system will improve patient's safety by making technical complexity of a comprehensive integration manageable. It will be available as open standards that are part of the IEEE 11073 family of standards. The solution consists of a service-oriented communication technology, the so called Medical Devices Profile for Web Services (MDPWS), a Domain Information & Service Model, and a binding between the first two mechanisms. A proof of this concept has been done with demonstrators of real world OR devices.

  17. A cost-effective measurement-device-independent quantum key distribution system for quantum networks

    Science.gov (United States)

    Valivarthi, Raju; Zhou, Qiang; John, Caleb; Marsili, Francesco; Verma, Varun B.; Shaw, Matthew D.; Nam, Sae Woo; Oblak, Daniel; Tittel, Wolfgang

    2017-12-01

    We experimentally realize a measurement-device-independent quantum key distribution (MDI-QKD) system. It is based on cost-effective and commercially available hardware such as distributed feedback lasers and field-programmable gate arrays that enable time-bin qubit preparation and time-tagging, and active feedback systems that allow for compensation of time-varying properties of photons after transmission through deployed fiber. We examine the performance of our system, and conclude that its design does not compromise performance. Our demonstration paves the way for MDI-QKD-based quantum networks in star-type topology that extend over more than 100 km distance.

  18. Knowledge network for medical technology management in Mexico.

    Science.gov (United States)

    Licona, Fabiola Martínez; Leehan, Joaquín Azpiroz; Méndez, Miguel Cadena; Yuriar, Salvador Duarte; Salazar, Raúl Molina; Gilmore, Amador Terán

    2009-10-01

    The role of biomedical engineers (BMEs) has changed widely over the years, from managing a group of technicians to the planning of large installations and the management of medical technology countrywide. As the technology has advanced, the competence of BMEs has been challenged because it is no longer possible to be an expert in every component of the technology involved in running a hospital. Our approach has been to form a network of professionals that are experts in different fields related to medical technology, where work is coordinated to provide high quality services at the planning and execution stages of projects related to medical technology. A study of the procedures involved in the procurement of medical technology has been carried out over the years. These experiences have been compared with several case studies where the approach to problem solving in this area has been multidisciplinary. Planning and execution phases of projects involving medical technology management have been identified. After several instances of collaboration among experts from different fields, a network for management of healthcare technology has been formed at our institution that incorporates the experience from different departments that were dealing separately with projects involving medical technology. This network has led us to propose this approach to solve medical technology management projects, where the strengths of each subgroup complement each other. This structure will lead to a more integrated approach to healthcare technology management and will ensure higher quality solutions.

  19. Agile Management and Interoperability Testing of SDN/NFV‐Enriched 5G Core Networks

    Directory of Open Access Journals (Sweden)

    Taesang Choi

    2018-02-01

    Full Text Available In the fifth generation (5G era, the radio internet protocol capacity is expected to reach 20 Gb/s per sector, and ultralarge content traffic will travel across a faster wireless/wireline access network and packet core network. Moreover, the massive and mission‐critical Internet of Things is the main differentiator of 5G services. These types of real‐time and large‐bandwidth‐consuming services require a radio latency of less than 1 ms and an end‐to‐end latency of less than a few milliseconds. By distributing 5G core nodes closer to cell sites, the backhaul traffic volume and latency can be significantly reduced by having mobile devices download content immediately from a closer content server. In this paper, we propose a novel solution based on software‐defined network and network function virtualization technologies in order to achieve agile management of 5G core network functionalities with a proof‐of‐concept implementation targeted for the PyeongChang Winter Olympics and describe the results of interoperability testing experiences between two core networks.

  20. Using a CLIPS expert system to automatically manage TCP/IP networks and their components

    Science.gov (United States)

    Faul, Ben M.

    1991-01-01

    A expert system that can directly manage networks components on a Transmission Control Protocol/Internet Protocol (TCP/IP) network is described. Previous expert systems for managing networks have focused on managing network faults after they occur. However, this proactive expert system can monitor and control network components in near real time. The ability to directly manage network elements from the C Language Integrated Production System (CLIPS) is accomplished by the integration of the Simple Network Management Protocol (SNMP) and a Abstract Syntax Notation (ASN) parser into the CLIPS artificial intelligence language.

  1. Processes in construction of failure management expert systems from device design information

    Science.gov (United States)

    Malin, Jane T.; Lance, Nick

    1987-01-01

    This paper analyzes the tasks and problem solving methods used by an engineer in constructing a failure management expert system from design information about the device to te diagnosed. An expert test engineer developed a trouble-shooting expert system based on device design information and experience with similar devices, rather than on specific expert knowledge gained from operating the device or troubleshooting its failures. The construction of the expert system was intensively observed and analyzed. This paper characterizes the knowledge, tasks, methods, and design decisions involved in constructing this type of expert system, and makes recommendations concerning tools for aiding and automating construction of such systems.

  2. Research on two-port network of wavelet transform processor using surface acoustic wavelet devices and its application.

    Science.gov (United States)

    Liu, Shoubing; Lu, Wenke; Zhu, Changchun

    2017-11-01

    The goal of this research is to study two-port network of wavelet transform processor (WTP) using surface acoustic wave (SAW) devices and its application. The motive was prompted by the inconvenience of the long research and design cycle and the huge research funding involved with traditional method in this field, which were caused by the lack of the simulation and emulation method of WTP using SAW devices. For this reason, we introduce the two-port network analysis tool, which has been widely used in the design and analysis of SAW devices with uniform interdigital transducers (IDTs). Because the admittance parameters calculation formula of the two-port network can only be used for the SAW devices with uniform IDTs, this analysis tool cannot be directly applied into the design and analysis of the processor using SAW devices, whose input interdigital transducer (IDT) is apodized weighting. Therefore, in this paper, we propose the channel segmentation method, which can convert the WTP using SAW devices into parallel channels, and also provide with the calculation formula of the number of channels, the number of finger pairs and the static capacitance of an interdigital period in each parallel channel firstly. From the parameters given above, we can calculate the admittance parameters of the two port network for each channel, so that we can obtain the admittance parameter of the two-port network of the WTP using SAW devices on the basis of the simplification rule of parallel two-port network. Through this analysis tool, not only can we get the impulse response function of the WTP using SAW devices but we can also get the matching circuit of it. Large numbers of studies show that the parameters of the two-port network obtained by this paper are consistent with those measured by network analyzer E5061A, and the impulse response function obtained by the two-port network analysis tool is also consistent with that measured by network analyzer E5061A, which can meet the

  3. Design and Realization of a Condition Management System for the Gateway Electrical Energy Metering Device

    Directory of Open Access Journals (Sweden)

    Chao Tang

    2013-12-01

    Full Text Available With the construction of firm and intelligent power grid in China, it is difficult for the traditional management method of electrical energy metering device to meet the prospecting requirements. Using the computer and internet techniques to realize the information and intelligentization of the electrical energy metering management has become a necessary guarantee of improving power supply ability, marketing control, and customer service. This paper introduced a kind of large and intelligent condition management system of the gateway electrical energy metering device. The key technologies and realize process were analyzed. Moreover, a detailed description of the application modules such as the GIS smart display of metering point, the condition management of metering devices and the visual monitoring of metering point was presented. The trial operation in the selected transformer substations and the power stations of Chongqing Power Electrical Corp. indicated that, the condition management system is very open, safety and efficient. According to the data exchange with the production and scheduling platform, the system improved the efficient operation of the electrical energy metering devices. Meanwhile, combined with the real-time visual monitoring, the condition management system improved the prevention ability of electricity filching, realized the unified automatic large-scale management of electrical energy metering devices.

  4. Product Cost Management Structures: a review and neural network modelling

    Directory of Open Access Journals (Sweden)

    P. Jha

    2003-11-01

    Full Text Available This paper reviews the growth of approaches in product costing and draws synergies with information management and resource planning systems, to investigate potential application of state of the art modelling techniques of neural networks. Increasing demands on costing systems to serve multiple decision-making objectives, have made it essential to use better techniques for analysis of available data. This need is highlighted in the paper. The approach of neural networks, which have several analogous facets to complement and aid the information demands of modern product costing, Enterprise Resource Planning (ERP structures and the dominant-computing environment (for information management in the object oriented paradigm form the domain for investigation. Simulated data is used in neural network applications across activities that consume resources and deliver products, to generate information for monitoring and control decisions. The results in application for feature extraction and variation detection and their implications are presented in the paper.

  5. Social Networking for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  6. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history....... Including their possible application on a national security level for managing longer strategic endeavors....

  7. Bayesian probabilistic network approach for managing earthquake risks of cities

    DEFF Research Database (Denmark)

    Bayraktarli, Yahya; Faber, Michael

    2011-01-01

    This paper considers the application of Bayesian probabilistic networks (BPNs) to large-scale risk based decision making in regard to earthquake risks. A recently developed risk management framework is outlined which utilises Bayesian probabilistic modelling, generic indicator based risk models...

  8. International agri-food chains and networks. Management and Organization

    NARCIS (Netherlands)

    Bijman, J.; Omta, S.W.F.; Trienekens, J.H.; Wijnands, J.H.M.; Wubben, E.F.M.

    2006-01-01

    This book brings together a rich collection of papers on management and organization in agri-food chains and networks. Producers, processors, traders and retailers of agricultural and food products operate in an economic and institutional environment that is increasingly dominated by global

  9. Double-NAT Based Mobility Management for Future LTE Networks

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture and develop a novel IP mobility management solution for it. The proposed solution can handle traffic redirecting and IP address continuity above the distributed anchor

  10. Key Management Building Blocks for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Palaniswami, M

    2007-01-01

    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the

  11. Radio Resource Management in WiMAX Networks

    NARCIS (Netherlands)

    Jorguseski, L.; Prasad, R.

    2010-01-01

    This chapter presents the general Radio Resource Management (RRM) problem in wireless access networks and gives performance evaluations for different downlink resource (sub-carrier) allocation algorithms in WiMAX TDD systems based on OFDMA wireless access. This is particularly important in downlink

  12. Quality-Aware Resource Management for Wireless Sensor Networks

    NARCIS (Netherlands)

    Gemesi, R.; Meratnia, Nirvana; Havinga, Paul J.M.; Anderson, J.H.; Prencipe, G.; Wattenhoffer, R.

    2005-01-01

    Due to the distributed and resource constrained nature of wireless sensor networks, their design proves to be difficult. We present a resource management framework, which integrates a data-centric lightweight operating system with a publish/subscribe middleware. In this framework, the main system

  13. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  14. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  15. Managing a large academic CD-ROM network

    OpenAIRE

    Seidler, Wolfram; Oberhauser, Otto

    1996-01-01

    Describes one of the largest CD-ROM networks in Europe, managed by the University of Vienna Library over the past 3 years. Discusses background, history of the project, the current technical status, use of the system, some economic aspects, and current issues and problems.

  16. Idea Management: Perspectives from Leadership, Learning, and Network Theory

    NARCIS (Netherlands)

    D. Deichmann (Dirk)

    2012-01-01

    textabstractIn this dissertation, we focus on how leadership styles, individual learning behaviors, and social network structures drive or inhibit organizational members to repeatedly generate and develop innovative ideas. Taking the idea management programs of three multinational companies as the

  17. Microgrids in Active Network Management-Part I

    DEFF Research Database (Denmark)

    Palizban, Omid; Kauhaniemia, Kimmo; Guerrero, Josep M.

    2014-01-01

    The microgrid concept has been closely investigated and implemented by numerous experts worldwide. The first part of this paper describes the principles of microgrid design, considering the operational concepts and requirements arising from participation in active network management. Over the last...

  18. Modeling Social Influences in a Knowledge Management Network

    Science.gov (United States)

    Franco, Giacomo; Maresca, Paolo; Nota, Giancarlo

    2010-01-01

    The issue of knowledge management in a distributed network is receiving increasing attention from both scientific and industrial organizations. Research efforts in this field are motivated by the awareness that knowledge is more and more perceived as a primary economic resource and that, in the context of organization of organizations, the…

  19. Organizational network in trauma management in Italy

    Directory of Open Access Journals (Sweden)

    Osvaldo Chiara

    2005-10-01

    Full Text Available In Italy, as in other western countries, trauma is a leading cause of death during the first four decades of life, with almost 18.000 of deaths per year. Since 80s organized systems for trauma care, including a pre-hospital emergency medical system and a network of hospitals designated as Trauma Centres, have been developed in north American countries. Effectiveness of trauma systems has been investigated comparing the post-system to the pre-system trauma care with the method of panel evaluation of preventable death rates and comparison of observed survival with expected probability of survival. In Italy, a pre-hospital emergency medical system has been implemented on a national scale, while a trauma network has not been developed. Nowadays, trauma patients are often admitted to the closest hospital, independently from local resources. The Superior Council of Ministry of Health has presented in 2004 a new trauma system model (SIAT based on the recognition in the field of patients with more serious injuries and the transportation to general hospitals with resources and multidisciplinary teams specialized in trauma care (trauma team. The designation of few trauma team hospitals, one highly specialized Centre (CTS and two area Centres (CTZ every two millions of inhabitants allows each Centre to treat at least 250 severe trauma patients per year to increase experience. Less severe injured patients may be treated in non-trauma team acute care facilities, according to the inclusive system model. The development of trauma team services in some Italian hospitals has demonstrated an increase in survival and a decrease in preventable death rate from 42% to 7,6%. Economic studies of Ministry of Health have established that the implementation of a trauma system model on a national scale with a 25% decrease of preventable trauma deaths and disabilities would save 7500 million of euros of public money. Therefore, in our country the concentration of severely

  20. Performance Analysis of Wireless Networks for Industrial Automation-Process Automation (WIA-PA)

    Science.gov (United States)

    2017-09-01

    distributed allocation is completed by the network manager . The network manager allocates 2 resources to the cluster heads, and then the cluster heads...allocate resources to the devices within their clusters. This is in contrast to WirelessHart where the network manager allocates resources to all devices...connectivity and routing. The field devices are sensors and the handheld devices are remote network management or user access points. 3.2.2 Topology The

  1. Error performance analysis in downlink cellular networks with interference management

    KAUST Repository

    Afify, Laila H.

    2015-05-01

    Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly abstract many important wireless communication system aspects (e.g., modulation techniques, signal recovery techniques). Recently, a novel stochastic geometry model, based on the Equivalent-in-Distribution (EiD) approach, succeeded to capture the aforementioned communication system aspects and extend the analysis to averaged error performance, however, on the expense of increasing the modeling complexity. Inspired by the EiD approach, the analysis developed in [1] takes into consideration the key system parameters, while providing a simple tractable analysis. In this paper, we extend this framework to study the effect of different interference management techniques in downlink cellular network. The accuracy of the proposed analysis is verified via Monte Carlo simulations.

  2. Advanced Energy Storage Management in Distribution Network

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Guodong [ORNL; Ceylan, Oguzhan [ORNL; Xiao, Bailu [ORNL; Starke, Michael R [ORNL; Ollis, T Ben [ORNL; King, Daniel J [ORNL; Irminger, Philip [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

    2016-01-01

    With increasing penetration of distributed generation (DG) in the distribution networks (DN), the secure and optimal operation of DN has become an important concern. In this paper, an iterative mixed integer quadratic constrained quadratic programming model to optimize the operation of a three phase unbalanced distribution system with high penetration of Photovoltaic (PV) panels, DG and energy storage (ES) is developed. The proposed model minimizes not only the operating cost, including fuel cost and purchasing cost, but also voltage deviations and power loss. The optimization model is based on the linearized sensitivity coefficients between state variables (e.g., node voltages) and control variables (e.g., real and reactive power injections of DG and ES). To avoid slow convergence when close to the optimum, a golden search method is introduced to control the step size and accelerate the convergence. The proposed algorithm is demonstrated on modified IEEE 13 nodes test feeders with multiple PV panels, DG and ES. Numerical simulation results validate the proposed algorithm. Various scenarios of system configuration are studied and some critical findings are concluded.

  3. Energy management in mobile devices with the cinder operating system

    KAUST Repository

    Roy, Arjun

    2011-01-01

    We argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. We present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. We identify three key properties of control - isolation, delegation, and subdivision - and show how using these abstractions can achieve them. We also show how the architecture of the HiStar information-flow control kernel lends itself well to energy control. We prototype and evaluate Cinder on a popular smartphone, the Android G1. Copyright © 2011 ACM.

  4. A Generic Context Management Framework for Personal Networking Environments

    DEFF Research Database (Denmark)

    Sanchez, Luis; Olsen, Rasmus Løvenstein; Bauer, Martin

    2006-01-01

    In this paper we introduce a high level architecture for a context management system for Personal Networks (PN). The main objective of the Context Management Framework (CMF) described in this paper is to support the interactions between context information sources and context aware components...... on their computational capabilities and their role within the system. We differentiate between Basic Context Nodes (BCN), Enhanced Context Nodes (ECN) and Context Management Nodes (CMN) within the CMF. CMNs operate on two levels, i.e., local/cluster level and PN level. In the paper we also describe how these entities...

  5. Dynamic Subsidy Method for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei

    2016-01-01

    Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion...... of the Roy Billinton Test System (RBTS) with high penetration of electric vehicles (EVs) and heat pumps (HPs). The case studies demonstrate the efficacy of the DS method for congestion management in distribution networks. Studies in this paper show that the DS method offers the customers a fair opportunity...

  6. [Management of preeclampsia in a perinatal network].

    Science.gov (United States)

    Winer, N; Branger, B

    2010-04-01

    At community level, the perinatal management can be summarized as follows: - A patient with a previous history of PE, with a currently uneventful pregnancy, may be followed-up at community level by a midwife or her GP, on the condition that she underwent a preliminary OG consultation, preferably pre-conceptually, producing a series of written recommendations for this patient's follow-up. - In case of moderately severe PE, investigations are to be carried out by the OG on an in-patient basis and a tight follow-up organized. (convention or written protocol). - In case of severe PE, immediate admission is compulsory. The birthplace is to be chosen according to gestational age, criteria for maternal and foetal distress and the anticipated need for post-natal intensive care admission. This must be concluded by a post-partum consultation with the OG. Copyright 2010 Elsevier Masson SAS. All rights reserved.

  7. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Álvaro Sigüenza; Vercher, Jesús Bernat; Gómez, Luis Alfonso Hernández

    2014-01-01

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs. PMID:24945678

  8. A ubiquitous sensor network platform for integrating smart devices into the semantic sensor web.

    Science.gov (United States)

    de Vera, David Díaz Pardo; Izquierdo, Alvaro Sigüenza; Vercher, Jesús Bernat; Hernández Gómez, Luis Alfonso

    2014-06-18

    Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN) Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted) information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.

  9. A Ubiquitous Sensor Network Platform for Integrating Smart Devices into the Semantic Sensor Web

    Directory of Open Access Journals (Sweden)

    David Díaz Pardo de Vera

    2014-06-01

    Full Text Available Ongoing Sensor Web developments make a growing amount of heterogeneous sensor data available to smart devices. This is generating an increasing demand for homogeneous mechanisms to access, publish and share real-world information. This paper discusses, first, an architectural solution based on Next Generation Networks: a pilot Telco Ubiquitous Sensor Network (USN Platform that embeds several OGC® Sensor Web services. This platform has already been deployed in large scale projects. Second, the USN-Platform is extended to explore a first approach to Semantic Sensor Web principles and technologies, so that smart devices can access Sensor Web data, allowing them also to share richer (semantically interpreted information. An experimental scenario is presented: a smart car that consumes and produces real-world information which is integrated into the Semantic Sensor Web through a Telco USN-Platform. Performance tests revealed that observation publishing times with our experimental system were well within limits compatible with the adequate operation of smart safety assistance systems in vehicles. On the other hand, response times for complex queries on large repositories may be inappropriate for rapid reaction needs.

  10. An Overview of Optical Network Bandwidth and Fault Management

    Directory of Open Access Journals (Sweden)

    J.A. Zubairi

    2010-09-01

    Full Text Available This paper discusses the optical network management issues and identifies potential areas for focused research. A general outline of the main components in optical network management is given and specific problems in GMPLS based model are explained. Later, protection and restoration issues are discussed in the broader context of fault management and the tools developed for fault detection are listed. Optical networks need efficient and reliable protection schemes that restore the communications quickly on the occurrence of faults without causing failure of real-time applications using the network. A holistic approach is required that provides mechanisms for fault detection, rapid restoration and reversion in case of fault resolution. Since the role of SDH/SONET is diminishing, the modern optical networks are poised towards the IP-centric model where high performance IP-MPLS routers manage a core intelligent network of IP over WDM. Fault management schemes are developed for both the IP layer and the WDM layer. Faults can be detected and repaired locally and also through centralized network controller. A hybrid approach works best in detecting the faults where the domain controller verifies the established LSPs in addition to the link tests at the node level. On detecting a fault, rapid restoration can perform localized routing of traffic away from the affected port and link. The traffic may be directed to pre-assigned backup paths that are established as shared or dedicated resources. We examine the protection issues in detail including the choice of layer for protection, implementing protection or restoration, backup path routing, backup resource efficiency, subpath protection, QoS traffic survival and multilayer protection triggers and alarm propagation. The complete protection cycle is described and mechanisms incorporated into RSVP-TE and other protocols for detecting and recording path errors are outlined. In addition, MPLS testbed

  11. Best practices for health technology management. Valuable lessons from the 2010 Health Devices Achievement Award finalists.

    Science.gov (United States)

    2010-12-01

    The annual health devices achievement award competition provides a valuable opportunity for us to learn about--and share--some of the outstanding technology management initiatives implemented by our members. This year's top submissions describe best practices and effective techniques that other healthcare facilities can emulate to improve patient safety, reduce costs, and facilitate better strategic management of health technology.

  12. A Data Scheduling and Management Infrastructure for the TEAM Network

    Science.gov (United States)

    Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.

    2009-04-01

    currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the

  13. Is There a Future for Remote Cardiac Implantable Electronic Device Management?

    Science.gov (United States)

    Burri, Haran

    2017-08-01

    In the era of communication technology, remote monitoring has been a paradigm shift in the way patients with cardiac implantable electronic devices are managed. It has been endorsed by scientific societies and is being increasingly adopted in the clinical setting. Despite the various advantages associated with this strategy, data on improved clinical outcome are still sparse. The recently published study on the remote management of heart failure using implanted devices and formalised follow-up procedures, which turned out to be negative, has cast doubt on whether remote monitoring should still be used. This article provides a critical appraisal of the study, and discusses the issue of remote data management.

  14. Display Device Color Management and Visual Surveillance of Vehicles

    Science.gov (United States)

    Srivastava, Satyam

    2011-01-01

    Digital imaging has seen an enormous growth in the last decade. Today users have numerous choices in creating, accessing, and viewing digital image/video content. Color management is important to ensure consistent visual experience across imaging systems. This is typically achieved using color profiles. In this thesis we identify the limitations…

  15. Data base management system configuration specification. [computer storage devices

    Science.gov (United States)

    Neiers, J. W.

    1979-01-01

    The functional requirements and the configuration of the data base management system are described. Techniques and technology which will enable more efficient and timely transfer of useful data from the sensor to the user, extraction of information by the user, and exchange of information among the users are demonstrated.

  16. An emerging network storage management standard: Media error monitoring and reporting information (MEMRI) - to determine optical tape data integrity

    Science.gov (United States)

    Podio, Fernando; Vollrath, William; Williams, Joel; Kobler, Ben; Crouse, Don

    1998-01-01

    Sophisticated network storage management applications are rapidly evolving to satisfy a market demand for highly reliable data storage systems with large data storage capacities and performance requirements. To preserve a high degree of data integrity, these applications must rely on intelligent data storage devices that can provide reliable indicators of data degradation. Error correction activity generally occurs within storage devices without notification to the host. Early indicators of degradation and media error monitoring 333 and reporting (MEMR) techniques implemented in data storage devices allow network storage management applications to notify system administrators of these events and to take appropriate corrective actions before catastrophic errors occur. Although MEMR techniques have been implemented in data storage devices for many years, until 1996 no MEMR standards existed. In 1996 the American National Standards Institute (ANSI) approved the only known (world-wide) industry standard specifying MEMR techniques to verify stored data on optical disks. This industry standard was developed under the auspices of the Association for Information and Image Management (AIIM). A recently formed AIIM Optical Tape Subcommittee initiated the development of another data integrity standard specifying a set of media error monitoring tools and media error monitoring information (MEMRI) to verify stored data on optical tape media. This paper discusses the need for intelligent storage devices that can provide data integrity metadata, the content of the existing data integrity standard for optical disks, and the content of the MEMRI standard being developed by the AIIM Optical Tape Subcommittee.

  17. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  18. An optimized electronic device for solar power harvesting dedicated to wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Le Cam, Vincent; Le Maulf, Regis; Lemarchand, Laurent; Martin, William; Le Pen, Mathieu [LUNAM Univ., Bouguenais (France). IFSTTAR, MACS Dept.

    2012-07-01

    For economics as for practical reasons, this last decade, the use and dissemination of wireless sensor networks (WSN) became obvious; particularly in structural heath monitoring (SHM) use-cases where distances between sensors could be long and access to the structure quite difficult. Even if efforts are leaded to design small components and RF modules that ask for low-power, the need of an external source is often necessary. After have acquired knowledge in solar cells as in batteries technologies and methods to control charge/discharge phases as in optimizing algorithms, IFSTTAR laboratory has designed an electronic device that integrates those progress. This electronic device has a quite generic mission: for a panel of batteries chemistry (Lithium, NiMh) and a panel of solar cells sources (frome mW to some W), the system acts as an improved battery charger whatever the load ask for power. The system applies control algorithms based on battery capacity and chemistry profile. It also applies the MPPT (Maximum Power Point Tracking) algorithm. At any time, battery State Of Charge (SOC) can be requested via I2C bus as well as a warning signal is output when SOC becomes critical. Through standard pin connectors and a simple I2C interface, the system can be used by many wireless devices (sensors) that have to run autonomously. After the presentation of this system, a focus on its application on a real use-case will be given. (orig.)

  19. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    Science.gov (United States)

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  20. Reducing domestic heating demand: Managing the impact of behavior-changing feedback devices via marketing.

    Science.gov (United States)

    Jensen, Thorben; Chappin, Émile J L

    2017-07-15

    Feedback devices can be used to inform households about their energy-consumption behavior. This may persuade them to practice energy conservation. The use of feedback devices can also-via word of mouth-spread among households and thereby support the spread of the incentivized behavior, e.g. energy-efficient heating behavior. This study investigates how to manage the impact of these environmental innovations via marketing. Marketing activities can support the diffusion of devices. This study aims to identify the most effective strategies of marketing feedback devices. We did this by adapting an agent-based model to simulate the roll-out of a novel feedback technology and heating behavior within households in a virtual city. The most promising marketing strategies were simulated and their impacts were analyzed. We found it particularly effective to lend out feedback devices to consumers, followed by leveraging the social influence of well-connected individuals, and giving away the first few feedback devices for free. Making households aware of the possibility of purchasing feedback devices was found to be least effective. However, making households aware proved to be most cost-efficient. This study shows that actively managing the roll-out of feedback devices can increase their impacts on energy-conservation both effectively and cost-efficiently. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. D-MSR: A Distributed Network Management Scheme for Real-Time Monitoring and Process Control Applications in Wireless Industrial Automation

    Directory of Open Access Journals (Sweden)

    Paul Havinga

    2013-06-01

    Full Text Available Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  2. D-MSR: a distributed network management scheme for real-time monitoring and process control applications in wireless industrial automation.

    Science.gov (United States)

    Zand, Pouria; Dilo, Arta; Havinga, Paul

    2013-06-27

    Current wireless technologies for industrial applications, such as WirelessHART and ISA100.11a, use a centralized management approach where a central network manager handles the requirements of the static network. However, such a centralized approach has several drawbacks. For example, it cannot cope with dynamicity/disturbance in large-scale networks in a real-time manner and it incurs a high communication overhead and latency for exchanging management traffic. In this paper, we therefore propose a distributed network management scheme, D-MSR. It enables the network devices to join the network, schedule their communications, establish end-to-end connections by reserving the communication resources for addressing real-time requirements, and cope with network dynamicity (e.g., node/edge failures) in a distributed manner. According to our knowledge, this is the first distributed management scheme based on IEEE 802.15.4e standard, which guides the nodes in different phases from joining until publishing their sensor data in the network. We demonstrate via simulation that D-MSR can address real-time and reliable communication as well as the high throughput requirements of industrial automation wireless networks, while also achieving higher efficiency in network management than WirelessHART, in terms of delay and overhead.

  3. Integrated resource management for Hybrid Optical Wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    Efficient utilization of available bandwidth over hybrid optical wireless networks is a critical issue, especially for multimedia applications with high data rates and stringent Quality of Service (QoS) requirements. In this paper, we propose an integrated resource management including an enhanced...... resource sharing scheme and an integrated admission control scheme for the hybrid optical wireless networks. It provides QoS guarantees for connections through both optical and wireless domain. Simulation results show that our proposed scheme improves QoS performances in terms of high throughput and low...

  4. Distribution Networks Management with High Penetration of Photovoltaic Panels

    DEFF Research Database (Denmark)

    Morais, Hugo

    2013-01-01

    The photovoltaic solar panels penetration increases significantly in recent years in several European countries, mainly in the low voltage and medium voltage networks supported by governmental policies and incentives. Consequently, the acquisition and installation costs of PV panels decrease...... and the know–how increase significantly. Presently is important the use of new management methodologies in distribution networks to support the growing penetration of PV panels. In some countries, like in Germany and in Italy, the solar generation based in photovoltaic panels supply 40% of the demand in some...

  5. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... describes a proposal for scalable and hybrid radio resource management to efficiently integrate the different WINNER system modes. Index...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  6. Hybrid Networks and Risk Management in a System Perspective

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    intelligent, autonomous systems and human operators in multi-domain Battle Management Networks, (i.e Command, Control, Communications, Computer and Intelligence (C4I) networks/sensor grids). However, the incorporation of intelligent and autonomous weapon systems in complex military operations introduces both...... new possibilities and new types of risk, as well as legal and ethical concerns. At the same time, the rapid acceleration and hybridization of the battlespace challenges the classical military bureaucracies and its legal-rational decision-making processes. This paper will address some of the legal...

  7. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  8. Design and Implementation of Novel Smart Battery Management System for FPGA Based Portable Electronic Devices

    Directory of Open Access Journals (Sweden)

    Fangrong Xue

    2017-02-01

    Full Text Available This paper presents the analysis and design of a smart battery management system for Field Programmable Gate Array (FPGA based portable electronic devices. It is a novel concept of incorporating the functionality of a smart battery management system into the FPGA used by portable electronic devices, which provides the following advantages. (1 It lowers cost since the conventional commercial independent battery management circuit can be eliminated; (2 It offers more flexibility because FPGA based battery management algorithms can be specifically designed for different battery chemistries of different devices and can provide the flexibility of algorithms and functionalities updating as well. Smart battery management system concepts include four aspects: (1 smart charging; (2 battery balancing; (3 smart discharging; and (4 safety operating. One novel charging algorithm, which combines the merits of multistage charging and pulse charging, is proposed to charge a Li-ion battery pack smartly. A Proportional Integral (PI control method is introduced to achieve the current control of charging circuit with considerable close loop stability. Simulation results from the PSIM 9.0.4 software package and experimental results from the prototype built in the lab are demonstrated to verify the effectiveness of smart charging. The realizations of battery balancing, smart discharging, and safety operating are also briefly described by taking advantage of the proposed FPGA based smart battery management system topology, which verify the feasibility of the proposed FPGA based smart battery management system for portable electronic devices.

  9. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  10. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  11. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    Science.gov (United States)

    2007-01-15

    system, thus entangling legitimate changes with those of the intruders. Once an intru- sion has been detected and discontinued, the system...file sharing clients (e.g., Kazza). 103 SELF-SECURING STORAGE & VERSIONING FILE SYSTEM COMPONENTS Both SoBig and MyDoom exhibit unique and atypical ...aggregate throttling penalizes hosts with atypical traffic patterns, thereby con- tributing to a higher false positive rate. We can increase the

  12. Usage Based Building Management through Wireless Sensor Networks

    Science.gov (United States)

    Erickson, Varick L.

    Wireless sensor networks (WSNs) is a field with broad variety of applications. Its flexibility for remote continuous measurement lends itself to applications ranging from locating snipers to measuring volcanic activity. One application that stands to substantially benefit from WSNs is building management. Buildings currently account for 41% of the total energy consumption of U.S. [bed11]. Reducing this energy is of critical importance if we are to achieve sustainability. In most commercial buildings, many rooms remain unoccupied or are conditioned assuming maximum occupancy. By relaxing temperature setbacks and adjusting ventilation to match actual occupancy, significant energy savings are possible. This Dissertation examines the use of wireless sensor networks for the purpose of building energy management and actuation. It explores the design and development of wireless sensor networks for building energy management, how data from these deployments are utilized, the development and implementation of data driven occupancy models to perform simulation and prediction, how data models are used to actuate building management systems, and how crowd-sourced data can be integrated into building control strategies. We show based on real-world data that 30% energy savings is possible through usage based strategies and that 80% occupant satisfaction rates are possible by occupant driven control strategies.

  13. UbiMMS: an ubiquitous medication monitoring system based on remote device management methods.

    Science.gov (United States)

    Pak, JuGeon; Park, KeeHyun

    2012-01-01

    Medication adherence is one of the most important factors in treating chronic diseases. However, current medication dispensers, which are devices that deliver medication to chronic disease patients according to predetermined schedules, are not equipped with internal remote management functions. Here, we propose a ubiquitous medication monitoring system (UbiMMS) that provides remote functions for medication status transmission, configuration management, software management, and real-time error management. We provide an overview and performance evaluation of the UbiMMS, and show that the proposed system is adequate for remotely monitoring and managing a medication dispenser in real time.

  14. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations

    Directory of Open Access Journals (Sweden)

    Tayfun Gokmen

    2016-07-01

    Full Text Available In recent years, deep neural networks (DNN have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30,000X compared to state-of-the-art microprocessors while providing power efficiency of 84,000 GigaOps/s/W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things sensors.

  15. Acceleration of Deep Neural Network Training with Resistive Cross-Point Devices: Design Considerations.

    Science.gov (United States)

    Gokmen, Tayfun; Vlasov, Yurii

    2016-01-01

    In recent years, deep neural networks (DNN) have demonstrated significant business impact in large scale analysis and classification tasks such as speech recognition, visual object detection, pattern extraction, etc. Training of large DNNs, however, is universally considered as time consuming and computationally intensive task that demands datacenter-scale computational resources recruited for many days. Here we propose a concept of resistive processing unit (RPU) devices that can potentially accelerate DNN training by orders of magnitude while using much less power. The proposed RPU device can store and update the weight values locally thus minimizing data movement during training and allowing to fully exploit the locality and the parallelism of the training algorithm. We evaluate the effect of various RPU device features/non-idealities and system parameters on performance in order to derive the device and system level specifications for implementation of an accelerator chip for DNN training in a realistic CMOS-compatible technology. For large DNNs with about 1 billion weights this massively parallel RPU architecture can achieve acceleration factors of 30, 000 × compared to state-of-the-art microprocessors while providing power efficiency of 84, 000 GigaOps∕s∕W. Problems that currently require days of training on a datacenter-size cluster with thousands of machines can be addressed within hours on a single RPU accelerator. A system consisting of a cluster of RPU accelerators will be able to tackle Big Data problems with trillions of parameters that is impossible to address today like, for example, natural speech recognition and translation between all world languages, real-time analytics on large streams of business and scientific data, integration, and analysis of multimodal sensory data flows from a massive number of IoT (Internet of Things) sensors.

  16. Three-terminal ferroelectric synapse device with concurrent learning function for artificial neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Nishitani, Y.; Kaneko, Y.; Ueda, M.; Fujii, E. [Advanced Technology Research Laboratories, Panasonic Corporation, Seika, Kyoto 619-0237 (Japan); Morie, T. [Graduate School of Life Science and Systems Engineering, Kyushu Institute of Technology, Wakamatsu-ku, Kitakyushu 808-0196 (Japan)

    2012-06-15

    Spike-timing-dependent synaptic plasticity (STDP) is demonstrated in a synapse device based on a ferroelectric-gate field-effect transistor (FeFET). STDP is a key of the learning functions observed in human brains, where the synaptic weight changes only depending on the spike timing of the pre- and post-neurons. The FeFET is composed of the stacked oxide materials with ZnO/Pr(Zr,Ti)O{sub 3} (PZT)/SrRuO{sub 3}. In the FeFET, the channel conductance can be altered depending on the density of electrons induced by the polarization of PZT film, which can be controlled by applying the gate voltage in a non-volatile manner. Applying a pulse gate voltage enables the multi-valued modulation of the conductance, which is expected to be caused by a change in PZT polarization. This variation depends on the height and the duration of the pulse gate voltage. Utilizing these characteristics, symmetric and asymmetric STDP learning functions are successfully implemented in the FeFET-based synapse device by applying the non-linear pulse gate voltage generated from a set of two pulses in a sampling circuit, in which the two pulses correspond to the spikes from the pre- and post-neurons. The three-terminal structure of the synapse device enables the concurrent learning, in which the weight update can be performed without canceling signal transmission among neurons, while the neural networks using the previously reported two-terminal synapse devices need to stop signal transmission for learning.

  17. Contribution to the Management of Traffic in Networks

    Directory of Open Access Journals (Sweden)

    Filip Chamraz

    2014-01-01

    Full Text Available The paper deals with Admission control methods (AC in IMS networks (IP multimedia subsystem as one of the elements that help ensure QoS (Quality of service. In the paper we are trying to choose the best AC method for selected IMS network to allow access to the greatest number of users. Of the large number of methods that were tested and considered good we chose two. The paper compares diffusion method and one of the measurement based method, specifically „Simple Sum“. Both methods estimate effective bandwidth to allow access for the greatest number of users/devices and allow them access to prepaid services or multimedia content.

  18. LOCAL AREA NETWORK MANAGEMENT (Case Study at Assessment and Development Information Technology Units Brawijaya University Malang)

    OpenAIRE

    Hadiwijaya, Mohammad Firman

    2015-01-01

    The purpose of this study was to know the management local area network at Assessment and Development Information Technology units, furthermore this study focusing on network management functions that applied by Assessment and Development Information Technology Units. This study will explain about the implementation of network management functions in the local area network management. The research method employ in this research is by using descriptive qualitative method by study case approach...

  19. Critical Assessment of Implantable Drug Delivery Devices in Glaucoma Management

    Directory of Open Access Journals (Sweden)

    Dharani Manickavasagam

    2013-01-01

    Full Text Available Glaucoma is a group of heterogeneous disorders involving progressive optic neuropathy that can culminate into visual impairment and irreversible blindness. Effective therapeutic interventions must address underlying vulnerability of retinal ganglion cells (RGCs to degeneration in conjunction with correcting other associated risk factors (such as elevated intraocular pressure. However, realization of therapeutic outcomes is heavily dependent on suitable delivery system that can overcome myriads of anatomical and physiological barriers to intraocular drug delivery. Development of clinically viable sustained release systems in glaucoma is a widely recognized unmet need. In this regard, implantable delivery systems may relieve the burden of chronic drug administration while potentially ensuring high intraocular drug bioavailability. Presently there are no FDA-approved implantable drug delivery devices for glaucoma even though there are several ongoing clinical studies. The paper critically assessed the prospects of polymeric implantable delivery systems in glaucoma while identifying factors that can dictate (a patient tolerability and acceptance, (b drug stability and drug release profiles, (c therapeutic efficacy, and (d toxicity and biocompatibility. The information gathered could be useful in future research and development efforts on implantable delivery systems in glaucoma.

  20. Performance Gains of Propellant Management Devices for Liquid Hydrogen Depots

    Science.gov (United States)

    Hartwig, Jason W.; McQuillen, John B.; Chato, David J.

    2013-01-01

    This paper presents background, experimental design, and preliminary experimental results for the liquid hydrogen bubble point tests conducted at the Cryogenic Components Cell 7 facility at the NASA Glenn Research Center in Cleveland, Ohio. The purpose of the test series was to investigate the parameters that affect liquid acquisition device (LAD) performance in a liquid hydrogen (LH2) propellant tank, to mitigate risk in the final design of the LAD for the Cryogenic Propellant Storage and Transfer Technology Demonstration Mission, and to provide insight into optimal LAD operation for future LH2 depots. Preliminary test results show an increase in performance and screen retention over the low reference LH2 bubble point value for a 325 2300 screen in three separate ways, thus improving fundamental LH2 LAD performance. By using a finer mesh screen, operating at a colder liquid temperature, and pressurizing with a noncondensible pressurant gas, a significant increase in margin is achieved in bubble point pressure for LH2 screen channel LADs.

  1. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  2. A Review of the Management of Implanted Medical Devices for Diabetes: Trends and Directions

    OpenAIRE

    Edman, Carl; Drinan, Darrel

    2008-01-01

    The management of diabetes is progressing rapidly from the use of traditional finger sticks for glucose monitoring and multiple daily injections of insulin to more user-friendly devices and approaches. These advances hold the promise of freeing persons with diabetes from the need for continued daily compliance, thereby improving their quality of life and improving control of their underlying diabetes. An underlying theme to solutions based on percutaneous or fully implanted devices is that th...

  3. Resource management for heterogeneous networks in LTE systems

    CERN Document Server

    Hu, Rose Qingyang

    2014-01-01

    This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Hetero...

  4. Network Management Services Based On The Openflow Environment

    Directory of Open Access Journals (Sweden)

    Paweł Wilk

    2014-01-01

    Full Text Available The subject of this article is network management through web service calls, which allows software applications to exert an influence on network traffic. In this manner, software can make independent decisions concerning the direction of requests so that they can be served as soon as possible. This is important because only proper cooperation including all architecture layers can ensure the best performance, especially when software that largely depends on computer networks and utilizes them heavily is involved. To demonstrate that the approach described above is feasible and can be useful at the same time, this article presents a switch-level load balancer developed using OpenFlow. Client software communicates with the balancer through REST web service calls, which are used to provide information on current machine load and its ability to serve incoming requests. The result is a cheap, highly customizable and extremely fast load balancer with considerable potential for further development.

  5. Design of IP-based element management system for SDH optical network

    Science.gov (United States)

    Chen, Junqiang; Zhang, Feng

    2004-04-01

    As large amount of SDH optical systems are deployed in metropolitan area network (MAN) and access network, the scale and complexity of SDH management network is increasing dramatically. It is a very challenging task to design a robust and effective element management system (EMS) for large-scale SDH network. As well known, OSI's network architecture has been adopted in traditional SDH network management system for a long time. But it has been proved that OSI stack has many limits, such as complexity of implementation, high resource consumption and low efficiency. This paper presents a method different from that of OSI to build SDH management network. The presented method is based on lightweight IP stack and layered routing scheme of OSPF. By this method, the number of network elements of the managed SDH network can be increased remarkably without loss of management performance. Analysis of other merits of this method is also given. The implementation of EMS based on this method is introduced.

  6. Energy management and multi-layer control of networked microgrids

    Science.gov (United States)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  7. An artificial neural networks approach in managing healthcare.

    Science.gov (United States)

    Okoroh, Michael Iheoma; Ilozor, Benedict Dozie; Gombera, Peter

    2007-01-01

    Hospitals as learning organisations have evolved through complex phases of service failures and continuous service improvement to meet the business needs of a varied continuum of care customers. This paper explores the use of Artificial Neural Network (ANN) in the development of a decision support system to manage healthcare non-clinical services. The information (postal questionnaires and repertory grid interviews) used to develop the input to the National Healthcare Service Facilities Risk Exposure System (NHSFRES) was articulated from 60 experienced healthcare operators. The system provides a reasonable early warning signal to the healthcare managers, and can be used by decision makers to evaluate the severity of risks on healthcare non clinical business operations. The advantage of using NHSFRES is that healthcare managers can provide their own risk assessment values (point score system) based on their own healthcare management business knowledge/judgement and corporate objectives.

  8. Supply Chain Management: from Linear Interactions to Networked Processes

    Directory of Open Access Journals (Sweden)

    Doina FOTACHE

    2006-01-01

    Full Text Available Supply Chain Management is a distinctive product, with a tremendous impact on the software applications market. SCM applications are back-end solutions intended to link suppliers, manufacturers, distributors and resellers in a production and distribution network, which allows the enterprise to track and consolidate the flows of materials and data trough the process of manufacturing and distribution of goods/services. The advent of the Web as a major means of conducting business transactions and business-tobusiness communications, coupled with evolving web-based supply chain management (SCM technology, has resulted in a transition period from “linear” supply chain models to "networked" supply chain models. The technologies to enable dynamic process changes and real time interactions between extended supply chain partners are emerging and being deployed at an accelerated pace.

  9. Auction based spectrum management of cognitive radio networks

    DEFF Research Database (Denmark)

    Chang, H. B.; Chen, K.-C.; Prasad, Ramjee

    2009-01-01

    Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...... profit to the service provider so that cognitive radio mobile stations (CR-MSs) may utilize PRN spectrum accordingly, which provides a new challenge for spectrum management. In this paper, we consider a PRN consisting of a primary system base station (PS-BS) and multiple primary system mobile stations...... (PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...

  10. Privacy Management on Facebook: Do Device Type and Location of Posting Matter?

    Directory of Open Access Journals (Sweden)

    Jennifer Jiyoung Suh

    2015-10-01

    Full Text Available People’s information sharing on Facebook often happens through mobile devices allowing for posting from different locations. Despite the potential contextual differences in content sharing, the literature on online privacy management rarely takes into consideration the type of device and the type of location from which people post content. Do these aspects of Facebook use affect how people share information online? Analyzing Facebook posts young adults shared from different devices and different locations, this article examines the effectiveness of users’ privacy management. By comparing the intended audience with the actual audience of each post, we find considerable mismatch between the two despite most participants expressing confidence in their ability to manage their information on the site. Posts that are accidentally shared with “public”—potentially anyone on the web—are more likely to be shared from non-mobile devices. Interview data reveal that this happens despite the fact that most participants consider non-mobile devices more reliable and convenient to use than mobile devices.

  11. Managers look to the social network to seek information

    Directory of Open Access Journals (Sweden)

    Mckenzie M.L.

    2005-01-01

    Full Text Available Introduction. The purpose of this study was to explore how managers selected individuals to serve as information sources. The social context of a for-profit business environment offered opportunity to study information seeking among interacting line managers. Method. The qualitative methods of social network mapping and interview were used to capture the data. The study was conducted within a stand-alone business unit of a major US-based corporation. A total of 22 line-managers participated in the study. Analysis. Content analysis was selected as the data analysis technique. The elements of interest were the themes within the data. Open coding was used to interrogate the data to ensure a systematic approach so that future researchers can replicate the process. Results. Relationship, more than knowledge, can be the reason a line-manager is sought as an information source. In addition to relationship, an individual manager’s knowledge, communication behaviour, cognitive style, and cognitive ability play an influencing role in being selected as an information source. Conclusion. The non-hierarchical flow of information among managers and the reasons managers seek others as information sources further differentiates line-managers as a unique information user group

  12. Social networks and community-based natural resource management.

    Science.gov (United States)

    Lauber, T Bruce; Decker, Daniel J; Knuth, Barbara A

    2008-10-01

    We conducted case studies of three successful examples of collaborative, community-based natural resource conservation and development. Our purpose was to: (1) identify the functions served by interactions within the social networks of involved stakeholders; (2) describe key structural properties of these social networks; and (3) determine how these structural properties varied when the networks were serving different functions. The case studies relied on semi-structured, in-depth interviews of 8 to 11 key stakeholders at each site who had played a significant role in the collaborative projects. Interview questions focused on the roles played by key stakeholders and the functions of interactions between them. Interactions allowed the exchange of ideas, provided access to funding, and enabled some stakeholders to influence others. The exchange of ideas involved the largest number of stakeholders, the highest percentage of local stakeholders, and the highest density of interactions. Our findings demonstrated the value of tailoring strategies for involving stakeholders to meet different needs during a collaborative, community-based natural resource management project. Widespread involvement of local stakeholders may be most appropriate when ideas for a project are being developed. During efforts to exert influence to secure project approvals or funding, however, involving specific individuals with political connections or influence on possible sources of funds may be critical. Our findings are consistent with past work that has postulated that social networks may require specific characteristics to meet different needs in community-based environmental management.

  13. Social Networks and Community-Based Natural Resource Management

    Science.gov (United States)

    Lauber, T. Bruce; Decker, Daniel J.; Knuth, Barbara A.

    2008-10-01

    We conducted case studies of three successful examples of collaborative, community-based natural resource conservation and development. Our purpose was to: (1) identify the functions served by interactions within the social networks of involved stakeholders; (2) describe key structural properties of these social networks; and (3) determine how these structural properties varied when the networks were serving different functions. The case studies relied on semi-structured, in-depth interviews of 8 to 11 key stakeholders at each site who had played a significant role in the collaborative projects. Interview questions focused on the roles played by key stakeholders and the functions of interactions between them. Interactions allowed the exchange of ideas, provided access to funding, and enabled some stakeholders to influence others. The exchange of ideas involved the largest number of stakeholders, the highest percentage of local stakeholders, and the highest density of interactions. Our findings demonstrated the value of tailoring strategies for involving stakeholders to meet different needs during a collaborative, community-based natural resource management project. Widespread involvement of local stakeholders may be most appropriate when ideas for a project are being developed. During efforts to exert influence to secure project approvals or funding, however, involving specific individuals with political connections or influence on possible sources of funds may be critical. Our findings are consistent with past work that has postulated that social networks may require specific characteristics to meet different needs in community-based environmental management.

  14. Distributed smart device for monitoring, control and management of electric loads in domotic environments.

    Science.gov (United States)

    Morales, Ricardo; Badesa, Francisco J; García-Aracil, Nicolas; Perez-Vidal, Carlos; Sabater, Jose María

    2012-01-01

    This paper presents a microdevice for monitoring, control and management of electric loads at home. The key idea is to compact the electronic design as much as possible in order to install it inside a Schuko socket. Moreover, the electronic Schuko socket (electronic microdevice + Schuko socket) has the feature of communicating with a central unit and with other microdevices over the existing powerlines. Using the existing power lines, the proposed device can be installed in new buildings or in old ones. The main use of this device is to monitor, control and manage electric loads to save energy and prevent accidents produced by different kind of devices (e.g., iron) used in domestic tasks. The developed smart device is based on a single phase multifunction energy meter manufactured by Analog Devices (ADE7753) to measure the consumption of electrical energy and then to transmit it using a serial interface. To provide current measurement information to the ADE7753, an ultra flat SMD open loop integrated circuit current transducer based on the Hall effect principle manufactured by Lem (FHS-40P/SP600) has been used. Moreover, each smart device has a PL-3120 smart transceiver manufactured by LonWorks to execute the user's program, to communicate with the ADE7753 via serial interface and to transmit information to the central unit via powerline communication. Experimental results show the exactitude of the measurements made using the developed smart device.

  15. Distributed Smart Device for Monitoring, Control and Management of Electric Loads in Domotic Environments

    Directory of Open Access Journals (Sweden)

    Carlos Perez-Vidal

    2012-04-01

    Full Text Available This paper presents a microdevice for monitoring, control and management of electric loads at home. The key idea is to compact the electronic design as much as possible in order to install it inside a Schuko socket. Moreover, the electronic Schuko socket (electronic microdevice + Schuko socket has the feature of communicating with a central unit and with other microdevices over the existing powerlines. Using the existing power lines, the proposed device can be installed in new buildings or in old ones. The main use of this device is to monitor, control and manage electric loads to save energy and prevent accidents produced by different kind of devices (e.g., iron used in domestic tasks. The developed smart device is based on a single phase multifunction energy meter manufactured by Analog Devices (ADE7753 to measure the consumption of electrical energy and thento transmit it using a serial interface. To provide current measurement information to the ADE7753, an ultra flat SMD open loop integrated circuit current transducer based on the Hall effect principle manufactured by Lem (FHS-40P/SP600 has been used. Moreover, each smart device has a PL-3120 smart transceiver manufactured by LonWorks to execute the user’s program, to communicate with the ADE7753 via serial interface and to transmit information to the central unit via powerline communication. Experimental results show the exactitude of the measurements made using the developed smart device.

  16. Impact of Demand Side Management in Active Distribution Networks

    DEFF Research Database (Denmark)

    Ponnaganti, Pavani; Bak-Jensen, Birgitte; Pillai, Jayakrishnan Radhakrishna

    2017-01-01

    Demand Side Management (DSM) is an efficient flexible program which helps distribution network operators to meet the future critical peak demand. It is executed in cases of not only technical issues like voltage sag or swell, transformer burdening, cable congestions, but also to increase the degree...... vehicle, electric heating etc. are present. Simulations are carried out in Danish low voltage grid for summer and winter cases....

  17. Idea Management: Perspectives from Leadership, Learning, and Network Theory

    OpenAIRE

    Deichmann, Dirk

    2012-01-01

    textabstractIn this dissertation, we focus on how leadership styles, individual learning behaviors, and social network structures drive or inhibit organizational members to repeatedly generate and develop innovative ideas. Taking the idea management programs of three multinational companies as the research setting, we investigate, in four empirical papers using different sources and methods, how innovative behavior can be supported, influenced, or changed. Within this context, we concentrate ...

  18. A Survey on Urban Traffic Management System Using Wireless Sensor Networks.

    Science.gov (United States)

    Nellore, Kapileswar; Hancke, Gerhard P

    2016-01-27

    Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs) have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT) of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.

  19. A Survey on Urban Traffic Management System Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kapileswar Nellore

    2016-01-01

    Full Text Available Nowadays, the number of vehicles has increased exponentially, but the bedrock capacities of roads and transportation systems have not developed in an equivalent way to efficiently cope with the number of vehicles traveling on them. Due to this, road jamming and traffic correlated pollution have increased with the associated adverse societal and financial effect on different markets worldwide. A static control system may block emergency vehicles due to traffic jams. Wireless Sensor networks (WSNs have gained increasing attention in traffic detection and avoiding road congestion. WSNs are very trendy due to their faster transfer of information, easy installation, less maintenance, compactness and for being less expensive compared to other network options. There has been significant research on Traffic Management Systems using WSNs to avoid congestion, ensure priority for emergency vehicles and cut the Average Waiting Time (AWT of vehicles at intersections. In recent decades, researchers have started to monitor real-time traffic using WSNs, RFIDs, ZigBee, VANETs, Bluetooth devices, cameras and infrared signals. This paper presents a survey of current urban traffic management schemes for priority-based signalling, and reducing congestion and the AWT of vehicles. The main objective of this survey is to provide a taxonomy of different traffic management schemes used for avoiding congestion. Existing urban traffic management schemes for the avoidance of congestion and providing priority to emergency vehicles are considered and set the foundation for further research.

  20. Examining Factors That Impact Inpatient Management of Diabetes and the Role of Insulin Pen Devices.

    Science.gov (United States)

    Smallwood, Chelsea; Lamarche, Danièle; Chevrier, Annie

    2017-02-01

    Insulin administration in the acute care setting is an integral component of inpatient diabetes management. Although some institutions have moved to insulin pen devices, many acute care settings continue to employ the vial and syringe method of insulin administration. The aim of this study was to evaluate the impact of insulin pen implementation in the acute care setting on patients, healthcare workers and health resource utilization. A review of published literature, including guidelines, was conducted to identify how insulin pen devices in the acute care setting may impact inpatient diabetes management. Previously published studies have revealed that insulin pen devices have the potential to improve inpatient management through better glycemic control, increased adherence and improved self-management education. Furthermore, insulin pen devices may result in cost savings and improved safety for healthcare workers. There are benefits to the use of insulin pen devices in acute care and, as such, their implementation should be considered. Copyright © 2016 Becton Dickinson Canada Inc. Published by Elsevier Inc. All rights reserved.

  1. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  2. InP on SOI devices for optical communication and optical network on chip

    Science.gov (United States)

    Fedeli, J.-M.; Ben Bakir, B.; Olivier, N.; Grosse, Ph.; Grenouillet, L.; Augendre, E.; Phillippe, P.; Gilbert, K.; Bordel, D.; Harduin, J.

    2011-01-01

    For about ten years, we have been developing InP on Si devices under different projects focusing first on μlasers then on semicompact lasers. For aiming the integration on a CMOS circuit and for thermal issue, we relied on SiO2 direct bonding of InP unpatterned materials. After the chemical removal of the InP substrate, the heterostructures lie on top of silicon waveguides of an SOI wafer with a separation of about 100nm. Different lasers or photodetectors have been achieved for off-chip optical communication and for intra-chip optical communication within an optical network. For high performance computing with high speed communication between cores, we developed InP microdisk lasers that are coupled to silicon waveguide and produced 100μW of optical power and that can be directly modulated up to 5G at different wavelengths. The optical network is based on wavelength selective circuits with ring resonators. InGaAs photodetectors are evanescently coupled to the silicon waveguide with an efficiency of 0.8A/W. The fabrication has been demonstrated at 200mm wafer scale in a microelectronics clean room for CMOS compatibility. For off-chip communication, silicon on InP evanescent laser have been realized with an innovative design where the cavity is defined in silicon and the gain localized in the QW of bonded InP hererostructure. The investigated devices operate at continuous wave regime with room temperature threshold current below 100 mA, the side mode suppression ratio is as high as 20dB, and the fibercoupled output power is {7mW. Direct modulation can be achieved with already 6G operation.

  3. Squeeze-chip: a finger-controlled microfluidic flow network device and its application to biochemical assays.

    Science.gov (United States)

    Li, Wentao; Chen, Tao; Chen, Zitian; Fei, Peng; Yu, Zhilong; Pang, Yuhong; Huang, Yanyi

    2012-05-07

    We designed and fabricated a novel microfluidic device that can be operated through simple finger squeezing. On-chip microfluidic flow control is enabled through an optimized network of check-valves and squeeze-pumps. The sophisticated flow system can be easily constructed by combining a few key elements. We implemented this device to perform quantitative biochemical assays with no requirement for precision instruments.

  4. Tolerance of intrinsic device variation in fuzzy restricted Boltzmann machine network based on memristive nano-synapses

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Lu, Xiayan; Cai, Yimao; Yang, Yuchao; Huang, Ru

    2017-06-01

    Inspired by the architecture and principle of the human brain, neuromorphic computing has attracted enormous research interest due to its potential for massively parallel and energy-efficient computing, where nanoscale memristors are considered as perfect building blocks for hardware neural networks, serving as compact, analog synapses. However, the inherent variation in memristors has been regarded as a major obstacle to their practical application in neuromorphic computing. Here, for the first time, we demonstrate that this long-standing issue can be addressed by introducing fuzziness into the neural networks. We found that the cycle-to-cycle and device-to-device conductance variations in the on and off states of Pt/TaOx/Ta memristors statistically follow Gaussian distributions, and using an experimentally verified compact synapse model based on the electrical characteristics of Pt/TaOx/Ta devices, a fuzzy restricted Boltzmann machine (FRBM) network was constructed where all the weight states were fuzzified to accommodate device stochasticity. The FRBM network has shown significantly improved tolerance to device variation, as confirmed by increased accuracy in the benchmark test of MNIST handwritten digit classifications. This study thus provides a new route towards highly robust neuromorphic computing, even if the computing elements can be stochastic and inhomogeneous.

  5. Network Management System for (FUTON-like) Radio-over-Fiber Infrastructure

    DEFF Research Database (Denmark)

    Santiago, Carlos; Gangopadhyay, Bodhisattwa; Ramkumar, Venkata

    2010-01-01

    operational costs. The RoF Network Manager manages the network equipment on the optical front haul between the Central Unit (CU) and all Remote Antenna Units (RAU)s connected by it, as well as the communication links, while enabling end-to-end service problem resolution and service quality management...... by the FUTON Middleware. Although a significant amount of prior research work can be found in the literature related to RoF, there is still significant lack of technologies concerning RoF networks management. RoF Manager and its sub-systems target to fill such gap, proposing a novel concept in the form...... of Channel Forwarding Table (CFT). RoF Manager follows an autonomous and generic network management framework, designed to be scalable in terms of adding new network elements (NEs). It targets multi-technology, multi-service and multi-vendor NEs in the network using Simple Network Management Protocol (SNMP...

  6. Quantum transport through complex networks - from light-harvesting proteins to semiconductor devices

    Energy Technology Data Exchange (ETDEWEB)

    Kreisbeck, Christoph

    2012-06-18

    Electron transport through small systems in semiconductor devices plays an essential role for many applications in micro-electronics. One focus of current research lies on establishing conceptually new devices based on ballistic transport in high mobility AlGaAs/AlGa samples. In the ballistic regime, the transport characteristics are determined by coherent interference effects. In order to guide experimentalists to an improved device design, the characterization and understanding of intrinsic device properties is crucial. We develop a time-dependent approach that allows us to simulate experimentally fabricated, complex devicegeometries with an extension of up to a few micrometers. Particularly, we explore the physical origin of unexpected effects that have been detected in recent experiments on transport through Aharonov-Bohm waveguide-interferometers. Such interferometers can be configured as detectors for transfer properties of embedded quantum systems. We demonstrate that a four-terminal waveguide-ring is a suitable setup for measuring the transmission phase of a harmonic quantum dot. Quantum effects are not restricted exclusively to artificial devices but have been found in biological systems as well. Pioneering experiments reveal quantum effects in light-harvesting complexes, the building blocks of photosynthesis. We discuss the Fenna-Matthews-Olson complex, which is a network of coupled bacteriochlorophylls. It acts as an energy wire in the photosynthetic apparatus of green sulfur bacteria. Recent experimental findings suggest that energy transfer takes place in the form of coherent wave-like motion, rather than through classical hopping from one bacteriochlorophyll to the next. However, the question of why and how coherent transfer emerges in light-harvesting complexes is still open. The challenge is to merge seemingly contradictory features that are observed in experiments on two-dimensional spectroscopy into a consistent theory. Here, we provide such a

  7. Identification and management of distributed data NGN, content-centric networks and the web

    CERN Document Server

    Bartolomeo, Giovanni

    2013-01-01

    Although several books and academic courses discuss data management and networking, few of them focus on the convergence of networking and software technologies for identifying, addressing, and managing distributed data. Focusing on this convergence, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web collates and describes the various distributed data management technologies to help readers from various backgrounds understand the common aspects that govern distributed data management. With a focus on the primary problems in identifying, addressing, and

  8. Modeling of frequency agile devices: development of PKI neuromodeling library based on hierarchical network structure

    Science.gov (United States)

    Sanchez, P.; Hinojosa, J.; Ruiz, R.

    2005-06-01

    Recently, neuromodeling methods of microwave devices have been developed. These methods are suitable for the model generation of novel devices. They allow fast and accurate simulations and optimizations. However, the development of libraries makes these methods to be a formidable task, since they require massive input-output data provided by an electromagnetic simulator or measurements and repeated artificial neural network (ANN) training. This paper presents a strategy reducing the cost of library development with the advantages of the neuromodeling methods: high accuracy, large range of geometrical and material parameters and reduced CPU time. The library models are developed from a set of base prior knowledge input (PKI) models, which take into account the characteristics common to all the models in the library, and high-level ANNs which give the library model outputs from base PKI models. This technique is illustrated for a microwave multiconductor tunable phase shifter using anisotropic substrates. Closed-form relationships have been developed and are presented in this paper. The results show good agreement with the expected ones.

  9. Dynamic biosignal management and transmission during telemedicine incidents handled by Mobile Units over diverse network types.

    Science.gov (United States)

    Mandellos, George J; Koutelakis, George V; Panagiotakopoulos, Theodor C; Koukias, Andreas M; Koukias, Mixalis N; Lymberopoulos, Dimitrios K

    2008-01-01

    Early and specialized pre-hospital patient treatment improves outcome in terms of mortality and morbidity, in emergency cases. This paper focuses on the design and implementation of a telemedicine system that supports diverse types of endpoints including moving transports (MT) (ambulances, ships, planes, etc.), handheld devices and fixed units, using diverse communication networks. Target of the above telemedicine system is the pre-hospital patient treatment. While vital sign transmission is prior to other services provided by the telemedicine system (videoconference, remote management, voice calls etc.), a predefined algorithm controls provision and quality of the other services. A distributed database system controlled by a central server, aims to manage patient attributes, exams and incidents handled by different Telemedicine Coordination Centers (TCC).

  10. Design and implementation of an integrated safety management system for compressed natural gas stations using ubiquitous sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Jae Mo; Ko, Byung Seok; Park, Chulhwan; Ko, Jae Wook [Kwangwoon University, Seoul (Korea, Republic of); Yoo, Byungtae [National Disaster Management Institute, Seoul (Korea, Republic of); Shin, Dongil [Myongji University, Yongin (Korea, Republic of)

    2014-03-15

    To increase awareness of safety in facilities where hazards may exist, operators, managers, and executive officers on the site should be able to monitor such facilities. However, most compressed natural gas (CNG) service stations in Korea use only local-mode monitoring, with only on-site operators to monitor the facility. To complement this local-mode monitoring, an online safety management system called Ubiquitous-gas safety management system (U-GSMS) was developed. The U-GSMS consists largely of software and hardware. The software consists of systems that can manage safety and operations, while the hardware consists of sensors installed in the gas facility and wireless communication systems using a ubiquitous sensor network (USN) technology that facilitates communication between sensors as well as between sensors and other devices. As these systems are web-based, on-site operators as well as managers and executive officers at the headquarters can more effectively and efficiently perform monitoring and safety management.

  11. A distributed data base management system. [for Deep Space Network

    Science.gov (United States)

    Bryan, A. I.

    1975-01-01

    Major system design features of a distributed data management system for the NASA Deep Space Network (DSN) designed for continuous two-way deep space communications are described. The reasons for which the distributed data base utilizing third-generation minicomputers is selected as the optimum approach for the DSN are threefold: (1) with a distributed master data base, valid data is available in real-time to support DSN management activities at each location; (2) data base integrity is the responsibility of local management; and (3) the data acquisition/distribution and processing power of a third-generation computer enables the computer to function successfully as a data handler or as an on-line process controller. The concept of the distributed data base is discussed along with the software, data base integrity, and hardware used. The data analysis/update constraint is examined.

  12. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  13. Managing cardiac devices near the end of life: a survey of hospice and palliative care providers.

    Science.gov (United States)

    Morrison, Laura J; Calvin, Amy O; Nora, Hope; Porter Storey, C

    2010-12-01

    Implantable cardioverter defibrillators (ICDs) and pacemakers may change the character of an individual's eventual death. The objective of this study was to explore hospice and palliative care provider attitudes and experience in managing ICDs and pacemakers for patients near the end of life. A voluntary survey was distributed to session attendees at a national conference. Doctors and nurses surveyed overwhelmingly agreed it is appropriate to disable these devices in a terminally ill patient who does not wish to be resuscitated or prolong life. However, respondents emphasized a less defined burden for pacemakers. Respondents also reported limited involvement in such cases and few institutional protocols. As more terminal patients have these devices, research and education on device management protocols/guidelines and on provider communication skills are critical.

  14. Integrated fountain effect pump device for fluid management at low gravity

    Science.gov (United States)

    Yuan, S. W. K.; Frank, D. J.

    1988-01-01

    A new device for fluid management at low gravity is described. The system is basically the same as the enclosed capillary device using screens, in which the screens along the gallery channels are replaced by porous plugs which are responsible for both the fluid retention and pumping of He II; in this device, no downstream pump is needed. The plugs in contact with liquid He on both sides act as a fountain-effect pumps (FEPs), while plugs exposed to vapor on one side behave as vapor-liquid phase separators (VLPSs). The total net rate of He II transfer into the receiving tank equals the mass flow rate through the FEP plugs minus the liquid loss from the VLPS plugs. The results of the performance analysis of this integrated FEP device are presented together with its schematic diagram.

  15. Older Adults and Management of Medical Devices in the Home: Five Requirements for Appropriate Use.

    Science.gov (United States)

    Keller, Sara C; Gurses, Ayse P; Werner, Nicole; Hohl, Dawn; Hughes, Ashley; Leff, Bruce; Arbaje, Alicia I

    2017-08-01

    Medical devices, or instruments or tools to manage disease, are increasingly used in the home, yet there have been limited evaluations of how older adults and caregivers safely use these devices. This study concerns a qualitative evaluation of (1) barriers and facilitators of appropriate use, and (2) outcomes of inappropriate use, among older adults at the transition from hospital to home with skilled home health care (SHHC). Guided by a human factors engineering work system model, the authors (1) conducted direct observations with contextual inquiry of the start-of-care or resumption-of-care SHHC provider visit, and (2) semi-structured interviews with 24 older adults and their informal caregivers, and 39 SHHC providers and administrators. Five requirements for the appropriate use of home medical devices were identified. A systems approach integrating the hospital with the SHHC agency is needed to make the use of home medical devices safer.

  16. A Distributed Management Scheme for supporting energy-harvested I/O devices

    NARCIS (Netherlands)

    Zand, P.; Das, Kallol; Mathews, E.; Havinga, Paul J.M.

    Current wireless technologies for industrial application, such as WirelessHART and ISA100.11a, are not designed to support harvester-powered input/output (I/O) devices, where energy availability varies in a non-deterministic manner. The centralized management approach of these standards makes it

  17. Load power device, system and method of load control and management employing load identification

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Yi; Luebke, Charles John; Schoepf, Thomas J.

    2018-01-09

    A load power device includes a power input, at least one power output for at least one load, a plurality of sensors structured to sense voltage and current at the at least one power output, and a processor. The processor provides: (a) load identification based upon the sensed voltage and current, and (b) load control and management based upon the load identification.

  18. A novel attract-and-kill device for strengthening the management of Asian citrus psyllid

    Science.gov (United States)

    Control strategies that exploit the behavior of Asian citrus psyllid will lead to sustainable management practices of this economically important pest. Asian citrus psyllid (ACP) is a diurnal insect that strongly responds to visual cues. We developed an attract-and-kill device (AK) mimicking a citru...

  19. Wireless Sensors and Networks for Advanced Energy Management

    Energy Technology Data Exchange (ETDEWEB)

    Hardy, J.E.

    2005-05-06

    Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modeling investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.

  20. First aid anaphylaxis management in children who were prescribed an epinephrine autoinjector device (EpiPen).

    Science.gov (United States)

    Gold, M S; Sainsbury, R

    2000-07-01

    Epinephrine for first aid use by parents and other caregivers and in the form of an autoinjector device (EpiPen, Center Laboratories) is often prescribed for children who have had previous anaphylactic reactions. It is not known whether the EpiPen device is used appropriately during subsequent reactions and whether its use is able to prevent the complications of anaphylaxis. Our purpose was to determine parental knowledge and practice concerning first aid anaphylaxis management, the frequency of recurrent generalized allergic reactions, the first aid measures taken, and the subsequent outcome of these reactions. A retrospective survey was performed with a telephone questionnaire of all children with a history of anaphylaxis who attended a specialist allergy service and were prescribed an EpiPen autoinjector device. Recurrent generalized allergic reactions occurred with a frequency of 0.98 episodes per patient per year and were more common in those with food compared with insect venom anaphylaxis. The EpiPen device was only used in 29% of recurrent anaphylactic reactions. Parental knowledge was deficient in recognition of the symptoms of anaphylaxis and use of the EpiPen device, and adequate first aid measures were not in place for the majority of children attending school. Those children in whom the EpiPen device was used were less likely to be given epinephrine in hospital and to require subsequent hospital admission. The EpiPen autoinjector device is infrequently used in children with recurrent episodes of anaphylaxis; the reasons for this require further research. It is likely that parents and other caregivers will require continuing education and support in first aid anaphylaxis management. When the EpiPen device is used appropriately, it appears to reduce subsequent morbidity from anaphylaxis.

  1. Engineering highly organized and aligned single walled carbon nanotube networks for electronic device applications: Interconnects, chemical sensor, and optoelectronics

    Science.gov (United States)

    Kim, Young Lae

    For 20 years, single walled carbon nanotubes (SWNTs) have been studied actively due to their unique one-dimensional nanostructure and superior electrical, thermal, and mechanical properties. For these reasons, they offer the potential to serve as building blocks for future electronic devices such as field effect transistors (FETs), electromechanical devices, and various sensors. In order to realize these applications, it is crucial to develop a simple, scalable, and reliable nanomanufacturing process that controllably places aligned SWNTs in desired locations, orientations, and dimensions. Also electronic properties (semiconducting/metallic) of SWNTs and their organized networks must be controlled for the desired performance of devices and systems. These fundamental challenges are significantly limiting the use of SWNTs for future electronic device applications. Here, we demonstrate a strategy to fabricate highly controlled micro/nanoscale SWNT network structures and present the related assembly mechanism to engineer the SWNT network topology and its electrical transport properties. A method designed to evaluate the electrical reliability of such nano- and microscale SWNT networks is also presented. Moreover, we develop and investigate a robust SWNT based multifunctional selective chemical sensor and a range of multifunctional optoelectronic switches, photo-transistors, optoelectronic logic gates and complex optoelectronic digital circuits.

  2. Monitoring water distribution systems: understanding and managing sensor networks

    Directory of Open Access Journals (Sweden)

    D. D. Ediriweera

    2010-09-01

    Full Text Available Sensor networks are currently being trialed by the water distribution industry for monitoring complex distribution infrastructure. The paper presents an investigation in to the architecture and performance of a sensor system deployed for monitoring such a distribution network. The study reveals lapses in systems design and management, resulting in a fifth of the data being either missing or erroneous. Findings identify the importance of undertaking in-depth consideration of all aspects of a large sensor system with access to either expertise on every detail, or to reference manuals capable of transferring the knowledge to non-specialists. First steps towards defining a set of such guidelines are presented here, with supporting evidence.

  3. Security management based on trust determination in cognitive radio networks

    Science.gov (United States)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  4. Machine learning of network metrics in ATLAS Distributed Data Management

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00218873; The ATLAS collaboration; Toler, Wesley; Vamosi, Ralf; Bogado Garcia, Joaquin Ignacio

    2017-01-01

    The increasing volume of physics data poses a critical challenge to the ATLAS experiment. In anticipation of high luminosity physics, automation of everyday data management tasks has become necessary. Previously many of these tasks required human decision-making and operation. Recent advances in hardware and software have made it possible to entrust more complicated duties to automated systems using models trained by machine learning algorithms. In this contribution we show results from one of our ongoing automation efforts that focuses on network metrics. First, we describe our machine learning framework built atop the ATLAS Analytics Platform. This framework can automatically extract and aggregate data, train models with various machine learning algorithms, and eventually score the resulting models and parameters. Second, we use these models to forecast metrics relevant for network-aware job scheduling and data brokering. We show the characteristics of the data and evaluate the forecasting accuracy of our m...

  5. Wide area network performance study of a distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Su, C.-L.; Lu, C.-N. [National Sun Yat-Sen University, Kaohsiung (Taiwan). Dept. of Electrical Engineering; Lin, M.-C. [Taiwan Power Company, Kaohsiung (Taiwan). Kaoping Regional Office

    2000-01-01

    Distribution automation is considered a necessity for providing better power service in a more competitive environment. When new automatic functions are included in a distribution management system (DMS), loadings of the data links in the supervisory control and data acquisition (SCADA) system will become very heavy. In order to maintain a proper performance, system upgrade or migration will need to be considered. Two wide area network (WAN) architectures for a Taiwan Power Company's regional DMS are investigated. The WAN modeling presented in this paper is aimed to verify whether the hardware design could accommodate the communications load and to avoid overpaying for network equipment. Simulation results indicate that, to cover feeder automation functions, a WAN with distributed processing capability would provide better SCADA performance than an extension of the old centralized system. (author)

  6. Uncertainty management using bayesian networks in student knowledge diagnosis

    Directory of Open Access Journals (Sweden)

    Adina COCU

    2005-12-01

    Full Text Available In intelligent tutoring systems, student or user modeling implies dealing with imperfect and uncertain knowledge. One of the artificial intelligence techniques used for uncertainty management is that of Bayesian networks. This paradigm is recommended in the situation when exist dependencies between data and qualitative information about these data. In this work we present a student knowledge diagnosis model based on representation with Bayesian networks. The educational system incorporate a multimedia interface for accomplishes the testing tools. The results of testing sessions are represented and interpreted with probability theory in order to ensure an adapted support for the student. The aims of the computer assisted application that contains this diagnose module are to support the student in personalized learning process and errors explanation.

  7. Modeling and Analysis of Mobility Management in Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    Woon Min Baek

    2014-01-01

    Full Text Available Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z and two-zone registration with implicit registration by outgoing calls (2Zi. We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z, and show that 2Zi is superior to 2Z as well as 1Z in most cases.

  8. Fiber-wireless convergence in next-generation communication networks systems, architectures, and management

    CERN Document Server

    Chang, Gee-Kung; Ellinas, Georgios

    2017-01-01

    This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint. • Addresses the Fi-Wi convergence issues at three different levels, namely at the system level, network architecture level, and network management level • Provides approaches in communication systems, network architecture, and management that are expected to steer the evolution towards fiber-wireless convergence • Contributions from leading experts in the field of...

  9. Traffic Steering Framework for Mobile-Assisted Resource Management in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Dogadaev, Anton Konstantinovich; Checko, Aleksandra; Popovska Avramova, Andrijana

    2013-01-01

    With the expected growth of mobile data traffic it is essential to manage the network resources efficiently. In order to undertake this challenge, we propose a framework for network-centric, mobile-assisted resource management, which facilitates traffic offloading from mobile network to Wi...

  10. Self-healing systems and wireless networks management

    CERN Document Server

    Chaudhry, Junaid Ahsenali

    2013-01-01

    Do you believe in open-source development? Would you like to see your security system grow and learn by itself? Are you sick of paying for software license fees every year that produce little return on investment? And, would you prefer to invest in something you could sell later on to other IT security departments? If you answered yes to these questions, then this is the book for you.Addressing the issues of fault identification and classification, Self-Healing Systems and Wireless Networks Management presents a method for identifying and classifying faults using ca

  11. Integrating Six Sigma into a Quality Management System in the Medical Device Industry

    Directory of Open Access Journals (Sweden)

    Nadica Hrgarek

    2009-06-01

    Full Text Available Normal 0 21 false false false MicrosoftInternetExplorer4 Six Sigma is a valuable management strategy to improve business processes, reduce development and production costs, increase profit margin and improve customer satisfaction. The purpose of this paper is to describe how applicable Six Sigma concepts may complement and support formal quality management systems (QMS in the medical device industry.A significant number of issues, which increase the development costs and times, is often found during different phases of a medical device life cycle. Some defects with high patient safety risk may result in dangerous and very costly product recalls.The basic idea of this paper is to explore the possibilities of integrating Six Sigma techniques with an existing QMS throughout the entire life cycle of a medical device. This paper addresses how Six Sigma techniques, when appropriately integrated into the QMS at medical device companies, can eliminate defects earlier in the medical device life cycle, identify major opportunities for cost savings, focus on customer needs and expectations, and improve the overall business processes.

  12. Participative Teaching with Mobile Devices and Social Networks for K-12 Children

    Directory of Open Access Journals (Sweden)

    Livia Stefan

    2016-08-01

    Full Text Available This article details a set of participatory pedagogical experiments conducted within a research grant PN II IDEI (”Time Maps. Real communities, virtual worlds, experimented pasts” performed with the purpose of helping rural communities in identifying their cultural heritage andtransmitting it to the younger generations by means of modern IT technologies, including web 2.0. In a Danubian rural community, several points of archaeological interest (POIs were identified, which were then included in a geographic Augmented Reality application for smartphones and tablets. Subsequently, the geographic data were collected from the archaeological site by the K-12 children, under the coordination of an academic staff member of the National University of Arts in Bucharest, and stored on their devices using Google Maps. The augmented information provided onthe site was annotated and shared with other K-12 children, through different social networks sites (SNS and content postings. This first stage experiment was extended to the development of a social learning environment complementary to the educational site (www.timemaps.net to support thetransmission of several traditional technologies (textile, ceramic, glass in a collaborative manner. We consider that our experiments can significantly increase the visibility of the information pertaining to the identity of target places and communities among the younger generation. A mobile-learning paradigm, in combination with web 2.0 technologies, was the support for a distributed and low-cost platform for communication and collaboration. Social networks linked thearchaeological heritage and the academic research with the larger community of rural K-12 children. The article analyzes this platform as a solution for creating, collecting and sharingeducational content, and presents conclusions on using social media for effective blended learning and transmittal of the cultural heritage.

  13. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks

    Science.gov (United States)

    Iwasaki, Hirotoshi; Mizuno, Nobuhiro; Hara, Kousuke; Motomura, Yoichi

    Mobile devices, such as cellular phones and car navigation systems, are essential to daily life. People acquire necessary information and preferred content over communication networks anywhere, anytime. However, usability issues arise from the simplicity of user interfaces themselves. Thus, a recommendation of content that is adapted to a user's preference and situation will help the user select content. In this paper, we describe a method to realize such a system using Bayesian networks. This user-adapted mobile system is based on a user model that provides recommendation of content (i.e., restaurants, shops, and music that are suitable to the user and situation) and that learns incrementally based on accumulated usage history data. However, sufficient samples are not always guaranteed, since a user model would require combined dependency among users, situations, and contents. Therefore, we propose the LK method for modeling, which complements incomplete and insufficient samples using knowledge data, and CPT incremental learning for adaptation based on a small number of samples. In order to evaluate the methods proposed, we applied them to restaurant recommendations made on car navigation systems. The evaluation results confirmed that our model based on the LK method can be expected to provide better generalization performance than that of the conventional method. Furthermore, our system would require much less operation than current car navigation systems from the beginning of use. Our evaluation results also indicate that learning a user's individual preference through CPT incremental learning would be beneficial to many users, even with only a few samples. As a result, we have developed the technology of a system that becomes more adapted to a user the more it is used.

  14. Organizing NPD networks for high innovation performance: the case of Dutch medical devices SMEs

    NARCIS (Netherlands)

    Pullen, A.J.J.; Groen, Arend J.; de Weerd-Nederhof, Petronella C.; Fisscher, O.A.M.

    2010-01-01

    This research examines which combination of network characteristics (the network configuration) leads to high innovation performance for small and medium sized companies (SMEs). Even though research has paid significant attention to the relation between the external network and the innovation

  15. Envisioning, quantifying, and managing thermal regimes on river networks

    Science.gov (United States)

    Steel, E. Ashley; Beechie, Timothy J.; Torgersen, Christian; Fullerton, Aimee H.

    2017-01-01

    Water temperatures fluctuate in time and space, creating diverse thermal regimes on river networks. Temporal variability in these thermal landscapes has important biological and ecological consequences because of nonlinearities in physiological reactions; spatial diversity in thermal landscapes provides aquatic organisms with options to maximize growth and survival. However, human activities and climate change threaten to alter the dynamics of riverine thermal regimes. New data and tools can identify particular facets of the thermal landscape that describe ecological and management concerns and that are linked to human actions. The emerging complexity of thermal landscapes demands innovations in communication, opens the door to exciting research opportunities on the human impacts to and biological consequences of thermal variability, suggests improvements in monitoring programs to better capture empirical patterns, provides a framework for suites of actions to restore and protect the natural processes that drive thermal complexity, and indicates opportunities for better managing thermal landscapes.

  16. Applied Ontology Engineering in Cloud Services, Networks and Management Systems

    CERN Document Server

    Serrano Orozco, J Martín

    2012-01-01

    Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems. �...

  17. An Intelligent Handover Management System for Future Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  18. Innovation and communicative action: health management networks and technologies.

    Science.gov (United States)

    Rivera, Francisco Javier Uribe; Artmann, Elizabeth

    2016-11-03

    This article discusses elements of a theory of innovation from the perspective of innovation networks and social construction of technology, based on Habermas' Theory of Communicative Action and authors from the Sociology of Innovation. Based on the theoretical framework of the communicative production of scientific facts, we focus on innovation management as a basic dimension that must meet some organizational and methodological requirements in order to power its results. We present and discuss instruments such as Situational Planning, Prospective Analysis, Strategic Portfolio Management, and Networks Management that can help deal with the challenge of innovation and exploration of the future. We conclude that network organizational formats centered on reflexivity of interdisciplinary groups and planning approaches that encourage innovation criteria in assessing the attractiveness of activities and that help anticipate forms of innovation through systematic prospective analysis can potentiate the process of generating innovation as a product of networks. Resumo: No artigo são discutidos elementos de uma teoria da inovação numa perspectiva de redes de inovação e de construção social da tecnologia, a partir da Teoria do Agir Comunicativo de Habermas e de autores da Sociologia da Inovação. Com base no marco teórico da produção comunicativa de fatos científicos, focamos a gestão da inovação como uma dimensão fundamental que deve contemplar alguns requisitos, tanto de natureza organizacional quanto metodológica, para potencializar seus resultados. Apresentamos e discutimos instrumentos como o Planejamento Situacional, a Análise Prospectiva, a Gestão Estratégica de Portfólios e a Gestão de Redes que podem contribuir para o desafio da inovação e exploração do futuro. Conclui-se que formas organizativas em rede, centradas na reflexividade de grupos interdisciplinares, e enfoques de planejamento que estimulem o uso de critérios de inovação na

  19. P2P Data Management in Mobile Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Nida Sahar Sayeda

    2013-04-01

    Full Text Available The rapid growth in wireless technologies has made wireless communication an important source for transporting data across different domains. In the same way, there are possibilities of many potential applications that can be deployed using WSNs (Wireless Sensor Networks. However, very limited applications are deployed in real life due to the uncertainty and dynamics of the environment and scare resources. This makes data management in WSN a challenging area to find an approach that suits its characteristics. Currently, the trend is to find efficient data management schemes using evolving technologies, i.e. P2P (Peer-to-Peer systems. Many P2P approaches have been applied in WSNs to carry out the data management due to similarities between WSN and P2P. With the similarities, there are differences too that makes P2P protocols inefficient in WSNs. Furthermore, to increase the efficiency and to exploit the delay tolerant nature of WSNs, where ever possible, the mobile WSNs are gaining importance. Thus, creating a three dimensional problem space to consider, i.e. mobility, WSNs and P2P. In this paper, an efficient algorithm is proposed for data management using P2P techniques for mobile WSNs. The real world implementation and deployment of proposed algorithm is also presented

  20. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.