WorldWideScience

Sample records for network environment unreliable

  1. Synchronization of the small-world neuronal network with unreliable synapses

    International Nuclear Information System (INIS)

    Li, Chunguang; Zheng, Qunxian

    2010-01-01

    As is well known, synchronization phenomena are ubiquitous in neuronal systems. Recently a lot of work concerning the synchronization of the neuronal network has been accomplished. In these works, the synapses are usually considered reliable, but experimental results show that, in biological neuronal networks, synapses are usually unreliable. In our previous work, we have studied the synchronization of the neuronal network with unreliable synapses; however, we have not paid attention to the effect of topology on the synchronization of the neuronal network. Several recent studies have found that biological neuronal networks have typical properties of small-world networks, characterized by a short path length and high clustering coefficient. In this work, mainly based on the small-world neuronal network (SWNN) with inhibitory neurons, we study the effect of network topology on the synchronization of the neuronal network with unreliable synapses. Together with the network topology, the effects of the GABAergic reversal potential, time delay and noise are also considered. Interestingly, we found a counter-intuitive phenomenon for the SWNN with specific shortcut adding probability, that is, the less reliable the synapses, the better the synchronization performance of the SWNN. We also consider the effects of both local noise and global noise in this work. It is shown that these two different types of noise have distinct effects on the synchronization: one is negative and the other is positive

  2. A simple MC-based algorithm for evaluating reliability of stochastic-flow network with unreliable nodes

    International Nuclear Information System (INIS)

    Yeh, W.-C.

    2004-01-01

    A MP/minimal cutset (MC) is a path/cut set such that if any edge is removed from this path/cut set, then the remaining set is no longer a path/cut set. An intuitive method is proposed to evaluate the reliability in terms of MCs in a stochastic-flow network subject to both edge and node failures under the condition that all of the MCs are given in advance. This is an extension of the best of known algorithms for solving the d-MC (a special MC but formatted in a system-state vector, where d is the lower bound points of the system capacity level) problem from the stochastic-flow network without unreliable nodes to with unreliable nodes by introducing some simple concepts. These concepts were first developed in the literature to implement the proposed algorithm to reduce the number of d-MC candidates. This method is more efficient than the best of known existing algorithms regardless if the network has or does not have unreliable nodes. Two examples are illustrated to show how the reliability is determined using the proposed algorithm in the network with or without unreliable nodes. The computational complexity of the proposed algorithm is analyzed and compared with the existing methods

  3. Impact of Radio Link Unreliability on the Connectivity of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gorce Jean-Marie

    2007-01-01

    Full Text Available Many works have been devoted to connectivity of ad hoc networks. This is an important feature for wireless sensor networks (WSNs to provide the nodes with the capability of communicating with one or several sinks. In most of these works, radio links are assumed ideal, that is, with no transmission errors. To fulfil this assumption, the reception threshold should be high enough to guarantee that radio links have a low transmission error probability. As a consequence, all unreliable links are dismissed. This approach is suboptimal concerning energy consumption because unreliable links should permit to reduce either the transmission power or the number of active nodes. The aim of this paper is to quantify the contribution of unreliable long hops to an increase of the connectivity of WSNs. In our model, each node is assumed to be connected to each other node in a probabilistic manner. Such a network is modeled as a complete random graph, that is, all edges exist. The instantaneous node degree is then defined as the number of simultaneous valid single-hop receptions of the same message, and finally the mean node degree is computed analytically in both AWGN and block-fading channels. We show the impact on connectivity of two MACs and routing parameters. The first one is the energy detection level such as the one used in carrier sense mechanisms. The second one is the reliability threshold used by the routing layer to select stable links only. Both analytic and simulation results show that using opportunistic protocols is challenging.

  4. Impact of Radio Link Unreliability on the Connectivity of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jean-Marie Gorce

    2007-06-01

    Full Text Available Many works have been devoted to connectivity of ad hoc networks. This is an important feature for wireless sensor networks (WSNs to provide the nodes with the capability of communicating with one or several sinks. In most of these works, radio links are assumed ideal, that is, with no transmission errors. To fulfil this assumption, the reception threshold should be high enough to guarantee that radio links have a low transmission error probability. As a consequence, all unreliable links are dismissed. This approach is suboptimal concerning energy consumption because unreliable links should permit to reduce either the transmission power or the number of active nodes. The aim of this paper is to quantify the contribution of unreliable long hops to an increase of the connectivity of WSNs. In our model, each node is assumed to be connected to each other node in a probabilistic manner. Such a network is modeled as a complete random graph, that is, all edges exist. The instantaneous node degree is then defined as the number of simultaneous valid single-hop receptions of the same message, and finally the mean node degree is computed analytically in both AWGN and block-fading channels. We show the impact on connectivity of two MACs and routing parameters. The first one is the energy detection level such as the one used in carrier sense mechanisms. The second one is the reliability threshold used by the routing layer to select stable links only. Both analytic and simulation results show that using opportunistic protocols is challenging.

  5. Search for all MCs in networks with unreliable nodes and arcs

    International Nuclear Information System (INIS)

    Yeh, W.-C.

    2003-01-01

    A simple method is proposed to search for all minimal cutsets (MCs ) for imperfect networks reliability subject to both arc and node failures under the condition that all of the MCs in the network with perfect nodes are given in advance. The proposed method does not require re-enumeration for all of the MCs for additional node failure consideration. All of the MC candidates found in the proposed algorithm are actual MCs without any need for further verification. This algorithm is more effective than the existing algorithm in which every MC candidate is not verified as a MC. No identical MCs are found using the proposed algorithm, which does not duplicate MCs and is more efficient than the existing methods. Only simple concepts are used to implement the proposed algorithm, which makes it easier to understand and implement. With considering unreliable nodes, the proposed method is also more realistic and valuable for reliability analysis in an existing network. The correctness of the proposed algorithm will be analyzed and proven. One example is used to illustrate how all MCs are generated in a network with arc and node failures solved using the proposed algorithm

  6. Distributed parameter estimation in unreliable sensor networks via broadcast gossip algorithms.

    Science.gov (United States)

    Wang, Huiwei; Liao, Xiaofeng; Wang, Zidong; Huang, Tingwen; Chen, Guo

    2016-01-01

    In this paper, we present an asynchronous algorithm to estimate the unknown parameter under an unreliable network which allows new sensors to join and old sensors to leave, and can tolerate link failures. Each sensor has access to partially informative measurements when it is awakened. In addition, the proposed algorithm can avoid the interference among messages and effectively reduce the accumulated measurement and quantization errors. Based on the theory of stochastic approximation, we prove that our proposed algorithm almost surely converges to the unknown parameter. Finally, we present a numerical example to assess the performance and the communication cost of the algorithm. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Data-flow Performance Optimisation on Unreliable Networks: the ATLAS Data-Acquisition Case

    CERN Document Server

    Colombo, T; The ATLAS collaboration

    2015-01-01

    Abstract The ATLAS detector at CERN records proton-proton collisions delivered by the Large Hadron Collider (LHC). The ATLAS Trigger and Data-Acquisition (TDAQ) system identifies, selects, and stores interesting collision data. These are received from the detector readout electronics at an average rate of 100 kHz. The typical event data size is 1 to 2 MB. Overall, the ATLAS TDAQ can be seen as a distributed software system executed on a farm of roughly 2000 commodity PCs. The worker nodes are interconnected by an Ethernet network that at the restart of the LHC in 2015 is expected to experience a sustained throughput of several 10 GB/s. Abstract A particular type of challenge posed by this system, and by DAQ systems in general, is the inherently bursty nature of the data traffic from the readout buffers to the worker nodes. This can cause instantaneous network congestion and therefore performance degradation. The effect is particularly pronounced for unreliable network interconnections, such as Ethernet. Abstr...

  8. Data-flow performance optimization on unreliable networks: the ATLAS data-acquisition case

    CERN Document Server

    Colombo, T; The ATLAS collaboration

    2014-01-01

    The ATLAS detector at CERN records proton-proton collisions delivered by the Large Hadron Collider (LHC). The ATLAS Trigger and Data-Acquisition (TDAQ) system identifies, selects, and stores interesting collision data. These are received from the detector readout electronics at an average rate of 100 kHz. The typical event data size is 1 to 2 MB. Overall, the ATLAS TDAQ can be seen as a distributed software system executed on a farm of roughly 2000 commodity PCs. The worker nodes are interconnected by an Ethernet network that at the restart of the LHC in 2015 is expected to experience a sustained throughput of several 10 GB/s. A particular type of challenge posed by this system, and by DAQ systems in general, is the inherently bursty nature of the data traffic from the readout buffers to the worker nodes. This can cause instantaneous network congestion and therefore performance degradation. The effect is particularly pronounced for unreliable network interconnections, such as Ethernet. In this presentation we...

  9. Reconsidering the unreliable narrator

    DEFF Research Database (Denmark)

    Hansen, Per Krogh

    2007-01-01

    to the position of A. Nünning. In the final section, a four-category taxonomy for the different textual strategies that establishes unreliable narration is suggested. The headlines for the taxonomy are intranarrational unreliability, internarrational unreliability, intertextual unreliability, and extratextual...

  10. Cooperation Survives and Cheating Pays in a Dynamic Network Structure with Unreliable Reputation

    Science.gov (United States)

    Antonioni, Alberto; Sánchez, Angel; Tomassini, Marco

    2016-06-01

    In a networked society like ours, reputation is an indispensable tool to guide decisions about social or economic interactions with individuals otherwise unknown. Usually, information about prospective counterparts is incomplete, often being limited to an average success rate. Uncertainty on reputation is further increased by fraud, which is increasingly becoming a cause of concern. To address these issues, we have designed an experiment based on the Prisoner’s Dilemma as a model for social interactions. Participants could spend money to have their observable cooperativeness increased. We find that the aggregate cooperation level is practically unchanged, i.e., global behavior does not seem to be affected by unreliable reputations. However, at the individual level we find two distinct types of behavior, one of reliable subjects and one of cheaters, where the latter artificially fake their reputation in almost every interaction. Cheaters end up being better off than honest individuals, who not only keep their true reputation but are also more cooperative. In practice, this results in honest subjects paying the costs of fraud as cheaters earn the same as in a truthful environment. These findings point to the importance of ensuring the truthfulness of reputation for a more equitable and fair society.

  11. Sammelrezension: Unreliable Narration

    OpenAIRE

    Orth, Dominik

    2009-01-01

    Eva Laass: Broken Taboos, Subjective Truths. Forms and Functions of Unreliable Narration in Contemporary American Cinema. A Contribution to Film NarratologyVolker Ferenz: Don’t believe his lies. The unreliable narrator in contemporary American cinema

  12. The dynamics of unreliable narration

    DEFF Research Database (Denmark)

    Hansen, Per Krogh

    2017-01-01

    Per Krogh Hansen brings attention to one of the most discussed narratological concepts in recent years, the ‘unreliable narrator’. In the article »The Dynamics of Unreliable Narration«, Hansen is considering to what extent the question of authorial control or intention is relevant when analysing...... and interpreting unreliable narrators. In the first part of the article, he questions this claimed essentiality of an authorial agent from three different angles: One concerning the border between diegetic and extradiegetic issues. Another with specific focus on unreliable simultaneous narration (first person......, present tense). And a third with attention paid to the role of unreliable narrators in factual narratives. In the article, he proposes a model for describing the different dynamic roles the authorial agent, as well as the empirical reader, plays in different forms of unreliable narration. Here, terms like...

  13. Information Collection using Handheld Devices in Unreliable Networking Environments

    Science.gov (United States)

    2014-06-01

    joint logistics operations center JMS Java Message System JUNG Java Universal Network/Graph Framework KTG Kestral Technology Group MILOB... Java Message System, a Publisher/Subscriber system that is explained in greater detail at either Oracle’s JMS site (Oracle 2014) or the JMS Wikipedia...Google’s infrastructure and local servers with MySQL and PostgreSQL on the backend (ODK 2014b). (2) Google Fusion Tables are used to do basic link

  14. Automated Construction of Node Software Using Attributes in a Ubiquitous Sensor Network Environment

    Science.gov (United States)

    Lee, Woojin; Kim, Juil; Kang, JangMook

    2010-01-01

    In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN) applications challenging. To help developers construct a large amount of node software for sensor network applications easily and rapidly, this paper proposes an approach to the automated construction of node software for USN applications using attributes. In the proposed technique, application construction proceeds by first developing a model for the sensor network and then designing node software by setting the values of the predefined attributes. After that, the sensor network model and the design of node software are verified. The final source codes of the node software are automatically generated from the sensor network model. We illustrate the efficiency of the proposed technique by using a gas/light monitoring application through a case study of a Gas and Light Monitoring System based on the Nano-Qplus operating system. We evaluate the technique using a quantitative metric—the memory size of execution code for node software. Using the proposed approach, developers are able to easily construct sensor network applications and rapidly generate a large number of node softwares at a time in a ubiquitous sensor network environment. PMID:22163678

  15. Automated Construction of Node Software Using Attributes in a Ubiquitous Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    JangMook Kang

    2010-09-01

    Full Text Available In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN applications challenging. To help developers construct a large amount of node software for sensor network applications easily and rapidly, this paper proposes an approach to the automated construction of node software for USN applications using attributes. In the proposed technique, application construction proceeds by first developing a model for the sensor network and then designing node software by setting the values of the predefined attributes. After that, the sensor network model and the design of node software are verified. The final source codes of the node software are automatically generated from the sensor network model. We illustrate the efficiency of the proposed technique by using a gas/light monitoring application through a case study of a Gas and Light Monitoring System based on the Nano-Qplus operating system. We evaluate the technique using a quantitative metric—the memory size of execution code for node software. Using the proposed approach, developers are able to easily construct sensor network applications and rapidly generate a large number of node softwares at a time in a ubiquitous sensor network environment.

  16. Automated construction of node software using attributes in a ubiquitous sensor network environment.

    Science.gov (United States)

    Lee, Woojin; Kim, Juil; Kang, JangMook

    2010-01-01

    In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN) applications challenging. To help developers construct a large amount of node software for sensor network applications easily and rapidly, this paper proposes an approach to the automated construction of node software for USN applications using attributes. In the proposed technique, application construction proceeds by first developing a model for the sensor network and then designing node software by setting the values of the predefined attributes. After that, the sensor network model and the design of node software are verified. The final source codes of the node software are automatically generated from the sensor network model. We illustrate the efficiency of the proposed technique by using a gas/light monitoring application through a case study of a Gas and Light Monitoring System based on the Nano-Qplus operating system. We evaluate the technique using a quantitative metric-the memory size of execution code for node software. Using the proposed approach, developers are able to easily construct sensor network applications and rapidly generate a large number of node softwares at a time in a ubiquitous sensor network environment.

  17. Cost of unreliability method to estimate loss of revenue based on unreliability data: Case study of Printing Company

    Science.gov (United States)

    alhilman, Judi

    2017-12-01

    In the production line process of the printing office, the reliability of the printing machine plays a very important role, if the machine fail it can disrupt production target so that the company will suffer huge financial loss. One method to calculate the financial loss cause by machine failure is use the Cost of Unreliability(COUR) method. COUR method works based on down time machine and costs associated with unreliability data. Based on the calculation of COUR method, so the sum of cost due to unreliability printing machine during active repair time and downtime is 1003,747.00.

  18. When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs.

    Science.gov (United States)

    Tang, Changbing; Li, Ang; Li, Xiang

    2015-10-01

    In self-organized mobile ad hoc networks (MANETs), network functions rely on cooperation of self-interested nodes, where a challenge is to enforce their mutual cooperation. In this paper, we study cooperative packet forwarding in a one-hop unreliable channel which results from loss of packets and noisy observation of transmissions. We propose an indirect reciprocity framework based on evolutionary game theory, and enforce cooperation of packet forwarding strategies in both structured and unstructured MANETs. Furthermore, we analyze the evolutionary dynamics of cooperative strategies and derive the threshold of benefit-to-cost ratio to guarantee the convergence of cooperation. The numerical simulations verify that the proposed evolutionary game theoretic solution enforces cooperation when the benefit-to-cost ratio of the altruistic exceeds the critical condition. In addition, the network throughput performance of our proposed strategy in structured MANETs is measured, which is in close agreement with that of the full cooperative strategy.

  19. Thermal-hydraulic unreliability of passive systems

    International Nuclear Information System (INIS)

    Tzanos, C.P.; Saltos, N.T.

    1995-01-01

    Advanced light water reactor designs like AP600 and the simplified boiling water reactor (SBWR) use passive safety systems for accident prevention and mitigation. Because these systems rely on natural forces for their operation, their unavailability due to hardware failures and human error is significantly smaller than that of active systems. However, the coolant flows predicted to be delivered by these systems can be subject to significant uncertainties, which in turn can lead to a significant uncertainty in the predicted thermal-hydraulic performance of the plant under accident conditions. Because of these uncertainties, there is a probability that an accident sequence for which a best estimate thermal-hydraulic analysis predicts no core damage (success sequence) may actually lead to core damage. For brevity, this probability will be called thermal-hydraulic unreliability. The assessment of this unreliability for all the success sequences requires very expensive computations. Moreover, the computational cost increases drastically as the required thermal-hydraulic reliability increases. The required computational effort can be greatly reduced if a bounding approach can be used that either eliminates the need to compute thermal-hydraulic unreliabilities, or it leads to the analysis of a few bounding sequences for which the required thermal-hydraulic reliability is relatively small. The objective of this paper is to present such an approach and determine the order of magnitude of the thermal-hydraulic unreliabilities that may have to be computed

  20. Moving Picture, Lying Image: Unreliable Cinematic Narratives

    OpenAIRE

    Csönge Tamás

    2015-01-01

    By coining the term “unreliable narrator” Wayne Booth hypothesized another agent in his model besides the author, the implicit author, to explain the double coding of narratives where a distorted view of reality and the exposure of this distortion are presented simultaneously. The article deals with the applicability of the concept in visual narratives. Since unreliability is traditionally considered to be intertwined with first person narratives, it works through subjective mediators. Accord...

  1. A calculus of quality for robustness against unreliable communication

    DEFF Research Database (Denmark)

    Nielson, Hanne Riis; Nielson, Flemming; Vigo, Roberto

    2015-01-01

    A main challenge in the development of distributed systems is to ensure that the components continue to behave in a reasonable manner even when communication becomes unreliable. We propose a process calculus, the Quality Calculus, for programming software components where it becomes natural to plan...... for default behaviour in case the ideal behaviour fails due to unreliable communication and thereby to increase the quality of service offered by the system. The development is facilitated by a SAT-based robustness analysis to determine whether or not the code is vulnerable to unreliable communication...

  2. Towards a Framework for Self-Adaptive Reliable Network Services in Highly-Uncertain Environments

    DEFF Research Database (Denmark)

    Grønbæk, Lars Jesper; Schwefel, Hans-Peter; Ceccarelli, Andrea

    2010-01-01

    In future inhomogeneous, pervasive and highly dynamic networks, end-nodes may often only rely on unreliable and uncertain observations to diagnose hidden network states and decide upon possible remediation actions. Inherent challenges exists to identify good and timely decision strategies to impr...... execution (and monitoring) of remediation actions. We detail the motivations to the ODDR design, then we present its architecture, and finally we describe our current activities towards the realization and assessment of the framework services and the main results currently achieved....

  3. The Effect of Unreliable Machine for Two Echelons Deteriorating Inventory Model

    Directory of Open Access Journals (Sweden)

    I Nyoman Sutapa

    2014-01-01

    Full Text Available Many researchers have developed two echelons supply chain, however only few of them consider deteriorating items and unreliable machine in their models In this paper, we develop an inventory deteriorating model for two echelons supply chain with unreliable machine. The unreliable machine time is assumed uniformly distributed. The model is solved using simple heuristic since a closed form model can not be derived. A numerical example is used to show how the model works. A sensitivity analysis is conducted to show effect of different lost sales cost in the model. The result shows that increasing lost sales cost will increase both manufacture and buyer costs however buyer’s total cost increase higher than manufacture’s total cost as manufacture’s machine is more unreliable.

  4. Social sensing building reliable systems on unreliable data

    CERN Document Server

    Wang, Dong; Kaplan, Lance

    2015-01-01

    Increasingly, human beings are sensors engaging directly with the mobile Internet. Individuals can now share real-time experiences at an unprecedented scale. Social Sensing: Building Reliable Systems on Unreliable Data looks at recent advances in the emerging field of social sensing, emphasizing the key problem faced by application designers: how to extract reliable information from data collected from largely unknown and possibly unreliable sources. The book explains how a myriad of societal applications can be derived from this massive amount of data collected and shared by average individu

  5. Moving Picture, Lying Image: Unreliable Cinematic Narratives

    Directory of Open Access Journals (Sweden)

    Csönge Tamás

    2015-08-01

    Full Text Available By coining the term “unreliable narrator” Wayne Booth hypothesized another agent in his model besides the author, the implicit author, to explain the double coding of narratives where a distorted view of reality and the exposure of this distortion are presented simultaneously. The article deals with the applicability of the concept in visual narratives. Since unreliability is traditionally considered to be intertwined with first person narratives, it works through subjective mediators. According to scholarly literature on the subject, the narrator has to be strongly characterized, or in other words, anthropomorphized. In the case of film, the main problem is that the narrator is either missing or the narration cannot be attributed entirely to them. There is a medial rupture where the apparatus mediates the story instead of a character’s oral or written discourse. The present paper focuses on some important but overlooked questions about the nature of cinematic storytelling through a re-examination of |the lying flashback in Alfred Hitchcock's Stage Fright. Can a character-narrator control the images the viewer sees? How can the filmic image still be unreliable without having an anthropomorphic narrator? How useful is the term focalization when we are dealing with embedded character-narratives in film?

  6. Reliable software for unreliable hardware a cross layer perspective

    CERN Document Server

    Rehman, Semeen; Henkel, Jörg

    2016-01-01

    This book describes novel software concepts to increase reliability under user-defined constraints. The authors’ approach bridges, for the first time, the reliability gap between hardware and software. Readers will learn how to achieve increased soft error resilience on unreliable hardware, while exploiting the inherent error masking characteristics and error (stemming from soft errors, aging, and process variations) mitigations potential at different software layers. · Provides a comprehensive overview of reliability modeling and optimization techniques at different hardware and software levels; · Describes novel optimization techniques for software cross-layer reliability, targeting unreliable hardware.

  7. RNEDE: Resilient Network Design Environment

    Energy Technology Data Exchange (ETDEWEB)

    Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

    2010-08-01

    Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

  8. Computer network environment planning and analysis

    Science.gov (United States)

    Dalphin, John F.

    1989-01-01

    The GSFC Computer Network Environment provides a broadband RF cable between campus buildings and ethernet spines in buildings for the interlinking of Local Area Networks (LANs). This system provides terminal and computer linkage among host and user systems thereby providing E-mail services, file exchange capability, and certain distributed computing opportunities. The Environment is designed to be transparent and supports multiple protocols. Networking at Goddard has a short history and has been under coordinated control of a Network Steering Committee for slightly more than two years; network growth has been rapid with more than 1500 nodes currently addressed and greater expansion expected. A new RF cable system with a different topology is being installed during summer 1989; consideration of a fiber optics system for the future will begin soon. Summmer study was directed toward Network Steering Committee operation and planning plus consideration of Center Network Environment analysis and modeling. Biweekly Steering Committee meetings were attended to learn the background of the network and the concerns of those managing it. Suggestions for historical data gathering have been made to support future planning and modeling. Data Systems Dynamic Simulator, a simulation package developed at NASA and maintained at GSFC was studied as a possible modeling tool for the network environment. A modeling concept based on a hierarchical model was hypothesized for further development. Such a model would allow input of newly updated parameters and would provide an estimation of the behavior of the network.

  9. The Integration of Personal Learning Environments & Open Network Learning Environments

    Science.gov (United States)

    Tu, Chih-Hsiung; Sujo-Montes, Laura; Yen, Cherng-Jyh; Chan, Junn-Yih; Blocher, Michael

    2012-01-01

    Learning management systems traditionally provide structures to guide online learners to achieve their learning goals. Web 2.0 technology empowers learners to create, share, and organize their personal learning environments in open network environments; and allows learners to engage in social networking and collaborating activities. Advanced…

  10. Social Networks and the Environment

    OpenAIRE

    Julio Videras

    2013-01-01

    This review discusses empirical research on social networks and the environment; it summarizes findings from representative studies and the conceptual frameworks social scientists use to examine the role of social networks. The article presents basic concepts in social network analysis, summarizes common challenges of empirical research on social networks, and outlines areas for future research. Finally, the article discusses the normative and positive meanings of social networks.

  11. How Do Households Respond to Unreliable Water Supplies? A Systematic Review

    Directory of Open Access Journals (Sweden)

    Batsirai Majuru

    2016-12-01

    Full Text Available Although the Millennium Development Goal (MDG target for drinking water was met, in many developing countries water supplies are unreliable. This paper reviews how households in developing countries cope with unreliable water supplies, including coping costs, the distribution of coping costs across socio-economic groups, and effectiveness of coping strategies in meeting household water needs. Structured searches were conducted in peer-reviewed and grey literature in electronic databases and search engines, and 28 studies were selected for review, out of 1643 potentially relevant references. Studies were included if they reported on strategies to cope with unreliable household water supplies and were based on empirical research in developing countries. Common coping strategies include drilling wells, storing water, and collecting water from alternative sources. The choice of coping strategies is influenced by income, level of education, land tenure and extent of unreliability. The findings of this review highlight that low-income households bear a disproportionate coping burden, as they often engage in coping strategies such as collecting water from alternative sources, which is labour and time-intensive, and yields smaller quantities of water. Such alternative sources may be of lower water quality, and pose health risks. In the absence of dramatic improvements in the reliability of water supplies, a point of critical avenue of enquiry should be what coping strategies are effective and can be readily adopted by low income households.

  12. Statistical estimation Monte Carlo for unreliability evaluation of highly reliable system

    International Nuclear Information System (INIS)

    Xiao Gang; Su Guanghui; Jia Dounan; Li Tianduo

    2000-01-01

    Based on analog Monte Carlo simulation, statistical Monte Carlo methods for unreliable evaluation of highly reliable system are constructed, including direct statistical estimation Monte Carlo method and weighted statistical estimation Monte Carlo method. The basal element is given, and the statistical estimation Monte Carlo estimators are derived. Direct Monte Carlo simulation method, bounding-sampling method, forced transitions Monte Carlo method, direct statistical estimation Monte Carlo and weighted statistical estimation Monte Carlo are used to evaluate unreliability of a same system. By comparing, weighted statistical estimation Monte Carlo estimator has smallest variance, and has highest calculating efficiency

  13. Modeling and Forecasting (Un)Reliable Realized Covariances for More Reliable Financial Decisions

    DEFF Research Database (Denmark)

    Bollerslev, Tim; Patton, Andrew J.; Quaedvlieg, Rogier

    We propose a new framework for modeling and forecasting common financial risks based on (un)reliable realized covariance measures constructed from high-frequency intraday data. Our new approach explicitly incorporates the effect of measurement errors and time-varying attenuation biases into the c......We propose a new framework for modeling and forecasting common financial risks based on (un)reliable realized covariance measures constructed from high-frequency intraday data. Our new approach explicitly incorporates the effect of measurement errors and time-varying attenuation biases...

  14. Automatic early warning systems for the environment

    Directory of Open Access Journals (Sweden)

    Lesjak Martin

    2003-01-01

    Full Text Available Computerized, continuous monitoring environmental early warning systems are complex networks that merge measurements with the information technology. Accuracy, consistency, reliability and data quality are their most important features. Several effects may disturb their characteristics: hostile environment, unreliable communications, poor quality of equipment nonqualified users or service personnel. According to our experiences, a number of measures should be taken to enhance system performances and to maintain them at the desired level. In the paper, we are presenting an analysis of system requirements, possible disturbances and corrective measures that give the main directives for the design, construction and exploitation of the environmental early warning systems. Procedures which ensure data integrity and quality are mentioned. Finally, the contemporary system approach based on the LAN/WAN network topology with Intranet/Internet software is proposed, together with case descriptions of two already operating systems, based on computer-network principle.

  15. A Vehicular Guidance Wireless Sensor/Actuator Network

    KAUST Repository

    Boudellioua, Imene

    2012-07-01

    Sensor networks have been heralded as one of 21 most important technologies for the 21st century by Business Week [1]. Wireless sensor/actuator networks (WSANs)are emerging as a new generation of sensor networks with the potential for enhancing the versatility and effectiveness of sensor networks. However, the unreliability of wireless communications and the real-time requirements of control applications raise great challenges for WSAN design. In this thesis, we design a WSAN for a vehicular guidance system targeting environmental disaster management applications. In this system, actuators provide mobility to all sensor nodes in the observed area whenever needed. Moreover, nodes form clusters and their movement is controlled by a master node that is selected dynamically. We also discuss the factors affecting our network performance in real-life and propose a framework which accounts for real-time requirement and reliable actuation. We finally perform some experimental studies on our system to measure its performance in an indoor environment.

  16. Learning Networks Distributed Environment

    NARCIS (Netherlands)

    Martens, Harrie; Vogten, Hubert; Koper, Rob; Tattersall, Colin; Van Rosmalen, Peter; Sloep, Peter; Van Bruggen, Jan; Spoelstra, Howard

    2005-01-01

    Learning Networks Distributed Environment is a prototype of an architecture that allows the sharing and modification of learning materials through a number of transport protocols. The prototype implements a p2p protcol using JXTA.

  17. Social network analysis of study environment

    Directory of Open Access Journals (Sweden)

    Blaženka Divjak

    2010-06-01

    Full Text Available Student working environment influences student learning and achievement level. In this respect social aspects of students’ formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time, attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated.

  18. Unreliable trains and induced rescheduling; implications for cost-benefit analysis

    NARCIS (Netherlands)

    Tseng, Y.; Rietveld, P.; Verhoef, E.T.

    2012-01-01

    This paper is concerned with the assessment of generalized user cost reductions in the cost-benefit analysis (CBA) of transport policies that aim at reducing unreliability. In particular, we investigate the implications of railway passengers' anticipating departure behavior when train services were

  19. An Examination of the Neural Unreliability Thesis of Autism.

    Science.gov (United States)

    Butler, John S; Molholm, Sophie; Andrade, Gizely N; Foxe, John J

    2017-01-01

    An emerging neuropathological theory of Autism, referred to here as "the neural unreliability thesis," proposes greater variability in moment-to-moment cortical representation of environmental events, such that the system shows general instability in its impulse response function. Leading evidence for this thesis derives from functional neuroimaging, a methodology ill-suited for detailed assessment of sensory transmission dynamics occurring at the millisecond scale. Electrophysiological assessments of this thesis, however, are sparse and unconvincing. We conducted detailed examination of visual and somatosensory evoked activity using high-density electrical mapping in individuals with autism (N = 20) and precisely matched neurotypical controls (N = 20), recording large numbers of trials that allowed for exhaustive time-frequency analyses at the single-trial level. Measures of intertrial coherence and event-related spectral perturbation revealed no convincing evidence for an unreliability account of sensory responsivity in autism. Indeed, results point to robust, highly reproducible response functions marked for their exceedingly close correspondence to those in neurotypical controls. © The Author 2016. Published by Oxford University Press.

  20. National network of radioactivity measurement in environment

    International Nuclear Information System (INIS)

    2006-01-01

    This document constitutes the report of management for the year 2006 of the national network of measurement of radioactivity in environment, instituted by the article R.1333-11 of the Public Health code. According to the 5. of the decree of 27. june 2005, the Institute of radiation protection and nuclear safety (I.R.S.N.) has for mission to write every year a report of management of the national network of radioactivity measurement in environment. This report has for principal objectives: to do an evaluation on organisation and functioning of the piloting committee; to realize a synthesis on the different tasks lead by the working groups; as well as on the human and financial resources devoted to this project; to debrief on the development project of the national network information system. This report must allow to the network actors, as to the professional people and the public, to understand the functioning of the national network and the process implemented for the development of centralization, management and public diffusion tools, of the radioactivity data in environment. The year 2006 was marked by the opening of an Internet gate of the national network. (N.C.)

  1. Conditions for Productive Learning in Network Learning Environments

    DEFF Research Database (Denmark)

    Ponti, M.; Dirckinck-Holmfeld, Lone; Lindström, B.

    2004-01-01

    are designed without a deep understanding of the pedagogical, communicative and collaborative conditions embedded in networked learning. Despite the existence of good theoretical views pointing to a social understanding of learning, rather than a traditional individualistic and information processing approach......The Kaleidoscope1 Jointly Executed Integrating Research Project (JEIRP) on Conditions for Productive Networked Learning Environments is developing and elaborating conceptual understandings of Computer Supported Collaborative Learning (CSCL) emphasizing the use of cross-cultural comparative......: Pedagogical design and the dialectics of the digital artefacts, the concept of collaboration, ethics/trust, identity and the role of scaffolding of networked learning environments.   The JEIRP is motivated by the fact that many networked learning environments in various European educational settings...

  2. Heterogeneous networking in the home environment

    OpenAIRE

    Bolla, Raffaele; Davoli, Franco; Repetto, Matteo; Fragopoulos, Tasos; Serpanos, D.; Chessa, Stefano; Ferro, Erina

    2006-01-01

    The management and control at multiple protocol layers of a heterogeneous networking structure, to support multimedia applications in the home environment, is considered. The paper examines possible scenarios, and corresponding architectural solutions, also in the light of existing wireless and sensor networks technologies.

  3. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  4. NNETS - NEURAL NETWORK ENVIRONMENT ON A TRANSPUTER SYSTEM

    Science.gov (United States)

    Villarreal, J.

    1994-01-01

    The primary purpose of NNETS (Neural Network Environment on a Transputer System) is to provide users a high degree of flexibility in creating and manipulating a wide variety of neural network topologies at processing speeds not found in conventional computing environments. To accomplish this purpose, NNETS supports back propagation and back propagation related algorithms. The back propagation algorithm used is an implementation of Rumelhart's Generalized Delta Rule. NNETS was developed on the INMOS Transputer. NNETS predefines a Back Propagation Network, a Jordan Network, and a Reinforcement Network to assist users in learning and defining their own networks. The program also allows users to configure other neural network paradigms from the NNETS basic architecture. The Jordan network is basically a feed forward network that has the outputs connected to a pseudo input layer. The state of the network is dependent on the inputs from the environment plus the state of the network. The Reinforcement network learns via a scalar feedback signal called reinforcement. The network propagates forward randomly. The environment looks at the outputs of the network to produce a reinforcement signal that is fed back to the network. NNETS was written for the INMOS C compiler D711B version 1.3 or later (MS-DOS version). A small portion of the software was written in the OCCAM language to perform the communications routing between processors. NNETS is configured to operate on a 4 X 10 array of Transputers in sequence with a Transputer based graphics processor controlled by a master IBM PC 286 (or better) Transputer. A RGB monitor is required which must be capable of 512 X 512 resolution. It must be able to receive red, green, and blue signals via BNC connectors. NNETS is meant for experienced Transputer users only. The program is distributed on 5.25 inch 1.2Mb MS-DOS format diskettes. NNETS was developed in 1991. Transputer and OCCAM are registered trademarks of Inmos Corporation. MS

  5. Fragmented network subsystem with traffic filtering for microkernel environment

    Directory of Open Access Journals (Sweden)

    Anna Urievna Budkina

    2016-06-01

    Full Text Available The TCP/IP stack in a microkernel operating system executed in a user space, which requires the development of a distributed network infrastructure within a single software environment. Its functions are the organization of interaction between the components of the stack with different processes, as well as the organization of filtering mechanisms and routing of internal network traffic. Use of architectural approaches applicable in monolithic-modular systems is impossible, because the network stack is not a shareable component of the system. As a consequence, the microkernel environment requires development of special network subsystem. In this work we provide overview of major conceptions of network architectures in microkernel environments. Also, we provide own architecture which supports filtering of internal network traffic. We evaluate the architecture by development of high-performance "key-value" store.

  6. Performance of Group Communication Over Ad-Hoc Networks

    National Research Council Canada - National Science Library

    Mosko, Marc; Garcia-Luna-Aceves, J. J

    2002-01-01

    ... through a network of cluster trees, where a spanning tree joins groups of fully connected nodes. Through numerical analysis and simulations in GloMoSim, we show throughput, goodput, and loss rates for reliable and unreliable networks...

  7. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  8. Massivizing Networked Virtual Environments on Clouds

    NARCIS (Netherlands)

    Shen, S.

    2015-01-01

    Networked Virtual Environments (NVEs) are virtual environments where physically distributed, Internet-connected users can interact and socialize with others. The most popular NVEs are online games, which have hundreds of millions of users and a global market of tens of billions Euros per year.

  9. Multimedia didactic courseware of imaging anatomy for network environment

    International Nuclear Information System (INIS)

    Jin Jiyang; Teng Gaojun; Yang Xiaoqing; Zhu Haihua; Kong Weiwei; Zhu Jiaming; Li Guozhao

    2004-01-01

    Objective: To design and program the multimedia didactic courseware of imaging anatomy for network environment. Methods: By collecting the teaching material and images of 'imaging anatomy', the images were obtained with digital cameras and scanners, and processed with graphic software, and then the multimedia didactic courseware was archived with Dreamweaver MX. Results: Multimedia didactic courseware of imaging anatomy with friendly interface for network environment had been completed. Reliable, stable, and flexible operation in campus network and Internet environment was achieved. Conclusion: Being not conditioned by time and space factor, multimedia didactic courseware for network environment with an abundance of information and more freedom in teaching and studying, which saves manpower and material resources and makes an effective disposal of educational resources, will have broad prospects to develop. (authors)

  10. Unreliability and the Animal Narrator in Richard Adams’s The Plague Dogs

    Directory of Open Access Journals (Sweden)

    Anja Höing

    2017-03-01

    Full Text Available Richard Adams’s talking animal story The Plague Dogs (1978, with its deeply genre-atypical mode of narration, offers a multiplicity of avenues to explore the literary animal as animal. The story draws much of its power from the psychological complexity and related unreliability of both canine narrators, two research lab escapees gone feral. Both the terrier Snitter and the black mongrel Rowf are mentally ill and experience a highly subjective, part-fantastic world. In episodes of zero focalization, a sarcastic voice comments on the plot from the off, aggressively attacking a thoroughly anthropocentric superstructure the protagonists themselves are oblivious of, and presenting all that is normally constructed as “rational” in the implied reader’s world as a carnivalesque farce. Combining these equally unreliable narratives, The Plague Dogs creates a unique mixture of what Phelan (2007 calls “estranging” and “bonding” unreliability and brings to light the devastating consequences of anthropocentrism. The Plague Dogs not only defamiliarizes a genre usually committed to conventional means of storytelling, but the dominant Western conception of the status of animals in the world, showing that once we start to read the animal as animal, this sets into motion an avalanche of other concepts in need of re-reading, among them the very ones making up the fundamental pillars of Western societies’ anthropocentric self-conception.

  11. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  12. Node counting in wireless ad-hoc networks

    NARCIS (Netherlands)

    Evers, J.H.M.; Kiss, D.; Kowalczyk, W.; Navilarekallu, T.; Renger, D.R.M.; Sella, L.; Timperio, V.; Viorel, A.; Wijk, van A.C.C.; Yzelman, A.J.; Planqué, B.; Bhulai, S.; Hulshof, J.; Kager, W.; Rot, T.

    2012-01-01

    We study wireless ad-hoc networks consisting of small microprocessors with limited memory, where the wireless communication between the processors can be highly unreliable. For this setting, we propose a number of algorithms to estimate the number of nodes in the network, and the number of direct

  13. Intelligent Multi-Agent Middleware for Ubiquitous Home Networking Environments

    OpenAIRE

    Minwoo Son; Seung-Hun Lee; Dongkyoo Shin; Dongil Shin

    2008-01-01

    The next stage of the home networking environment is supposed to be ubiquitous, where each piece of material is equipped with an RFID (Radio Frequency Identification) tag. To fully support the ubiquitous environment, home networking middleware should be able to recommend home services based on a user-s interests and efficiently manage information on service usage profiles for the users. Therefore, USN (Ubiquitous Sensor Network) technology, which recognizes and manages a ...

  14. HeNCE: A Heterogeneous Network Computing Environment

    Directory of Open Access Journals (Sweden)

    Adam Beguelin

    1994-01-01

    Full Text Available Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM. The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.

  15. Integrated Analysis of Environment-driven Operational Effects in Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Park, Alfred J [ORNL; Perumalla, Kalyan S [ORNL

    2007-07-01

    There is a rapidly growing need to evaluate sensor network functionality and performance in the context of the larger environment of infrastructure and applications in which the sensor network is organically embedded. This need, which is motivated by complex applications related to national security operations, leads to a paradigm fundamentally different from that of traditional data networks. In the sensor networks of interest to us, the network dynamics depend strongly on sensor activity, which in turn is triggered by events in the environment. Because the behavior of sensor networks is sensitive to these driving phenomena, the integrity of the sensed observations, measurements and resource usage by the network can widely vary. It is therefore imperative to accurately capture the environmental phenomena, and drive the simulation of the sensor network operation by accounting fully for the environment effects. In this paper, we illustrate the strong, intimate coupling between the sensor network operation and the driving phenomena in their applications with an example sensor network designed to detect and track gaseous plumes.

  16. Developing Reliable Telemedicine Platforms with Unreliable and Limited Communication Bandwidth

    Science.gov (United States)

    2017-10-01

    AFRL-SA-WP-TR-2017-0019 Developing Reliable Telemedicine Platforms with Unreliable and Limited Communication Bandwidth Peter F...Wright-Patterson AFB, OH 45433-7913 DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited. STINFO COPY NOTICE AND...invention that may relate to them. Qualified requestors may obtain copies of this report from the Defense Technical Information Center (DTIC) (http

  17. The Effects of Source Unreliability on Prior and Future Word Learning

    Science.gov (United States)

    Faught, Gayle G.; Leslie, Alicia D.; Scofield, Jason

    2015-01-01

    Young children regularly learn words from interactions with other speakers, though not all speakers are reliable informants. Interestingly, children will reverse to trusting a reliable speaker when a previously endorsed speaker proves unreliable. When later asked to identify the referent of a novel word, children who reverse trust are less willing…

  18. VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Directory of Open Access Journals (Sweden)

    He Xu

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is one of the key technologies of the Internet of Things (IoT and is used in many areas, such as mobile payments, public transportation, smart lock, and environment protection. However, the performance of RFID equipment can be easily affected by the surrounding environment, such as electronic productions and metal appliances. These can impose an impact on the RF signal, which makes the collection of RFID data unreliable. Usually, the unreliability of RFID source data includes three aspects: false negatives, false positives, and dirty data. False negatives are the key problem, as the probability of false positives and dirty data occurrence is relatively small. This paper proposes a novel sliding window cleaning algorithm called VSMURF, which is based on the traditional SMURF algorithm which combines the dynamic change of tags and the value analysis of confidence. Experimental results show that VSMURF algorithm performs better in most conditions and when the tag’s speed is low or high. In particular, if the velocity parameter is set to 2 m/epoch, our proposed VSMURF algorithm performs better than SMURF. The results also show that VSMURF algorithm has better performance than other algorithms in solving the problem of false negatives for RFID networks.

  19. Characterisation of Network Objects in Natural and Anthropic Environments

    Science.gov (United States)

    Harris, B.; McDougall, K.; Barry, M.

    2014-11-01

    Networks are structures that organise component objects, and they are extensive and recognisable across a range of environments. Estimating lengths of networks objects and their relationships to areas contiguous to them could assist provide owners with additional knowledge of their assets. There is currently some understanding of the way in which networks (such as waterways) relate and respond to their natural and anthropogenic environments. Despite this knowledge, there is no straight forward formula, method or model that can be applied to assess these relationships to a sufficient level of detail. Whilst waterway networks and their structures are well understood from the work of Horton and Strahler, relatively little attention has been paid to how (or if) these properties and behaviours can inform the understanding of other, unrelated, networks. Analysis of existing natural and built network objects exhibited how relationships derived from waterway networks can be applied in new areas of interest. We create a predictive approach to associate dissimilar objects such as pipe networks to assess if using the model established for waterway networks and their relationships can be functional in other areas. Using diversity of inputs we create data to assist with the creation of a predictive model. This work provides a clean theoretical connection between a formula applied to evaluate waterways and their environments, and other natural and anthropogenic network objects. It fills a key knowledge gap in the assessment and application of approaches used to measure natural and built networks.

  20. Replication unreliability in psychology: elusive phenomena or elusive statistical power?

    Directory of Open Access Journals (Sweden)

    Patrizio E Tressoldi

    2012-07-01

    Full Text Available The focus of this paper is to analyse whether the unreliability of results related to certain controversial psychological phenomena may be a consequence of their low statistical power.Applying the Null Hypothesis Statistical Testing (NHST, still the widest used statistical approach, unreliability derives from the failure to refute the null hypothesis, in particular when exact or quasi-exact replications of experiments are carried out.Taking as example the results of meta-analyses related to four different controversial phenomena, subliminal semantic priming, incubation effect for problem solving, unconscious thought theory, and non-local perception, it was found that, except for semantic priming on categorization, the statistical power to detect the expected effect size of the typical study, is low or very low.The low power in most studies undermines the use of NHST to study phenomena with moderate or low effect sizes.We conclude by providing some suggestions on how to increase the statistical power or use different statistical approaches to help discriminate whether the results obtained may or may not be used to support or to refute the reality of a phenomenon with small effect size.

  1. Gossip algorithms in quantum networks

    Science.gov (United States)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up - in the best case exponentially - the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication.

  2. An Intelligent Pinger Network for Solid Glacier Environments

    Science.gov (United States)

    Schönitz, S.; Reuter, S.; Henke, C.; Jeschke, S.; Ewert, D.; Eliseev, D.; Heinen, D.; Linder, P.; Scholz, F.; Weinstock, L.; Wickmann, S.; Wiebusch, C.; Zierke, S.

    2016-12-01

    This talk presents a novel approach for an intelligent, agent-based pinger network in an extraterrestrial glacier environment. Because of recent findings of the Cassini spacecraft, a mission to Saturn's moon Enceladus is planned in order search for extraterrestrial life within the ocean beneath Enceladus' ice crust. Therefore, a maneuverable melting probe, the EnEx probe, was developed to melt into Enceladus' ice and take liquid samples from water-filled crevasses. Hence, the probe collecting the samples has to be able to navigate in ice which is a hard problem, because neither visual nor gravitational methods can be used. To enhance the navigability of the probe, a network of autonomous pinger units (APU) is in development that is able to extract a map of the ice environment via ultrasonic soundwaves. A network of these APUs will be deployed on the surface of Enceladus, melt into the ice and form a network to help guide the probe safely to its destination. The APU network is able to form itself fully autonomously and to compensate system failures of individual APUs. The agents controlling the single APU are realized by rule-based expert systems implemented in CLIPS. The rule-based expert system evaluates available information of the environment, decides for actions to take to achieve the desired goal (e.g. a specific network topology), and executes and monitors such actions. In general, it encodes certain situations that are evaluated whenever an APU is currently idle, and then decides for a next action to take. It bases this decision on its internal world model that is shared with the other APUs. The optimal network topology that defines each agents position is iteratively determined by mixed-integer nonlinear programming. Extensive simulations studies show that the proposed agent design enables the APUs to form a robust network topology that is suited to create a reliable 3D map of the ice environment.

  3. The Political Activity in the Network Environment

    Directory of Open Access Journals (Sweden)

    Марианна Юрьевна Павлютенкова

    2015-12-01

    Full Text Available The rapid development and deep penetration into all areas of modern society of information and communication technologies significantly increase the role of network interactions. Network structures represented primarily social networks, embedded in the public policy process and became one of the key political actors. Online communities take the form of public policy, where the formation of public opinion and political decision-making plays the main role. Networking environment opens up new opportunities for the opposition and protest movements, civic participation, and control of public policy in general. The article gives an insight on the political aspects of social networking, concludes on the trend formation and network's strengthening of the political activity in a wide distribution of e-networking and e-communications.

  4. Secure Cooperative Spectrum Sensing for the Cognitive Radio Network Using Nonuniform Reliability

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-01-01

    Full Text Available Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations.

  5. Sexy but often unreliable: the impact of unreliability on the replicability of experimental findings with implicit measures.

    Science.gov (United States)

    Lebel, Etienne P; Paunonen, Sampo V

    2011-04-01

    Implicit measures have contributed to important insights in almost every area of psychology. However, various issues and challenges remain concerning their use, one of which is their considerable variation in reliability, with many implicit measures having questionable reliability. The goal of the present investigation was to examine an overlooked consequence of this liability with respect to replication, when such implicit measures are used as dependent variables in experimental studies. Using a Monte Carlo simulation, the authors demonstrate that a higher level of unreliability in such dependent variables is associated with substantially lower levels of replicability. The results imply that this overlooked consequence can have far-reaching repercussions for the development of a cumulative science. The authors recommend the routine assessment and reporting of the reliability of implicit measures and also urge the improvement of implicit measures with low reliability.

  6. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  7. Evaluation of QoS supported in Network Mobility NEMO environments

    International Nuclear Information System (INIS)

    Hussien, L F; Abdalla, A H; Habaebi, M H; Khalifa, O O; Hassan, W H

    2013-01-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN)

  8. Amigo - Ambient Intelligence for the networked home environment

    NARCIS (Netherlands)

    Janse, M.D.

    2008-01-01

    The Amigo project develops open, standardized, interoperable middleware and attractive user services for the networked home environment. Fifteen of Europe's leading companies and research organizations in mobile and home networking, software development, consumer electronics and domestic appliances

  9. GUIDANCE2: accurate detection of unreliable alignment regions accounting for the uncertainty of multiple parameters.

    Science.gov (United States)

    Sela, Itamar; Ashkenazy, Haim; Katoh, Kazutaka; Pupko, Tal

    2015-07-01

    Inference of multiple sequence alignments (MSAs) is a critical part of phylogenetic and comparative genomics studies. However, from the same set of sequences different MSAs are often inferred, depending on the methodologies used and the assumed parameters. Much effort has recently been devoted to improving the ability to identify unreliable alignment regions. Detecting such unreliable regions was previously shown to be important for downstream analyses relying on MSAs, such as the detection of positive selection. Here we developed GUIDANCE2, a new integrative methodology that accounts for: (i) uncertainty in the process of indel formation, (ii) uncertainty in the assumed guide tree and (iii) co-optimal solutions in the pairwise alignments, used as building blocks in progressive alignment algorithms. We compared GUIDANCE2 with seven methodologies to detect unreliable MSA regions using extensive simulations and empirical benchmarks. We show that GUIDANCE2 outperforms all previously developed methodologies. Furthermore, GUIDANCE2 also provides a set of alternative MSAs which can be useful for downstream analyses. The novel algorithm is implemented as a web-server, available at: http://guidance.tau.ac.il. © The Author(s) 2015. Published by Oxford University Press on behalf of Nucleic Acids Research.

  10. A SAT-Based Analysis of a Calculus for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Wu, Xi; Nielson, Hanne Riis; Zhu, Huibiao

    2015-01-01

    In viewing the common unreliability problem in wireless communications, the CWQ calculus (a Calculus for Wireless sensor networks from Quality perspective) was recently proposed for modeling and reasoning about WSNs(Wireless Sensor Networks) and their applications from a quality perspective...

  11. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  12. Wireless Sensor/Actuator Network Design for Mobile Control Applications

    Directory of Open Access Journals (Sweden)

    Youxian Sung

    2007-10-01

    Full Text Available Wireless sensor/actuator networks (WSANs are emerging as a new generationof sensor networks. Serving as the backbone of control applications, WSANs will enablean unprecedented degree of distributed and mobile control. However, the unreliability ofwireless communications and the real-time requirements of control applications raise greatchallenges for WSAN design. With emphasis on the reliability issue, this paper presents anapplication-level design methodology for WSANs in mobile control applications. Thesolution is generic in that it is independent of the underlying platforms, environment,control system models, and controller design. To capture the link quality characteristics interms of packet loss rate, experiments are conducted on a real WSAN system. From theexperimental observations, a simple yet efficient method is proposed to deal withunpredictable packet loss on actuator nodes. Trace-based simulations give promisingresults, which demonstrate the effectiveness of the proposed approach.

  13. Vehicle lateral motion regulation under unreliable communication links based on robust H∞ output-feedback control schema

    Science.gov (United States)

    Li, Cong; Jing, Hui; Wang, Rongrong; Chen, Nan

    2018-05-01

    This paper presents a robust control schema for vehicle lateral motion regulation under unreliable communication links via controller area network (CAN). The communication links between the system plant and the controller are assumed to be imperfect and therefore the data packet dropouts occur frequently. The paper takes the form of parallel distributed compensation and treats the dropouts as random binary numbers that form Bernoulli distribution. Both of the tire cornering stiffness uncertainty and external disturbances are considered to enhance the robustness of the controller. In addition, a robust H∞ static output-feedback control approach is proposed to realize the lateral motion control with relative low cost sensors. The stochastic stability of the closed-loop system and conservation of the guaranteed H∞ performance are investigated. Simulation results based on CarSim platform using a high-fidelity and full-car model verify the effectiveness of the proposed control approach.

  14. Optimal network structure in an open market environment

    International Nuclear Information System (INIS)

    2002-01-01

    The focus of this report is on network planning in the new environment of a liberalized electricity market. The development of the network is viewed from different stakeholders objectives. The stakeholders in the transmission network are groups or individuals who have a stake in, or an expectation of the development and performance of the network. An open network exists when all market players meet equal admission rights and obligations. This required that the grid be administered through a transparent set of rules such as a grid code. (author)

  15. Public Agility and Change in a Network Environment

    Directory of Open Access Journals (Sweden)

    Tom van Engers

    2011-03-01

    Full Text Available Preparing for change is increasingly core business for governmental organizations. The networked society and the increasing connectedness of governmental organizations have as much impact on the complexity of the change process as the complexities of the corpus of law. Change is not only driven by changes in the law; changes in the organization’s environment often create a need to redesign business processes, reallocate roles and responsibilities, and reorder tasks. Moreover, preparations for change are not limited to the internal processes and systems of these organizations. Propagation of changes to network partners and redesign of network arrangements can be an enormous challenge. In the AGILE project, we develop a design method, distributed service architecture, and supporting tools that enable organizations - administrative and otherwise - to orchestrate their law-based services in a networked environment. This paper explains the Agile approach and describes some of its key principles.

  16. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  17. Mathematical Models by Quality of Service Driven Routing in Networks

    National Research Council Canada - National Science Library

    Gelenbe, E

    2005-01-01

    Very large networks with varying topologies, unreliable components, and highly time varying traffic, are not amenable to traditional techniques of analysis based on traffic engineering and simulations...

  18. Mathematical Models for Quality of Service Driven Routing in Networks

    National Research Council Canada - National Science Library

    Gelenbe, E

    2005-01-01

    Very large networks with varying topologies, unreliable components, and highly time varying traffic, are not amenable to traditional techniques of analysis based on traffic engineering and simulations...

  19. Network printing in a heterogenous environment

    International Nuclear Information System (INIS)

    Beyer, C.; Schroth, G.

    2001-01-01

    Mail and printing are often said to be the most visible services for the user in the network. Though many people talked about the paperless bureau a few years ago it seems that the more digital data is accessible, the more it gets printed. Print management in a heterogenous network environments is typically crossing all operating systems. Each of those brings its own requirements and different printing system implementations with individual user interfaces. The scope is to give the user the advantage and features of the native interface of their operating system while making administration tasks as easy as possible by following the general ideas of a centralised network service on the server side

  20. Amigo - Ambient Intelligence for the networked home environment

    OpenAIRE

    Janse, M.D.

    2008-01-01

    The Amigo project develops open, standardized, interoperable middleware and attractive user services for the networked home environment. Fifteen of Europe's leading companies and research organizations in mobile and home networking, software development, consumer electronics and domestic appliances have joined together in the Amigo project to develop an integrated interoperable home networking framework. Amigo is an IST-funded IP project. This report is the final report providing an overview ...

  1. Unreliable Sustainable Infrastructure: Three Transformations to Guide Cities towards Becoming Healthy 'Smart Cities'

    Energy Technology Data Exchange (ETDEWEB)

    Sperling, Joshua [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Fisher, Stephen [Tetra Tech; Reiner, Mark B. [Non Sequitur, LLC

    2017-10-26

    The term 'leapfrogging' has been applied to cities and nations that have adopted a new form of infrastructure by bypassing the traditional progression of development, e.g., from no phones to cell phones - bypassing landlines all together. However, leapfrogging from unreliable infrastructure systems to 'smart' cities is too large a jump resulting in unsustainable and unhealthy infrastructure systems. In the Global South, a baseline of unreliable infrastructure is a prevalent problem. The push for sustainable and 'smart' [re]development tends to ignore many of those already living with failing, unreliable infrastructure. Without awareness of baseline conditions, uninformed projects run the risk of returning conditions to the status quo, keeping many urban populations below targets of the United Nations' Sustainable Development Goals. A key part of understanding the baseline is to identify how citizens have long learned to adjust their expectations of basic services. To compensate for poor infrastructure, most residents in the Global South invest in remedial secondary infrastructure (RSI) at the household and business levels. The authors explore three key 'smart' city transformations that address RSI within a hierarchical planning pyramid known as the comprehensive resilient and reliable infrastructure systems (CRISP) planning framework.

  2. Web-Enabling an Early Warning and Tracking System for Network Vulnerabilities

    National Research Council Canada - National Science Library

    Coffman, James

    2001-01-01

    .... Additionally, it lacked support for automated data validation, resulting in unreliable vulnerability tracking information As a result, the process was ineffective, and Navy networks remained highly...

  3. National network of environment radioactivity measurements. Press kit

    International Nuclear Information System (INIS)

    2010-01-01

    This document first presents the objectives, challenges, context, operation and actors of the French national network of environment radioactivity measurements. It discusses the reasons for these measurements, the way they are performed, who perform them and how they are transmitted to the national network. It describes the quality policy for these measurements, and how this network is at the service of authorities, experts and population. It outlines the originality of the French approach within the European Union, and how this network takes the population expectations and their evolution into account

  4. Multifractal distribution of spike intervals for two oscillators coupled by unreliable pulses

    International Nuclear Information System (INIS)

    Kestler, Johannes; Kinzel, Wolfgang

    2006-01-01

    Two neurons coupled by unreliable synapses are modelled by leaky integrate-and-fire neurons and stochastic on-off synapses. The dynamics is mapped to an iterated function system. Numerical calculations yield a multifractal distribution of interspike intervals. The covering, information and correlation dimensions are calculated as a function of synaptic strength and transmission probability. (letter to the editor)

  5. Why General Outlier Detection Techniques Do Not Suffice For Wireless Sensor Networks?

    NARCIS (Netherlands)

    Zhang, Y.; Meratnia, Nirvana; Havinga, Paul J.M.

    2009-01-01

    Raw data collected in wireless sensor networks are often unreliable and inaccurate due to noise, faulty sensors and harsh environmental effects. Sensor data that significantly deviate from normal pattern of sensed data are often called outliers. Outlier detection in wireless sensor networks aims at

  6. Wireless sensor network and monitoring for environment

    OpenAIRE

    Han, Liang

    2011-01-01

    In recent years, wireless sensor network technology is developing at a surprisingly high speed. More and more fields have started to use the wireless sensor network technology and find the advantages of WSN, such as military applications, environmental observing and forecasting system, medical care, smart home, structure monitoring. The world Environmental Summit in Copenhagen on 2010 has just concluded that environment has become the world’s main concern. But regrettably the summit did no...

  7. Should Secondary Schools Buy Local Area Networks?

    Science.gov (United States)

    Hyde, Hartley

    1986-01-01

    The advantages of microcomputer networks include resource sharing, multiple user communications, and integrating data processing and office automation. This article nonetheless favors stand-alone computers for Australian secondary school classrooms because of unreliable hardware, software design, and copyright problems, and individual progress…

  8. An Adaptive Learning Based Network Selection Approach for 5G Dynamic Environments

    Directory of Open Access Journals (Sweden)

    Xiaohong Li

    2018-03-01

    Full Text Available Networks will continue to become increasingly heterogeneous as we move toward 5G. Meanwhile, the intelligent programming of the core network makes the available radio resource be more changeable rather than static. In such a dynamic and heterogeneous network environment, how to help terminal users select optimal networks to access is challenging. Prior implementations of network selection are usually applicable for the environment with static radio resources, while they cannot handle the unpredictable dynamics in 5G network environments. To this end, this paper considers both the fluctuation of radio resources and the variation of user demand. We model the access network selection scenario as a multiagent coordination problem, in which a bunch of rationally terminal users compete to maximize their benefits with incomplete information about the environment (no prior knowledge of network resource and other users’ choices. Then, an adaptive learning based strategy is proposed, which enables users to adaptively adjust their selections in response to the gradually or abruptly changing environment. The system is experimentally shown to converge to Nash equilibrium, which also turns out to be both Pareto optimal and socially optimal. Extensive simulation results show that our approach achieves significantly better performance compared with two learning and non-learning based approaches in terms of load balancing, user payoff and the overall bandwidth utilization efficiency. In addition, the system has a good robustness performance under the condition with non-compliant terminal users.

  9. Mobility management for SIP sessions in a heterogeneous network environment

    NARCIS (Netherlands)

    Romijn, Willem A.; Plas, Dirk-Jaap; Bijwaard, D.; Meeuwissen, Erik; van Ooijen, Gijs

    2004-01-01

    The next generation of communication networks is expected to create a heterogeneous network environment encompassing an ever-increasing number of different access networks and end-user terminals that will enable the introduction of and provide access to numerous feature-rich end-user services. It is

  10. Liner shipping hub network design in a competitive environment

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan; Pisinger, David

    2010-01-01

    A mixed integer programming formulation is proposed for hub-and-spoke network design in a competitive environment. It addresses the competition between a newcomer liner service provider and an existing dominating operator, both operating on hub-and-spoke networks. The newcomer company maximizes i...

  11. Network monitoring module of BES III system environment

    International Nuclear Information System (INIS)

    Song Liwen; Zhao Jingwei; Zhang Bingyun

    2002-01-01

    In order to meet the needs of the complicated network architecture of BES III (Beijing Spectrometer III) and make sure normal online running in the future, it is necessary to develop a multi-platforms Network Monitoring Tool which can help system administrator monitor and manage BES III network. The author provides a module that can monitor not only the traffic of switch-router's ports but also the performance status of key devices in the network environment, meanwhile it can also give warning to manager and submit the related reports. the great sense, the theory basis, the implementing method and the graph in formation of this tool will be discussed

  12. Overload Control in a SIP Signaling Network

    OpenAIRE

    Masataka Ohta

    2007-01-01

    The Internet telephony employs a new type of Internet communication on which a mutual communication is realized by establishing sessions. Session Initiation Protocol (SIP) is used to establish sessions between end-users. For unreliable transmission (UDP), SIP message should be retransmitted when it is lost. The retransmissions increase a load of the SIP signaling network, and sometimes lead to performance degradation when a network is overloaded. The paper proposes an overload control for a S...

  13. MUPBED - interworking challenges in a multi-domain and multi-technology network environment

    DEFF Research Database (Denmark)

    Foisel, Hans-Martin; Spaeth, Jan; Cavazzoni, Carlo

    2007-01-01

    Todays data transport networks are evolving continuously towards customer oriented and application aware networks. This evolution happens in Europe in a highly diverse network environment, covering multiple network domains, layers, technologies, control and management approaches. In this paper...

  14. Australia's long-term electricity demand forecasting using deep neural networks

    OpenAIRE

    Hamedmoghadam, Homayoun; Joorabloo, Nima; Jalili, Mahdi

    2018-01-01

    Accurate prediction of long-term electricity demand has a significant role in demand side management and electricity network planning and operation. Demand over-estimation results in over-investment in network assets, driving up the electricity prices, while demand under-estimation may lead to under-investment resulting in unreliable and insecure electricity. In this manuscript, we apply deep neural networks to predict Australia's long-term electricity demand. A stacked autoencoder is used in...

  15. A Neural Network Model to Learn Multiple Tasks under Dynamic Environments

    Science.gov (United States)

    Tsumori, Kenji; Ozawa, Seiichi

    When environments are dynamically changed for agents, the knowledge acquired in an environment might be useless in future. In such dynamic environments, agents should be able to not only acquire new knowledge but also modify old knowledge in learning. However, modifying all knowledge acquired before is not efficient because the knowledge once acquired may be useful again when similar environment reappears and some knowledge can be shared among different environments. To learn efficiently in such environments, we propose a neural network model that consists of the following modules: resource allocating network, long-term & short-term memory, and environment change detector. We evaluate the model under a class of dynamic environments where multiple function approximation tasks are sequentially given. The experimental results demonstrate that the proposed model possesses stable incremental learning, accurate environmental change detection, proper association and recall of old knowledge, and efficient knowledge transfer.

  16. Applications of Wireless Sensor Networks in Marine Environment Monitoring: A Survey

    Science.gov (United States)

    Xu, Guobao; Shen, Weiming; Wang, Xianbin

    2014-01-01

    With the rapid development of society and the economy, an increasing number of human activities have gradually destroyed the marine environment. Marine environment monitoring is a vital problem and has increasingly attracted a great deal of research and development attention. During the past decade, various marine environment monitoring systems have been developed. The traditional marine environment monitoring system using an oceanographic research vessel is expensive and time-consuming and has a low resolution both in time and space. Wireless Sensor Networks (WSNs) have recently been considered as potentially promising alternatives for monitoring marine environments since they have a number of advantages such as unmanned operation, easy deployment, real-time monitoring, and relatively low cost. This paper provides a comprehensive review of the state-of-the-art technologies in the field of marine environment monitoring using wireless sensor networks. It first describes application areas, a common architecture of WSN-based oceanographic monitoring systems, a general architecture of an oceanographic sensor node, sensing parameters and sensors, and wireless communication technologies. Then, it presents a detailed review of some related projects, systems, techniques, approaches and algorithms. It also discusses challenges and opportunities in the research, development, and deployment of wireless sensor networks for marine environment monitoring. PMID:25215942

  17. A pilot study into the perception of unreliability of travel times using in-depth interviews

    NARCIS (Netherlands)

    Tseng, Y.-Y.; Verhoef, E.; de Jong, G.; Kouwenhoven, M.; van der Hoorn, T.

    2009-01-01

    Transport investments normally reduce travel times, but may also reduce unreliability. Conventional time gains can be evaluated in cost benefit analysis using standard values of time. For valuing reliability gains, however, no standard measures are readily available. The Dutch Ministry of Transport

  18. Gossip algorithms in quantum networks

    International Nuclear Information System (INIS)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up – in the best case exponentially – the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication. - Highlights: • We analyze the performance of gossip algorithms in quantum networks. • Local operations and classical communication (LOCC) can speed the performance up. • The speed-up is exponential in the best case; the number of LOCC is polynomial.

  19. Gossip algorithms in quantum networks

    Energy Technology Data Exchange (ETDEWEB)

    Siomau, Michael, E-mail: siomau@nld.ds.mpg.de [Physics Department, Jazan University, P.O. Box 114, 45142 Jazan (Saudi Arabia); Network Dynamics, Max Planck Institute for Dynamics and Self-Organization (MPIDS), 37077 Göttingen (Germany)

    2017-01-23

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up – in the best case exponentially – the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication. - Highlights: • We analyze the performance of gossip algorithms in quantum networks. • Local operations and classical communication (LOCC) can speed the performance up. • The speed-up is exponential in the best case; the number of LOCC is polynomial.

  20. Mobile Sensor Networks for Inspection Tasks in Harsh Industrial Environments

    NARCIS (Netherlands)

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network

  1. Evolution of regulatory networks towards adaptability and stability in a changing environment

    Science.gov (United States)

    Lee, Deok-Sun

    2014-11-01

    Diverse biological networks exhibit universal features distinguished from those of random networks, calling much attention to their origins and implications. Here we propose a minimal evolution model of Boolean regulatory networks, which evolve by selectively rewiring links towards enhancing adaptability to a changing environment and stability against dynamical perturbations. We find that sparse and heterogeneous connectivity patterns emerge, which show qualitative agreement with real transcriptional regulatory networks and metabolic networks. The characteristic scaling behavior of stability reflects the balance between robustness and flexibility. The scaling of fluctuation in the perturbation spread shows a dynamic crossover, which is analyzed by investigating separately the stochasticity of internal dynamics and the network structure differences depending on the evolution pathways. Our study delineates how the ambivalent pressure of evolution shapes biological networks, which can be helpful for studying general complex systems interacting with environments.

  2. Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

    Directory of Open Access Journals (Sweden)

    Dongkyun Kim

    2017-12-01

    Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.

  3. Conducting network penetration and espionage in a global environment

    CERN Document Server

    Middleton, Bruce

    2014-01-01

    When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wi

  4. Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks

    Science.gov (United States)

    Pyle, Ryan; Rosenbaum, Robert

    2017-01-01

    Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.

  5. Spatiotemporal Dynamics and Reliable Computations in Recurrent Spiking Neural Networks.

    Science.gov (United States)

    Pyle, Ryan; Rosenbaum, Robert

    2017-01-06

    Randomly connected networks of excitatory and inhibitory spiking neurons provide a parsimonious model of neural variability, but are notoriously unreliable for performing computations. We show that this difficulty is overcome by incorporating the well-documented dependence of connection probability on distance. Spatially extended spiking networks exhibit symmetry-breaking bifurcations and generate spatiotemporal patterns that can be trained to perform dynamical computations under a reservoir computing framework.

  6. Probabilistic Mobility Models for Mobile and Wireless Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2010-01-01

    In this paper we present a probabilistic broadcast calculus for mobile and wireless networks whose connections are unreliable. In our calculus broadcasted messages can be lost with a certain probability, and due to mobility the connection probabilities may change. If a network broadcasts a message...... from a location it will evolve to a network distribution depending on whether nodes at other locations receive the message or not. Mobility of locations is not arbitrary but guarded by a probabilistic mobility function (PMF) and we also define the notion of a weak bisimulation given a PMF...

  7. Test-retest reliability and predictors of unreliable reporting for a sexual behavior questionnaire for U.S. men.

    Science.gov (United States)

    Nyitray, Alan G; Harris, Robin B; Abalos, Andrew T; Nielson, Carrie M; Papenfuss, Mary; Giuliano, Anna R

    2010-12-01

    Accurate knowledge about human sexual behaviors is important for increasing our understanding of human sexuality; however, there have been few studies assessing the reliability of sexual behavior questionnaires designed for community samples of adult men. A test-retest reliability study was conducted on a questionnaire completed by 334 men who had been recruited in Tucson, Arizona. Reliability coefficients and refusal rates were calculated for 39 non-sexual and sexual behavior questionnaire items. Predictors of unreliable reporting for lifetime number of female sexual partners were also assessed. Refusal rates were generally low, with slightly higher refusal rates for questions related to immigration, income, the frequency of sexual intercourse with women, lifetime number of female sexual partners, and the lifetime number of male anal sex partners. Kappa and intraclass correlation coefficients were substantial or almost perfect for all non-sexual and sexual behavior items. Reliability dropped somewhat, but was still substantial, for items that asked about household income and the men's knowledge of their sexual partners' health, including abnormal Pap tests and prior sexually transmitted diseases (STD). Age and lifetime number of female sexual partners were independent predictors of unreliable reporting while years of education was inversely associated with unreliable reporting. These findings among a community sample of adult men are consistent with other test-retest reliability studies with populations of women and adolescents.

  8. Liner Shipping Hub Network Design in a Competitive Environment

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan; Pisinger, David

    A new mixed integer programming formulation is proposed for hub-and-spoke network design in a competitive environment. It addresses competition between a newcomer liner service provider and an alliance, both operating on hub-and-spoke networks. The newcomer company maximizes its market share...... — proportional to service time and transportation cost —by locating a predefined number of hubs at candidate ports and designing its network. While general-purpose solvers do not solve instances of even small size, an accelerated lagrangian method coupled with a primal heuristic obtains very good bounds. Our...

  9. The challenge of social networking in the field of environment and health.

    Science.gov (United States)

    van den Hazel, Peter; Keune, Hans; Randall, Scott; Yang, Aileen; Ludlow, David; Bartonova, Alena

    2012-06-28

    The fields of environment and health are both interdisciplinary and trans-disciplinary, and until recently had little engagement in social networking designed to cross disciplinary boundaries. The EU FP6 project HENVINET aimed to establish integrated social network and networking facilities for multiple stakeholders in environment and health. The underlying assumption is that increased social networking across disciplines and sectors will enhance the quality of both problem knowledge and problem solving, by facilitating interactions. Inter- and trans-disciplinary networks are considered useful for this purpose. This does not mean that such networks are easily organized, as openness to such cooperation and exchange is often difficult to ascertain. Different methods may enhance network building. Using a mixed method approach, a diversity of actions were used in order to investigate the main research question: which kind of social networking activities and structures can best support the objective of enhanced inter- and trans-disciplinary cooperation and exchange in the fields of environment and health. HENVINET applied interviews, a role playing session, a personal response system, a stakeholder workshop and a social networking portal as part of the process of building an interdisciplinary and trans-disciplinary network. The interviews provided support for the specification of requirements for an interdisciplinary and trans-disciplinary network. The role playing session, the personal response system and the stakeholder workshop were assessed as useful tools in forming such network, by increasing the awareness by different disciplines of other's positions. The social networking portal was particularly useful in delivering knowledge, but the role of the scientist in social networking is not yet clear. The main challenge in the field of environment and health is not so much a lack of scientific problem knowledge, but rather the ability to effectively communicate, share

  10. Decentralized Fault Management for Service Dependability in Ubiquitous Networks

    DEFF Research Database (Denmark)

    Grønbæk, Lars Jesper

    2010-01-01

    ) unobservable and incomplete network state information, ii) unreliable observations, and iii) dynamic environments calling for adaptation in the fault management process. In the study, focus is on potential gains in the interaction between the components of Observation, Diagnosis, Decision and Remediation...... insights on the impact of unavoidable diagnosis imperfections on service reliability. Also, it is studied to what extent good remediation decisions may be applied to mitigate such imperfections. For this purpose a light-weight decision policy evaluation model is proposed and verified in a system level...... simulation model. Some of the main findings are: i) certain imperfection trade-off settings of the Diagnosis component lead to worse end-user service reliability than if no fault management is conducted, ii) using end-user service state information in the decision process can help improve service reliability...

  11. MAPPING GNSS RESTRICTED ENVIRONMENTS WITH A DRONE TANDEM AND INDIRECT POSITION CONTROL

    Directory of Open Access Journals (Sweden)

    E. Cledat

    2017-08-01

    Full Text Available The problem of autonomously mapping highly cluttered environments, such as urban and natural canyons, is intractable with the current UAV technology. The reason lies in the absence or unreliability of GNSS signals due to partial sky occlusion or multi-path effects. High quality carrier-phase observations are also required in efficient mapping paradigms, such as Assisted Aerial Triangulation, to achieve high ground accuracy without the need of dense networks of ground control points. In this work we consider a drone tandem in which the first drone flies outside the canyon, where GNSS constellation is ideal, visually tracks the second drone and provides an indirect position control for it. This enables both autonomous guidance and accurate mapping of GNSS restricted environments without the need of ground control points. We address the technical feasibility of this concept considering preliminary real-world experiments in comparable conditions and we perform a mapping accuracy prediction based on a simulation scenario.

  12. Uranium mining and metallurgy library information service under the network environment

    International Nuclear Information System (INIS)

    Tang Lilei

    2012-01-01

    This paper analyzes the effect of the network environment on the uranium mining and metallurgy of the information service. Introduces some measures such as strengthening professional characteristic literature resources construction, changing the service mode, building up information navigation, deepening service, meet the individual needs of users, raising librarian's quality, promoting the co-construction and sharing of library information resources, and puts forward the development idea of uranium mining and metallurgy library information service under the network environment. (author)

  13. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  14. The Impacts of Network Centrality and Self-Regulation on an E-Learning Environment with the Support of Social Network Awareness

    Science.gov (United States)

    Lin, Jian-Wei; Huang, Hsieh-Hong; Chuang, Yuh-Shy

    2015-01-01

    An e-learning environment that supports social network awareness (SNA) is a highly effective means of increasing peer interaction and assisting student learning by raising awareness of social and learning contexts of peers. Network centrality profoundly impacts student learning in an SNA-related e-learning environment. Additionally,…

  15. Dynamic Optical Networks for Future Internet Environments

    Science.gov (United States)

    Matera, Francesco

    2014-05-01

    This article reports an overview on the evolution of the optical network scenario taking into account the exponential growth of connected devices, big data, and cloud computing that is driving a concrete transformation impacting the information and communication technology world. This hyper-connected scenario is deeply affecting relationships between individuals, enterprises, citizens, and public administrations, fostering innovative use cases in practically any environment and market, and introducing new opportunities and new challenges. The successful realization of this hyper-connected scenario depends on different elements of the ecosystem. In particular, it builds on connectivity and functionalities allowed by converged next-generation networks and their capacity to support and integrate with the Internet of Things, machine-to-machine, and cloud computing. This article aims at providing some hints of this scenario to contribute to analyze impacts on optical system and network issues and requirements. In particular, the role of the software-defined network is investigated by taking into account all scenarios regarding data centers, cloud computing, and machine-to-machine and trying to illustrate all the advantages that could be introduced by advanced optical communications.

  16. Relative Panoramic Camera Position Estimation for Image-Based Virtual Reality Networks in Indoor Environments

    Science.gov (United States)

    Nakagawa, M.; Akano, K.; Kobayashi, T.; Sekiguchi, Y.

    2017-09-01

    Image-based virtual reality (VR) is a virtual space generated with panoramic images projected onto a primitive model. In imagebased VR, realistic VR scenes can be generated with lower rendering cost, and network data can be described as relationships among VR scenes. The camera network data are generated manually or by an automated procedure using camera position and rotation data. When panoramic images are acquired in indoor environments, network data should be generated without Global Navigation Satellite Systems (GNSS) positioning data. Thus, we focused on image-based VR generation using a panoramic camera in indoor environments. We propose a methodology to automate network data generation using panoramic images for an image-based VR space. We verified and evaluated our methodology through five experiments in indoor environments, including a corridor, elevator hall, room, and stairs. We confirmed that our methodology can automatically reconstruct network data using panoramic images for image-based VR in indoor environments without GNSS position data.

  17. RELATIVE PANORAMIC CAMERA POSITION ESTIMATION FOR IMAGE-BASED VIRTUAL REALITY NETWORKS IN INDOOR ENVIRONMENTS

    Directory of Open Access Journals (Sweden)

    M. Nakagawa

    2017-09-01

    Full Text Available Image-based virtual reality (VR is a virtual space generated with panoramic images projected onto a primitive model. In imagebased VR, realistic VR scenes can be generated with lower rendering cost, and network data can be described as relationships among VR scenes. The camera network data are generated manually or by an automated procedure using camera position and rotation data. When panoramic images are acquired in indoor environments, network data should be generated without Global Navigation Satellite Systems (GNSS positioning data. Thus, we focused on image-based VR generation using a panoramic camera in indoor environments. We propose a methodology to automate network data generation using panoramic images for an image-based VR space. We verified and evaluated our methodology through five experiments in indoor environments, including a corridor, elevator hall, room, and stairs. We confirmed that our methodology can automatically reconstruct network data using panoramic images for image-based VR in indoor environments without GNSS position data.

  18. AGENT-BASED NEGOTIATION PLATFORM IN COLLABORATIVE NETWORKED ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Adina-Georgeta CREȚAN

    2014-05-01

    Full Text Available This paper proposes an agent-based platform to model and support parallel and concurrent negotiations among organizations acting in the same industrial market. The underlying complexity is to model the dynamic environment where multi-attribute and multi-participant negotiations are racing over a set of heterogeneous resources. The metaphor Interaction Abstract Machines (IAMs is used to model the parallelism and the non-deterministic aspects of the negotiation processes that occur in Collaborative Networked Environment.

  19. Efficient Routing in Wireless Sensor Networks with Multiple Sessions

    OpenAIRE

    Dianjie Lu; Guijuan Zhang; Ren Han; Xiangwei Zheng; Hong Liu

    2014-01-01

    Wireless Sensor Networks (WSNs) are subject to node failures because of limited energy and link unreliability which makes the design of routing protocols in such networks a challenging task. The multipath routing scheme is an optimal alternative to address this problem which splits the traffic across multiple paths instead of routing all the traffic along a single path. However, using more paths introduces more contentions which degrade energy efficiency. The problem becomes even more difficu...

  20. A High-Efficiency Uneven Cluster Deployment Algorithm Based on Network Layered for Event Coverage in UWSNs

    Directory of Open Access Journals (Sweden)

    Shanen Yu

    2016-12-01

    Full Text Available Most existing deployment algorithms for event coverage in underwater wireless sensor networks (UWSNs usually do not consider that network communication has non-uniform characteristics on three-dimensional underwater environments. Such deployment algorithms ignore that the nodes are distributed at different depths and have different probabilities for data acquisition, thereby leading to imbalances in the overall network energy consumption, decreasing the network performance, and resulting in poor and unreliable late network operation. Therefore, in this study, we proposed an uneven cluster deployment algorithm based network layered for event coverage. First, according to the energy consumption requirement of the communication load at different depths of the underwater network, we obtained the expected value of deployment nodes and the distribution density of each layer network after theoretical analysis and deduction. Afterward, the network is divided into multilayers based on uneven clusters, and the heterogeneous communication radius of nodes can improve the network connectivity rate. The recovery strategy is used to balance the energy consumption of nodes in the cluster and can efficiently reconstruct the network topology, which ensures that the network has a high network coverage and connectivity rate in a long period of data acquisition. Simulation results show that the proposed algorithm improves network reliability and prolongs network lifetime by significantly reducing the blind movement of overall network nodes while maintaining a high network coverage and connectivity rate.

  1. Behavior-based cleaning for unreliable RFID data sets.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  2. Lightweight context aware routing in wireless sensor networks for environments

    International Nuclear Information System (INIS)

    Aijaz, S.

    2015-01-01

    Design and implementation of a WSN (Wireless Sensor Network) that can efficiently work for a longer time period must include identification of the deployment environment context and to conform to the behavior of the sensor nodes. The context information when treated with evaluation factor becomes a process of context awareness and the evaluation factor is called the context attribute. In this paper, we consider the context factor of energy. The paper identifies analyses and evaluates efficiency of two when used in a context aware environment. Furthermore, the study also highlights the strengths and weaknesses of sensor SPIN (Sensor Protocol for Information via Negotiation) and LEACH (Low Energy Adaptive Clustering Hierarchy) protocols with respect to the support for WSN with heavy network traffic conditions. The performance has been evaluated in terms of energy efficiency, data packet transmission, network status, data management, reliability, etc. (author)

  3. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able...

  4. Weighted Complex Network Analysis of Pakistan Highways

    Directory of Open Access Journals (Sweden)

    Yasir Tariq Mohmand

    2013-01-01

    Full Text Available The structure and properties of public transportation networks have great implications in urban planning, public policies, and infectious disease control. This study contributes a weighted complex network analysis of travel routes on the national highway network of Pakistan. The network is responsible for handling 75 percent of the road traffic yet is largely inadequate, poor, and unreliable. The highway network displays small world properties and is assortative in nature. Based on the betweenness centrality of the nodes, the most important cities are identified as this could help in identifying the potential congestion points in the network. Keeping in view the strategic location of Pakistan, such a study is of practical importance and could provide opportunities for policy makers to improve the performance of the highway network.

  5. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  6. Random Linear Network Coding is Key to Data Survival in Highly Dynamic Distributed Storage

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Distributed storage solutions have become widespread due to their ability to store large amounts of data reliably across a network of unreliable nodes, by employing repair mechanisms to prevent data loss. Conventional systems rely on static designs with a central control entity to oversee...... and control the repair process. Given the large costs for maintaining and cooling large data centers, our work proposes and studies the feasibility of a fully decentralized systems that can store data even on unreliable and, sometimes, unavailable mobile devices. This imposes new challenges on the design...... as the number of available nodes varies greatly over time and keeping track of the system's state becomes unfeasible. As a consequence, conventional erasure correction approaches are ill-suited for maintaining data integrity. In this highly dynamic context, random linear network coding (RLNC) provides...

  7. Approximate anlysis of an unreliable $M/M/c$ retrial queue with phase merging algorithm.

    Directory of Open Access Journals (Sweden)

    faiza BELARBI

    2016-06-01

    Full Text Available In this paper, we investigate an approximate analysis of unreliable $M/M/c$ retrial queue with $c\\geq 3$ in which all servers are subject to breakdowns and repairs. Arriving customers that are unable to access a server due to congestion or failure can choose to enter a retrial orbit for an exponentially distributed amount of time and persistently attempt to gain access to a server, or abandon their request and depart the system. Once a customer is admitted to a service station, they remain there for a random duration until service is complete and then depart the system. However, if the server fails during service, i.e., an active breakdown, the customer may choose to abandon the system or proceed directly to the retrial orbit while the server begins repair immediately. In the unreliable model, there are no exact solutions when the number of servers exceeds one. Therefore, we seek to approximate the steady-state joint distribution of the number of customers in orbit and the status of the $c$ servers for the case of Markovian arrival and service times. Our approach to deriving the approximate steady-state probabilities employs a phase-merging algorithm.

  8. OPS: Opportunistic pipeline scheduling in long-strip wireless sensor networks with unreliable links

    NARCIS (Netherlands)

    Guo, Peng; Meratnia, Nirvana; Havinga, Paul J.M.; Jiang, He; Zhang, Kui

    2015-01-01

    Being deployed in narrow but long area, strip wireless sensor networks (SWSNs) have drawn much attention in applications such as coal mines, pipeline and structure monitoring. One of typical characteristics of SWSNs is the large hop counts, which leads to long end-to-end delivery delay in

  9. Networked Mobilities and Performative Urban Environments

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    , an increasing number of such mobile practices are mediated by technologies of tangible and less tangible sorts. Thus by focusing on the complex relationship between material and virtual technologies within the sphere of mobility it is shown that we need to move beyond dichotomies of; global or local, nomad...... or sedentary, digital or material. The paper investigates the meaning of mobility and the potential in mediation and technologies to enhance the experiences and interaction in relation to urban transit spaces. In understanding the importance of mediation, global-local interactions, networks....... By studying embedded technologies and ‘ambient environments' we increase our knowledge about the over layering of the material environment with digital technologies. The presences of GPS, mediated surfaces, mobile agents (robots), RFID and other technologies that all relate to contemporary mobility practices...

  10. Improving the Reliability of Network Metrics in Structural Brain Networks by Integrating Different Network Weighting Strategies into a Single Graph

    Directory of Open Access Journals (Sweden)

    Stavros I. Dimitriadis

    2017-12-01

    Full Text Available Structural brain networks estimated from diffusion MRI (dMRI via tractography have been widely studied in healthy controls and patients with neurological and psychiatric diseases. However, few studies have addressed the reliability of derived network metrics both node-specific and network-wide. Different network weighting strategies (NWS can be adopted to weight the strength of connection between two nodes yielding structural brain networks that are almost fully-weighted. Here, we scanned five healthy participants five times each, using a diffusion-weighted MRI protocol and computed edges between 90 regions of interest (ROI from the Automated Anatomical Labeling (AAL template. The edges were weighted according to nine different methods. We propose a linear combination of these nine NWS into a single graph using an appropriate diffusion distance metric. We refer to the resulting weighted graph as an Integrated Weighted Structural Brain Network (ISWBN. Additionally, we consider a topological filtering scheme that maximizes the information flow in the brain network under the constraint of the overall cost of the surviving connections. We compared each of the nine NWS and the ISWBN based on the improvement of: (a intra-class correlation coefficient (ICC of well-known network metrics, both node-wise and per network level; and (b the recognition accuracy of each subject compared to the remainder of the cohort, as an attempt to access the uniqueness of the structural brain network for each subject, after first applying our proposed topological filtering scheme. Based on a threshold where the network level ICC should be >0.90, our findings revealed that six out of nine NWS lead to unreliable results at the network level, while all nine NWS were unreliable at the node level. In comparison, our proposed ISWBN performed as well as the best performing individual NWS at the network level, and the ICC was higher compared to all individual NWS at the node

  11. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  12. Application of local area network technology in an engineering environment

    International Nuclear Information System (INIS)

    Powell, A.D.; Sokolowski, M.A.

    1990-01-01

    This paper reports on the application of local area network technology in an engineering environment. Mobil Research and Development Corporation Engineering, Dallas, texas has installed a local area network (LAN) linking over 85 microcomputers. This network, which has been in existence for more than three years, provides common access by all engineers to quality output devices such as laser printers and multi-color pen plotters; IBM mainframe connections; electronic mail and file transfer; and common engineering program. The network has been expanded via a wide area ethernet network to link the Dallas location with a functionally equivalent LAN of over 400 microcomputers in Princeton, N.J. Additionally, engineers on assignment at remote areas in Europe, U.S., Africa and project task forces have dial-in access to the network via telephone lines

  13. Superior short-term learning effect of visual and sensory organisation ability when sensory information is unreliable in adolescent rhythmic gymnasts.

    Science.gov (United States)

    Chen, Hui-Ya; Chang, Hsiao-Yun; Ju, Yan-Ying; Tsao, Hung-Ting

    2017-06-01

    Rhythmic gymnasts specialise in dynamic balance under sensory conditions of numerous somatosensory, visual, and vestibular stimulations. This study investigated whether adolescent rhythmic gymnasts are superior to peers in Sensory Organisation test (SOT) performance, which quantifies the ability to maintain standing balance in six sensory conditions, and explored whether they plateaued faster during familiarisation with the SOT. Three and six sessions of SOTs were administered to 15 female rhythmic gymnasts (15.0 ± 1.8 years) and matched peers (15.1 ± 2.1 years), respectively. The gymnasts were superior to their peers in terms of fitness measures, and their performance was better in the SOT equilibrium score when visual information was unreliable. The SOT learning effects were shown in more challenging sensory conditions between Sessions 1 and 2 and were equivalent in both groups; however, over time, the gymnasts gained marginally significant better visual ability and relied less on visual sense when unreliable. In conclusion, adolescent rhythmic gymnasts have generally the same sensory organisation ability and learning rates as their peers. However, when visual information is unreliable, they have superior sensory organisation ability and learn faster to rely less on visual sense.

  14. A Neural Network Approach to Fluid Quantity Measurement in Dynamic Environments

    CERN Document Server

    Terzic, Edin; Nagarajah, Romesh; Alamgir, Muhammad

    2012-01-01

    Sloshing causes liquid to fluctuate, making accurate level readings difficult to obtain in dynamic environments. The measurement system described uses a single-tube capacitive sensor to obtain an instantaneous level reading of the fluid surface, thereby accurately determining the fluid quantity in the presence of slosh. A neural network based classification technique has been applied to predict the actual quantity of the fluid contained in a tank under sloshing conditions.   In A neural network approach to fluid quantity measurement in dynamic environments, effects of temperature variations and contamination on the capacitive sensor are discussed, and the authors propose that these effects can also be eliminated with the proposed neural network based classification system. To examine the performance of the classification system, many field trials were carried out on a running vehicle at various tank volume levels that range from 5 L to 50 L. The effectiveness of signal enhancement on the neural network base...

  15. Social networks and online environments: when science and practice co-evolve

    OpenAIRE

    Rosen, Devan; Barnett, George A.; Kim, Jang Hyun

    2011-01-01

    The science of social network analysis has co-evolved with the development of online environments and computer-mediated communication. Unique and precise data available from computer and information systems have allowed network scientists to explore novel social phenomena and develop new methods. Additionally, advances in the structural analysis and visualization of computer-mediated social networks have informed developers and shaped the design of social media tools. This article reviews som...

  16. Real-time Railway Traffic Management : Dispatching in complex, large and busy railway networks

    NARCIS (Netherlands)

    Corman, F.

    2010-01-01

    Railway is an important and sustainable transportation mode, which despite good potentials results in a limited attractiveness, mostly due to the perceived consequences of unreliability. In fact, busy railway networks with frequent and heterogeneous services are highly sensitive to delay

  17. Merging social networking environments and formal learning environments to support and facilitate interprofessional instruction.

    Science.gov (United States)

    King, Sharla; Greidanus, Elaine; Carbonaro, Michael; Drummond, Jane; Patterson, Steven

    2009-04-28

    This study describes the redesign of an interprofessional team development course for health science students. A theoretical model is hypothesized as a framework for the redesign process, consisting of two themes: 1) the increasing trend among post-secondary students to participate in social networking (e.g., Facebook, Second Life) and 2) the need for healthcare educators to provide interprofessional training that results in effective communities of practice and better patient care. The redesign focused on increasing the relevance of the course through the integration of custom-designed technology to facilitate social networking during their interprofessional education. Results suggest that students in an educationally structured social networking environment can be guided to join learning communities quickly and access course materials. More research and implementation work is required to effectively develop interprofessional health sciences communities in a combined face-to-face and on-line social networking context.

  18. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  19. Lessons learned on solar powered wireless sensor network deployments in urban, desert environments

    KAUST Repository

    Dehwah, Ahmad H.

    2015-05-01

    The successful deployment of a large scale solar powered wireless sensor network in an urban, desert environment is a very complex task. Specific cities of such environments cause a variety of operational problems, ranging from hardware faults to operational challenges, for instance due to the high variability of solar energy availability. Even a seemingly functional sensor network created in the lab does not guarantee reliable long term operation, which is absolutely necessary given the cost and difficulty of accessing sensor nodes in urban environments. As part of a larger traffic flow wireless sensor network project, we conducted several deployments in the last two years to evaluate the long-term performance of solar-powered urban wireless sensor networks in a desert area. In this article, we share our experiences in all domains of sensor network operations, from the conception of hardware to post-deployment analysis, including operational constraints that directly impact the software that can be run. We illustrate these experiences using numerous experimental results, and present multiple unexpected operational problems as well as some possible solutions to address them. We also show that current technology is far from meeting all operational constraints for these demanding applications, in which sensor networks are to operate for years to become economically appealing.

  20. Genotype by environment interaction in sunflower (Helianthus annus L.) to optimize trial network efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Gonzalez-Barrios, P.; Castro, M.; Pérez, O.; Vilaró, D.; Gutiérrez, L.

    2017-07-01

    Modeling genotype by environment interaction (GEI) is one of the most challenging aspects of plant breeding programs. The use of efficient trial networks is an effective way to evaluate GEI to define selection strategies. Furthermore, the experimental design and the number of locations, replications, and years are crucial aspects of multi-environment trial (MET) network optimization. The objective of this study was to evaluate the efficiency and performance of a MET network of sunflower (Helianthus annuus L.). Specifically, we evaluated GEI in the network by delineating mega-environments, estimating genotypic stability and identifying relevant environmental covariates. Additionally, we optimized the network by comparing experimental design efficiencies. We used the National Evaluation Network of Sunflower Cultivars of Uruguay (NENSU) in a period of 20 years. MET plot yield and flowering time information was used to evaluate GEI. Additionally, meteorological information was studied for each sunflower physiological stage. An optimal network under these conditions should have three replications, two years of evaluation and at least three locations. The use of incomplete randomized block experimental design showed reasonable performance. Three mega-environments were defined, explained mainly by different management of sowing dates. Late sowings dates had the worst performance in grain yield and oil production, associated with higher temperatures before anthesis and fewer days allocated to grain filling. The optimization of MET networks through the analysis of the experimental design efficiency, the presence of GEI, and appropriate management strategies have a positive impact on the expression of yield potential and selection of superior cultivars.

  1. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  2. Use of multivariate statistics to identify unreliable data obtained using CASA.

    Science.gov (United States)

    Martínez, Luis Becerril; Crispín, Rubén Huerta; Mendoza, Maximino Méndez; Gallegos, Oswaldo Hernández; Martínez, Andrés Aragón

    2013-06-01

    In order to identify unreliable data in a dataset of motility parameters obtained from a pilot study acquired by a veterinarian with experience in boar semen handling, but without experience in the operation of a computer assisted sperm analysis (CASA) system, a multivariate graphical and statistical analysis was performed. Sixteen boar semen samples were aliquoted then incubated with varying concentrations of progesterone from 0 to 3.33 µg/ml and analyzed in a CASA system. After standardization of the data, Chernoff faces were pictured for each measurement, and a principal component analysis (PCA) was used to reduce the dimensionality and pre-process the data before hierarchical clustering. The first twelve individual measurements showed abnormal features when Chernoff faces were drawn. PCA revealed that principal components 1 and 2 explained 63.08% of the variance in the dataset. Values of principal components for each individual measurement of semen samples were mapped to identify differences among treatment or among boars. Twelve individual measurements presented low values of principal component 1. Confidence ellipses on the map of principal components showed no statistically significant effects for treatment or boar. Hierarchical clustering realized on two first principal components produced three clusters. Cluster 1 contained evaluations of the two first samples in each treatment, each one of a different boar. With the exception of one individual measurement, all other measurements in cluster 1 were the same as observed in abnormal Chernoff faces. Unreliable data in cluster 1 are probably related to the operator inexperience with a CASA system. These findings could be used to objectively evaluate the skill level of an operator of a CASA system. This may be particularly useful in the quality control of semen analysis using CASA systems.

  3. On Applications of Disruption Tolerant Networking to Optical Networking in Space

    Science.gov (United States)

    Hylton, Alan Guy; Raible, Daniel E.; Juergens, Jeffrey; Iannicca, Dennis

    2012-01-01

    The integration of optical communication links into space networks via Disruption Tolerant Networking (DTN) is a largely unexplored area of research. Building on successful foundational work accomplished at JPL, we discuss a multi-hop multi-path network featuring optical links. The experimental test bed is constructed at the NASA Glenn Research Center featuring multiple Ethernet-to-fiber converters coupled with free space optical (FSO) communication channels. The test bed architecture models communication paths from deployed Mars assets to the deep space network (DSN) and finally to the mission operations center (MOC). Reliable versus unreliable communication methods are investigated and discussed; including reliable transport protocols, custody transfer, and fragmentation. Potential commercial applications may include an optical communications infrastructure deployment to support developing nations and remote areas, which are unburdened with supporting an existing heritage means of telecommunications. Narrow laser beam widths and control of polarization states offer inherent physical layer security benefits with optical communications over RF solutions. This paper explores whether or not DTN is appropriate for space-based optical networks, optimal payload sizes, reliability, and a discussion on security.

  4. The Global Environment Radiation Monitoring Network (GERMON)

    International Nuclear Information System (INIS)

    Zakheim, B.J.; Goellner, D.A.

    1994-01-01

    Following the Chernobyl accident in 1986, a group of experts from the World Health Organization (WHO) and the United Nations Environment Program (UNEP) met in France to discuss and develop the basic principles of a global environmental radiation monitoring network (GERMON). The basic functions of this network were to provide regular reports on environmental radiation levels and to be in a position to provide reliable and accurate radiation measurements on a quick and accurate radiation measurements on a quick turnaround basis in the event of a major radiation release. By 1992, although 58 countries had indicated an interest in becoming a part of the GERMON system, only 16 were providing data on a regular basis. This paper traces the history of GERMON from its inception in 1987 through its activities during 1993-4. It details the objectives of the network, describes functions, lists its participants, and presents obstacles in the current network. The paper examines the data requirements for radiological emergency preparedness and offers suggestions for the current system. The paper also describes the growing need for such a network. To add a domestic perspective, the authors present a summary of the environmental monitoring information system that was used by the NRC in 1986 in its analyses of the Chernobyl incident. Then we will use this 1986 experience to propose a method for the use of GERMON should a similar occasion arise in the future

  5. On the Relevance of Using OpenWireless Sensor Networks in Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Antoine B. Bagula

    2009-06-01

    Full Text Available This paper revisits the problem of the readiness for field deployments of wireless- sensor networks by assessing the relevance of using Open Hardware and Software motes for environment monitoring. We propose a new prototype wireless sensor network that finetunes SquidBee motes to improve the life-time and sensing performance of an environment monitoring system that measures temperature, humidity and luminosity. Building upon two outdoor sensing scenarios, we evaluate the performance of the newly proposed energy-aware prototype solution in terms of link quality when expressed by the Received Signal Strength, Packet Loss and the battery lifetime. The experimental results reveal the relevance of using the Open Hardware and Software motes when setting up outdoor wireless sensor networks.

  6. When does unreliable grid supply become unacceptable policy? Costs of power supply and outages in rural India

    International Nuclear Information System (INIS)

    Harish, Santosh M.; Morgan, Granger M.; Subrahmanian, Eswaran

    2014-01-01

    Despite frequent blackouts and brownouts, extension of the central grid remains the Indian government's preferred strategy for the country's rural electrification policy. This study reports an assessment that compares grid extension with distributed generation (DG) alternatives, based on the subsidies they will necessitate, and costs of service interruptions that are appropriate in the rural Indian context. Using cross-sectional household expenditure data and region fixed-effects models, average household demand is estimated. The price elasticity of demand is found to be in the range of −0.3 to −0.4. Interruption costs are estimated based on the loss of consumer surplus due to reduced consumption of electric lighting energy that results from intermittent power supply. Different grid reliability scenarios are simulated. Despite the inclusion of interruption costs, standalone DG does not appear to be competitive with grid extension at distances of less than 17 km. However, backing up unreliable grid service with local DG plants is attractive when reliability is very poor, even in previously electrified villages. Introduction of energy efficient lighting changes these economics, and the threshold for acceptable grid unreliability significantly reduces. A variety of polices to promote accelerated deployment and the wider adoption of improved end-use efficiency, warrant serious consideration. - Highlights: • We question the reliance on conventional grid in rural electricity supply in India. • Alternatives compared through government subsidies and consumer interruption costs. • Interruption costs are estimated based on loss of consumer surplus due to outages. • Augmenting unreliable grid with local biomass or diesel based backups preferable. • With efficient lighting, standalone biomass plants are optimal at very low distances

  7. Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

    Directory of Open Access Journals (Sweden)

    Samia Aijaz

    2015-07-01

    Full Text Available Design and implementation of a WSN (Wireless Sensor Network that can efficiently work for a longer time period must include identification of the deployment environment context and to conform to the behavior of the sensor nodes. The context information when treated with evaluation factor becomes a process of context awareness and the evaluation factor is called the context attribute. In this paper, we consider the context factor of energy. The paper identifies analyses and evaluates efficiency of two when used in a context aware environment. Furthermore, the study also highlights the strengths and weaknesses of sensor SPIN (Sensor Protocol for Information via Negotiation and LEACH (Low Energy Adaptive Clustering Hierarchy protocols with respect to the support for WSN with heavy network traffic conditions. The performance has been evaluated in terms of energy efficiency, data packet transmission, network status, data management, reliability, etc.

  8. Effects Of Social Networking Sites (SNSs) On Hyper Media Computer Mediated Environments (HCMEs)

    OpenAIRE

    Yoon C. Cho

    2011-01-01

    Social Networking Sites (SNSs) are known as tools to interact and build relationships between users/customers in Hyper Media Computer Mediated Environments (HCMEs). This study explored how social networking sites play a significant role in communication between users. While numerous researchers examined the effectiveness of social networking websites, few studies investigated which factors affected customers attitudes and behavior toward social networking sites. In this paper, the authors inv...

  9. Construct mine environment monitoring system based on wireless mesh network

    Science.gov (United States)

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  10. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...... from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight...

  11. Implementation and validation of UPnP for embedded systems in a home networking environment

    NARCIS (Netherlands)

    Tran, T.M.; Feijs, L.M.G.; Lukkien, J.J.; Hamza, M.H.

    2002-01-01

    Devices in a home environment are often equipped with general purpose network connections. There is an increasingly strong requirement that these devices cooperate in an autonomous fashion by using the functionality they find on the network. In the context of home networking, several standard

  12. Adolescents' social environment and depression: social networks, extracurricular activity, and family relationship influences.

    Science.gov (United States)

    Mason, Michael J; Schmidt, Christopher; Abraham, Anisha; Walker, Leslie; Tercyak, Kenneth

    2009-12-01

    The present study examined components of adolescents' social environment (social network, extracurricular activities, and family relationships) in association with depression. A total of 332 adolescents presenting for a routine medical check-up were self-assessed for social network risk (i.e., smoking habits of best male and female friends), extracurricular activity level (i.e., participation in organized sports teams, clubs, etc.), family relationship quality (i.e., cohesion and conflict), and symptoms of depression (i.e., minimal, mild, moderate/severe). Results of a forward linear regression modeling indicate that social environment components were associated with a significant proportion of the variance in adolescent depression (Adjusted R (2) = .177, p social network (beta = .107, p depression symptoms. Conversely, adolescents who engaged in more extracurricular activities (beta = -.118, p depressive symptoms. These findings highlight the important role that the social environment plays in adolescent depression, as well as yields new insights into socially-based intervention targets that may ameliorate adolescent depression. These intervention targets may be gender-specific, include positive social network skills training, increase adolescents' engagement in organized activities, and attend to the quality of their family relationships.

  13. Research on Influence of Cloud Environment on Traditional Network Security

    Science.gov (United States)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  14. Ranking stability and super-stable nodes in complex networks.

    Science.gov (United States)

    Ghoshal, Gourab; Barabási, Albert-László

    2011-07-19

    Pagerank, a network-based diffusion algorithm, has emerged as the leading method to rank web content, ecological species and even scientists. Despite its wide use, it remains unknown how the structure of the network on which it operates affects its performance. Here we show that for random networks the ranking provided by pagerank is sensitive to perturbations in the network topology, making it unreliable for incomplete or noisy systems. In contrast, in scale-free networks we predict analytically the emergence of super-stable nodes whose ranking is exceptionally stable to perturbations. We calculate the dependence of the number of super-stable nodes on network characteristics and demonstrate their presence in real networks, in agreement with the analytical predictions. These results not only deepen our understanding of the interplay between network topology and dynamical processes but also have implications in all areas where ranking has a role, from science to marketing.

  15. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection......, and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto...

  16. An Error Control Scheme for Delay Constrained Data Communication in a Chain-Based Wireless Sensor Network

    NARCIS (Netherlands)

    Taghikhaki, Zahra; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    Delay sensitive applications of Wireless Sensor Networks (WSNs) demand timely data delivery for fast identification of out-of-ordinary situations and fast and reliable delivery of notification and warning messages. Due to unreliable nature of WSNs, achieving real-time guarantees and providing

  17. Lessons learned on solar powered wireless sensor network deployments in urban, desert environments

    KAUST Repository

    Dehwah, Ahmad H.; Mousa, Mustafa; Claudel, Christian G.

    2015-01-01

    The successful deployment of a large scale solar powered wireless sensor network in an urban, desert environment is a very complex task. Specific cities of such environments cause a variety of operational problems, ranging from hardware faults

  18. Communication and cooperation in networked environments: an experimental analysis.

    Science.gov (United States)

    Galimberti, C; Ignazi, S; Vercesi, P; Riva, G

    2001-02-01

    Interpersonal communication and cooperation do not happen exclusively face to face. In work contexts, as in private life, there are more and more situations of mediated communication and cooperation in which new online tools are used. However, understanding how to use the Internet to support collaborative interaction presents a substantial challenge for the designers and users of this emerging technology. First, collaborative Internet environments are designed to serve a purpose, so must be designed with intended users' tasks and goals explicitly considered. Second, in cooperative activities the key content of communication is the interpretation of the situations in which actors are involved. So, the most effective way of clarifying the meaning of messages is to connect them to a shared context of meaning. However, this is more difficult in the Internet than in other computer-based activities. This paper tries to understand the characteristics of cooperative activities in networked environments--shared 3D virtual worlds--through two different studies. The first used the analysis of conversations to explore the characteristics of the interaction during the cooperative task; the second analyzed whether and how the level of immersion in the networked environments influenced the performance and the interactional process. The results are analyzed to identify the psychosocial roots used to support cooperation in a digital interactive communication.

  19. Modification of GNPS environment radiation monitoring network system

    International Nuclear Information System (INIS)

    Jiang Lili; Cao Chunsheng

    1999-01-01

    GNPS Environment Radiation Continuous Monitoring System (KRS), the only real time on-line system of site radiation monitoring, was put into service in 1993 prior to the first loading the the plant. It is revealed through several years of operation that this system has some deficiencies such as inadequate real time monitoring means, no figure and diagram display function on the central computer, high failures, frequent failure warning signals, thus making the availability of the system at a low level. In recent years, with the rapid development of computer network technology and increasingly strict requirements on the NPP environment protection raised by the government and public, KRS modification had become necessary and urgent. In 1996, GNPS carried out modification work on the measuring geometry condition of γ radiation monitoring sub-station and lightening protection. To enhance the functions of real time monitoring and data auto-processing, further modification of the system was made in 1998, including the update of the software and hardware of KRS central processor, set-up of system computer local network and database. In this way, the system availability and monitoring quality are greatly improved and effective monitoring and analysis means are provided for gaseous release during normal operation and under accident condition

  20. Coal on the shovel. Choice for coal is choosing for expensive, scarce and unreliable

    International Nuclear Information System (INIS)

    2008-01-01

    Researchers of Peak oil warn about imminent worldwide coal shortages as of 2025. Countries that fully depend on coal import, such as the Netherlands, run great risks due to strongly rising prices and insecurity of supply. How large is the supply of extractable coal? How long will extraction and export continue undisturbed under increasing demand? What effect will this have on the coal price? The real data on supply, demand, price and export mainly tell a tale of unreliable reserves and high prices according to Greenpeace. [mk] [nl

  1. Field test of wireless sensor network in the nuclear environment

    International Nuclear Information System (INIS)

    Li, L.; Wang, Q.; Bari, A.; Deng, C.; Chen, D.; Jiang, J.; Alexander, Q.; Sur, B.

    2014-01-01

    Wireless sensor networks (WSNs) are appealing options for the health monitoring of nuclear power plants due to their low cost and flexibility. Before they can be used in highly regulated nuclear environments, their reliability in the nuclear environment and compatibility with existing devices have to be assessed. In situ electromagnetic interference tests, wireless signal propagation tests, and nuclear radiation hardness tests conducted on candidate WSN systems at AECL Chalk River Labs are presented. The results are favourable to WSN in nuclear applications. (author)

  2. Field test of wireless sensor network in the nuclear environment

    Energy Technology Data Exchange (ETDEWEB)

    Li, L., E-mail: lil@aecl.ca [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada); Wang, Q.; Bari, A. [Univ. of Western Ontario, London, Ontario (Canada); Deng, C.; Chen, D. [Univ. of Electronic Science and Technology of China, Chengdu, Sichuan (China); Jiang, J. [Univ. of Western Ontario, London, Ontario (Canada); Alexander, Q.; Sur, B. [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada)

    2014-06-15

    Wireless sensor networks (WSNs) are appealing options for the health monitoring of nuclear power plants due to their low cost and flexibility. Before they can be used in highly regulated nuclear environments, their reliability in the nuclear environment and compatibility with existing devices have to be assessed. In situ electromagnetic interference tests, wireless signal propagation tests, and nuclear radiation hardness tests conducted on candidate WSN systems at AECL Chalk River Labs are presented. The results are favourable to WSN in nuclear applications. (author)

  3. Pipeline network and environment

    International Nuclear Information System (INIS)

    Oliveira Nascimento, I.; Wagner, J.; Silveira, T.

    2012-01-01

    The Rio de Janeiro is one of 27 units of Brazil. It is located in the eastern portion of the Southeast and occupies an area of 43 696.054 km², being effectively the 3rd smallest state in Brazil. This state in recent years has suffered from erosion problems caused by the deployment of the network pipeline. The deployment pipeline is part of the activities related to the oil industry has caused a more intense conflict between the environment and economic activities, modifying the soil structure and distribution of surface and subsurface flows. This study aimed to analyze the erosion caused by the removal of soil for the deployment of pipeline transportation, with the consequences of the emergence of numerous gullies, landslides and silting of rivers. For the development of this study were performed bibliographic research, field work, mapping and digital preparation of the initial diagnosis of active processes and what the consequent environmental impacts. For these reasons, we conclude that the problems could be avoided or mitigated if there was a prior geological risk management. (author)

  4. New grid based test bed environment for carrying out ad-hoc networking experiments

    CSIR Research Space (South Africa)

    Johnson, D

    2006-09-01

    Full Text Available and the third is to do analysis on a real test bed network which has implemented the ad-hoc networking protocol. This paper concerns the third option. Most researchers who have done work on test bed environments have used either indoor Wifi inter-office links...

  5. Radiological assessment of the French environment in 2008. Synthesis of the IRSN's surveillance networks

    International Nuclear Information System (INIS)

    Chaptal-Gradoz, N.; Chevreuil, M.; D'amico, D.; Debayle, Ch.; Leprieur, F.; Manificat, G.; Peres, J.M.; Pierrard, O.; Tournieux, D.; Veran-Viguie, M.P.; Renaud, Ph.; Roussel-Debet, S.; Masson, O.; Pourcelot, L.; Fayolle, C.; Loyen, J.; Robe, M.Ch.; Picolo, J.L.; Gallerand, M.O.

    2009-01-01

    While providing many maps, graphs and tables, this report presents and comments the very large amount of data acquired in 2008 within the frame of the control by the IRSN of radioactivity levels on the French national territory by means of its different surveillance networks. After a presentation of these networks (objectives, organization, sample collection, analysis, and preparation methodologies) and of the different radionuclides present in the French environment, results are presented by installation type (electricity production nuclear centres, nuclear fuel reprocessing centres, nuclear medicine centres, nuclear waste storage centres, research centres, nuclear naval bases, etc.) and environment component (air, water ways, rain waters, continental or coastal environment, biological media, etc.)

  6. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  7. The Effect of Social Interaction on Learning Engagement in a Social Networking Environment

    Science.gov (United States)

    Lu, Jie; Churchill, Daniel

    2014-01-01

    This study investigated the impact of social interactions among a class of undergraduate students on their learning engagement in a social networking environment. Thirteen undergraduate students enrolled in a course in a university in Hong Kong used an Elgg-based social networking platform throughout a semester to develop their digital portfolios…

  8. Experience with PACS in an ATM/Ethernet switched network environment.

    Science.gov (United States)

    Pelikan, E; Ganser, A; Kotter, E; Schrader, U; Timmermann, U

    1998-03-01

    Legacy local area network (LAN) technologies based on shared media concepts are not adequate for the growth of a large-scale picture archiving and communication system (PACS) in a client-server architecture. First, an asymmetric network load, due to the requests of a large number of PACS clients for only a few main servers, should be compensated by communication links to the servers with a higher bandwidth compared to the clients. Secondly, as the number of PACS nodes increases, the network throughout should not measurably cut production. These requirements can easily be fulfilled using switching technologies. Here asynchronous transfer mode (ATM) is clearly one of the hottest topics in networking because the ATM architecture provides integrated support for a variety of communication services, and it supports virtual networking. On the other hand, most of the imaging modalities are not yet ready for integration into a native ATM network. For a lot of nodes already joining an Ethernet, a cost-effective and pragmatic way to benefit from the switching concept would be a combined ATM/Ethernet switching environment. This incorporates an incremental migration strategy with the immediate benefits of high-speed, high-capacity ATM (for servers and high-sophisticated display workstations), while preserving elements of the existing network technologies. In addition, Ethernet switching instead of shared media Ethernet improves the performance considerably. The LAN emulation (LANE) specification by the ATM forum defines mechanisms that allow ATM networks to coexist with legacy systems using any data networking protocol. This paper points out the suitability of this network architecture in accordance with an appropriate system design.

  9. Partially blind instantly decodable network codes for lossy feedback environment

    KAUST Repository

    Sorour, Sameh

    2014-09-01

    In this paper, we study the multicast completion and decoding delay minimization problems for instantly decodable network coding (IDNC) in the case of lossy feedback. When feedback loss events occur, the sender falls into uncertainties about packet reception at the different receivers, which forces it to perform partially blind selections of packet combinations in subsequent transmissions. To determine efficient selection policies that reduce the completion and decoding delays of IDNC in such an environment, we first extend the perfect feedback formulation in our previous works to the lossy feedback environment, by incorporating the uncertainties resulting from unheard feedback events in these formulations. For the completion delay problem, we use this formulation to identify the maximum likelihood state of the network in events of unheard feedback and employ it to design a partially blind graph update extension to the multicast IDNC algorithm in our earlier work. For the decoding delay problem, we derive an expression for the expected decoding delay increment for any arbitrary transmission. This expression is then used to find the optimal policy that reduces the decoding delay in such lossy feedback environment. Results show that our proposed solutions both outperform previously proposed approaches and achieve tolerable degradation even at relatively high feedback loss rates.

  10. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  11. The impact of distraction in natural environments on user experience research

    DEFF Research Database (Denmark)

    Greifeneder, Elke

    2012-01-01

    Laboratories have long been seen as reasonable proxies for user experience research. Yet, this assumption may have become unreliable. The trend toward multiple activities in the users' natural environment, where people simultaneously use a digital library, join a chat or read an incoming Facebook....... The existence and impact of distraction is measured in a standard laboratory setting and in a remote setting that explicitly allows users to work in their own natural environment. The data indicates that there are significant differences between results from the laboratory and natural environment setting...

  12. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  13. How Urban Youth Perceive Relationships Among School Environments, Social Networks, Self-Concept, and Substance Use.

    Science.gov (United States)

    Dudovitz, Rebecca N; Perez-Aguilar, Giselle; Kim, Grace; Wong, Mitchell D; Chung, Paul J

    2017-03-01

    Studies suggest adolescent substance use aligns with academic and behavioral self-concept (whether teens think of themselves as good or bad students and as rule followers or rule breakers) as well as peer and adult social networks. Schools are an important context in which self-concept and social networks develop, but it remains unclear how school environments might be leveraged to promote healthy development and prevent substance use. We sought to describe how youth perceive the relationships among school environments, adolescent self-concept, social networks, and substance use. Semistructured interviews with 32 low-income minority youth (aged 17-22 years) who participated in a prior study, explored self-concept development, school environments, social networks, and substance use decisions. Recruitment was stratified by whether, during high school, they had healthy or unhealthy self-concept profiles and had engaged in or abstained from substance use. Youth described feeling labeled by peers and teachers and how these labels became incorporated into their self-concept. Teachers who made students feel noticed (eg, by learning students' names) and had high academic expectations reinforced healthy self-concepts. Academic tracking, extracurricular activities, and school norms determined potential friendship networks, grouping students either with well-behaving or misbehaving peers. Youth described peer groups, combined with their self-concept, shaping their substance use decisions. Affirming healthy aspects of their self-concept at key risk behavior decision points helped youth avoid substance use in the face of peer pressure. Youth narratives suggest school environments shape adolescent self-concept and adult and peer social networks, all of which impact substance use. Copyright © 2016 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  14. Multilevel QoS-policy-based routing management architecture appropriate for heterogeneous network environments

    Science.gov (United States)

    Chatzaki, Magda; Sartzetakis, Stelios

    1998-09-01

    As telecom providers introduce new and more sophisticated services the necessity of a global, unified view of the network infrastructure becomes demanding. Today, heterogenous backbone networks are interconnected in order to provide global connectivity. Due to technological impairments the cost of network operation, the maintenance complexity and the overuse of resources are extremely high under the goal of supporting the diverting customer requirements. We propose a scheme for ATM QoS support in such heterogenous, multi-domain, multi-technology network environment. The objective is to optimize users' and networks' profits by giving them the opportunity to satisfy their requirements. Our approach introduces a manager able to take routing decisions supporting quality of service guarantees for the customers, while making efficient use of network resources.

  15. Theoretical framework on selected core issues on conditions for productive learning in networked learning environments

    DEFF Research Database (Denmark)

    Dirckinck-Holmfeld, Lone; Svendsen, Brian Møller; Ponti, Marisa

    The report documents and summarises the elements and dimensions that have been identified to describe and analyse the case studies collected in the Kaleidoscope Jointly Executed Integrating Research Project (JEIRP) on Conditions for productive learning in network learning environments.......The report documents and summarises the elements and dimensions that have been identified to describe and analyse the case studies collected in the Kaleidoscope Jointly Executed Integrating Research Project (JEIRP) on Conditions for productive learning in network learning environments....

  16. Controlling networking multimedia appliances: with an open environment - a plan-based approach

    OpenAIRE

    Jantz, D.; Heider, T.

    2000-01-01

    The need for a better user assistance in technical environments led to the birth of a planning assistant. The principal problems in representing real world tasks in this environment of multimedia home devices are explained. A special issue is the developed EMBASSI Generic Architecture to integrate networked multimedia appliances. The planning assistant engages planning algorithms to fullfill user desires without handling traditional technical control interfaces.

  17. A QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments

    Science.gov (United States)

    Hong, Sung-Ryong; Na, Wonshik; Kang, Jang-Mook

    2010-01-01

    This study suggests an approach to effective transmission of multimedia content in a rapidly changing Internet environment including smart-phones. Guaranteeing QoS in networks is currently an important research topic. When transmitting Assured Forwarding (AF) packets in a Multi-DiffServ network environment, network A may assign priority in an order AF1, AF2, AF3 and AF4; on the other hand, network B may reverse the order to a priority AF4, AF3, AF2 and AF1. In this case, the AF1 packets that received the best quality of service in network A will receive the lowest in network B, which may result in dropping of packets in network B and vice versa. This study suggests a way to guarantee QoS between hosts by minimizing the loss of AF packet class when one network transmits AF class packets to another network with differing principles. It is expected that QoS guarantees and their experimental value may be utilized as principles which can be applied to various mobile-web environments based on smart-phones. PMID:22163453

  18. Social Networks as Learning Environments for Higher Education

    Directory of Open Access Journals (Sweden)

    J.A.Cortés

    2014-09-01

    Full Text Available Learning is considered as a social activity, a student does not learn only of the teacher and the textbook or only in the classroom, learn also from many other agents related to the media, peers and society in general. And since the explosion of the Internet, the information is within the reach of everyone, is there where the main area of opportunity in new technologies applied to education, as well as taking advantage of recent socialization trends that can be leveraged to improve not only informing of their daily practices, but rather as a tool that explore different branches of education research. One can foresee the future of higher education as a social learning environment, open and collaborative, where people construct knowledge in interaction with others, in a comprehensive manner. The mobility and ubiquity that provide mobile devices enable the connection from anywhere and at any time. In modern educational environments can be expected to facilitate mobile devices in the classroom expansion in digital environments, so that students and teachers can build the teaching-learning process collectively, this partial derivative results in the development of draft research approved by the CONADI in “Universidad Cooperativa de Colombia”, "Social Networks: A teaching strategy in learning environments in higher education."

  19. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-02-01

    The unprecedented rise of mobile user demand over the years have led to an enormous growth of the energy consumption of wireless networks as well as the greenhouse gas emissions which are estimated currently to be around 70 million tons per year. This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions to help reduce their expenses as well as the level of their CO2 emissions. Base stations are the most power greedy element in cellular networks: they drain around 80% of the total network energy consumption even during low traffic periods. Thus, there is a growing need to develop more energy-efficient techniques to enhance the green performance of future 4G/5G cellular networks. Due to the problem of traffic load fluctuations in cellular networks during different periods of the day and between different areas (shopping or business districts and residential areas), the base station sleeping strategy has been one of the main popular research topics in green communications. In this presentation, we present several practical green techniques that provide significant gains for mobile operators. Indeed, combined with the base station sleeping strategy, these techniques achieve not only a minimization of the fossil fuel consumption but also an enhancement of mobile operator profits. We start with an optimized cell planning method that considers varying spatial and temporal user densities. We then use the optimal transport theory in order to define the cell boundaries such that the network total transmit power is reduced. Afterwards, we exploit the features of the modern electrical grid, the smart grid, as a new tool of power management for cellular networks and we optimize the energy procurement from multiple energy retailers characterized by different prices and pollutant

  20. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  1. Emergence of microbial networks as response to hostile environments

    Directory of Open Access Journals (Sweden)

    Dario eMadeo

    2014-08-01

    Full Text Available The majority of microorganisms live in complex communities under varying conditions. One pivotal question in evolutionary biology is the emergence of cooperative traits and their sustainment in altered environments or in the presence of free-riders. Co-occurrence patterns in the spatial distribution of biofilms can help define species' identities, and systems biology tools are revealing networks of interacting microorganisms. However, networks of inter-dependencies involving micro-organisms in the planktonic phase may be just as important, with the added complexity that they are not bounded in space. An integrated approach linking imaging, ``Omics'' and modeling has the potential to enable new hypothesis and working models. In order to understand how cooperation can emerge and be maintained without abilities like memory or recognition we use evolutionary game theory as the natural framework to model cell-cell interactions arising from evolutive decisions. We consider a finite population distributed in a spatial domain (biofilm, and divided into two interacting classes with different traits. This interaction can be weighted by distance, and produces physical connections between two elements allowing them to exchange finite amounts of energy and matter. Available strategies to each individual of one class in the population are the propensities or ``willingness'' to connect any individual of the other class. Following evolutionary game theory, we propose a mathematical model which explains the patterns of connections which emerge when individuals are able to find connection strategies that asymptotically optimize their fitness. The process explains the formation of a network for efficiently exchanging energy and matter among individuals and thus ensuring their survival in hostile environments.

  2. Indoor location system based on discriminant-adaptive neural network in IEEE 802.11 environments.

    Science.gov (United States)

    Fang, Shih-Hau; Lin, Tsung-Nan

    2008-11-01

    This brief paper presents a novel localization algorithm, named discriminant-adaptive neural network (DANN), which takes the received signal strength (RSS) from the access points (APs) as inputs to infer the client position in the wireless local area network (LAN) environment. We extract the useful information into discriminative components (DCs) for network learning. The nonlinear relationship between RSS and the position is then accurately constructed by incrementally inserting the DCs and recursively updating the weightings in the network until no further improvement is required. Our localization system is developed in a real-world wireless LAN WLAN environment, where the realistic RSS measurement is collected. We implement the traditional approaches on the same test bed, including weighted kappa-nearest neighbor (WKNN), maximum likelihood (ML), and multilayer perceptron (MLP), and compare the results. The experimental results indicate that the proposed algorithm is much higher in accuracy compared with other examined techniques. The improvement can be attributed to that only the useful information is efficiently extracted for positioning while the redundant information is regarded as noise and discarded. Finally, the analysis shows that our network intelligently accomplishes learning while the inserted DCs provide sufficient information.

  3. Virtual Environments for Visualizing Structural Health Monitoring Sensor Networks, Data, and Metadata.

    Science.gov (United States)

    Napolitano, Rebecca; Blyth, Anna; Glisic, Branko

    2018-01-16

    Visualization of sensor networks, data, and metadata is becoming one of the most pivotal aspects of the structural health monitoring (SHM) process. Without the ability to communicate efficiently and effectively between disparate groups working on a project, an SHM system can be underused, misunderstood, or even abandoned. For this reason, this work seeks to evaluate visualization techniques in the field, identify flaws in current practices, and devise a new method for visualizing and accessing SHM data and metadata in 3D. More precisely, the work presented here reflects a method and digital workflow for integrating SHM sensor networks, data, and metadata into a virtual reality environment by combining spherical imaging and informational modeling. Both intuitive and interactive, this method fosters communication on a project enabling diverse practitioners of SHM to efficiently consult and use the sensor networks, data, and metadata. The method is presented through its implementation on a case study, Streicker Bridge at Princeton University campus. To illustrate the efficiency of the new method, the time and data file size were compared to other potential methods used for visualizing and accessing SHM sensor networks, data, and metadata in 3D. Additionally, feedback from civil engineering students familiar with SHM is used for validation. Recommendations on how different groups working together on an SHM project can create SHM virtual environment and convey data to proper audiences, are also included.

  4. Concept for trusted personal devices in a mobile and networked environment

    NARCIS (Netherlands)

    Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.

    2006-01-01

    In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential

  5. Co-creation and Co-innovation in a Collaborative Networked Environment

    Science.gov (United States)

    Klen, Edmilson Rampazzo

    Leveraged by the advances in communication and information Technologies, producers and consumers are developing a new behavior. Together with the new emerging collaborative manifestations this behavior may directly impact the way products are developed. This powerful combination indicates that consumers will be involved in a very early stage in product development processes supporting even more the creation and innovation of products. This new way of collaboration gives rise to a new collaborative networked environment based on co-creation and co-innovation. This work will present some evolutionary steps that point to the development of this environment where prosumer communities and virtual organizations interact and collaborate.

  6. Nearest neighbor imputation using spatial-temporal correlations in wireless sensor networks.

    Science.gov (United States)

    Li, YuanYuan; Parker, Lynne E

    2014-01-01

    Missing data is common in Wireless Sensor Networks (WSNs), especially with multi-hop communications. There are many reasons for this phenomenon, such as unstable wireless communications, synchronization issues, and unreliable sensors. Unfortunately, missing data creates a number of problems for WSNs. First, since most sensor nodes in the network are battery-powered, it is too expensive to have the nodes retransmit missing data across the network. Data re-transmission may also cause time delays when detecting abnormal changes in an environment. Furthermore, localized reasoning techniques on sensor nodes (such as machine learning algorithms to classify states of the environment) are generally not robust enough to handle missing data. Since sensor data collected by a WSN is generally correlated in time and space, we illustrate how replacing missing sensor values with spatially and temporally correlated sensor values can significantly improve the network's performance. However, our studies show that it is important to determine which nodes are spatially and temporally correlated with each other. Simple techniques based on Euclidean distance are not sufficient for complex environmental deployments. Thus, we have developed a novel Nearest Neighbor (NN) imputation method that estimates missing data in WSNs by learning spatial and temporal correlations between sensor nodes. To improve the search time, we utilize a k d-tree data structure, which is a non-parametric, data-driven binary search tree. Instead of using traditional mean and variance of each dimension for k d-tree construction, and Euclidean distance for k d-tree search, we use weighted variances and weighted Euclidean distances based on measured percentages of missing data. We have evaluated this approach through experiments on sensor data from a volcano dataset collected by a network of Crossbow motes, as well as experiments using sensor data from a highway traffic monitoring application. Our experimental

  7. An Integrated Design Environment to Evaluate Power/Performance Tradeoffs for Sensor Network Applications

    National Research Council Canada - National Science Library

    Bakshi, Amol

    2003-01-01

    Networks of inexpensive, low-power sensing nodes that can monitor the environment, perform limited processing on the samples, and detect events of interest in a collaborative fashion are fast becoming a reality...

  8. The Strategic Environment Assessment bibliographic network: A quantitative literature review analysis

    Energy Technology Data Exchange (ETDEWEB)

    Caschili, Simone, E-mail: s.caschili@ucl.ac.uk [UCL QASER Lab, University College London, Gower Street, London WC1E 6BT (United Kingdom); De Montis, Andrea; Ganciu, Amedeo; Ledda, Antonio; Barra, Mario [Dipartimento di Agraria, University of Sassari, viale Italia, 39, 07100 Sassari (Italy)

    2014-07-01

    Academic literature has been continuously growing at such a pace that it can be difficult to follow the progression of scientific achievements; hence, the need to dispose of quantitative knowledge support systems to analyze the literature of a subject. In this article we utilize network analysis tools to build a literature review of scientific documents published in the multidisciplinary field of Strategic Environment Assessment (SEA). The proposed approach helps researchers to build unbiased and comprehensive literature reviews. We collect information on 7662 SEA publications and build the SEA Bibliographic Network (SEABN) employing the basic idea that two publications are interconnected if one cites the other. We apply network analysis at macroscopic (network architecture), mesoscopic (sub graph) and microscopic levels (node) in order to i) verify what network structure characterizes the SEA literature, ii) identify the authors, disciplines and journals that are contributing to the international discussion on SEA, and iii) scrutinize the most cited and important publications in the field. Results show that the SEA is a multidisciplinary subject; the SEABN belongs to the class of real small world networks with a dominance of publications in Environmental studies over a total of 12 scientific sectors. Christopher Wood, Olivia Bina, Matthew Cashmore, and Andrew Jordan are found to be the leading authors while Environmental Impact Assessment Review is by far the scientific journal with the highest number of publications in SEA studies. - Highlights: • We utilize network analysis to analyze scientific documents in the SEA field. • We build the SEA Bibliographic Network (SEABN) of 7662 publications. • We apply network analysis at macroscopic, mesoscopic and microscopic network levels. • We identify SEABN architecture, relevant publications, authors, subjects and journals.

  9. The Strategic Environment Assessment bibliographic network: A quantitative literature review analysis

    International Nuclear Information System (INIS)

    Caschili, Simone; De Montis, Andrea; Ganciu, Amedeo; Ledda, Antonio; Barra, Mario

    2014-01-01

    Academic literature has been continuously growing at such a pace that it can be difficult to follow the progression of scientific achievements; hence, the need to dispose of quantitative knowledge support systems to analyze the literature of a subject. In this article we utilize network analysis tools to build a literature review of scientific documents published in the multidisciplinary field of Strategic Environment Assessment (SEA). The proposed approach helps researchers to build unbiased and comprehensive literature reviews. We collect information on 7662 SEA publications and build the SEA Bibliographic Network (SEABN) employing the basic idea that two publications are interconnected if one cites the other. We apply network analysis at macroscopic (network architecture), mesoscopic (sub graph) and microscopic levels (node) in order to i) verify what network structure characterizes the SEA literature, ii) identify the authors, disciplines and journals that are contributing to the international discussion on SEA, and iii) scrutinize the most cited and important publications in the field. Results show that the SEA is a multidisciplinary subject; the SEABN belongs to the class of real small world networks with a dominance of publications in Environmental studies over a total of 12 scientific sectors. Christopher Wood, Olivia Bina, Matthew Cashmore, and Andrew Jordan are found to be the leading authors while Environmental Impact Assessment Review is by far the scientific journal with the highest number of publications in SEA studies. - Highlights: • We utilize network analysis to analyze scientific documents in the SEA field. • We build the SEA Bibliographic Network (SEABN) of 7662 publications. • We apply network analysis at macroscopic, mesoscopic and microscopic network levels. • We identify SEABN architecture, relevant publications, authors, subjects and journals

  10. Integrating a social network group with a 3D collaborative learning environment

    NARCIS (Netherlands)

    Pourmirza, S.; Gardner, M.; Callaghan, V; Augusto, J.C.; Zhang, T.

    2014-01-01

    Although extensive research has been carried out on virtual learning environments and the role of groups and communities in social networks, few studies exist which adequately cover the relationship between these two domains. In this paper, the authors demonstrate the effectiveness of integrating

  11. Self-organized computation with unreliable, memristive nanodevices

    International Nuclear Information System (INIS)

    Snider, G S

    2007-01-01

    Nanodevices have terrible properties for building Boolean logic systems: high defect rates, high variability, high death rates, drift, and (for the most part) only two terminals. Economical assembly requires that they be dynamical. We argue that strategies aimed at mitigating these limitations, such as defect avoidance/reconfiguration, or applying coding theory to circuit design, present severe scalability and reliability challenges. We instead propose to mitigate device shortcomings and exploit their dynamical character by building self-organizing, self-healing networks that implement massively parallel computations. The key idea is to exploit memristive nanodevice behavior to cheaply implement adaptive, recurrent networks, useful for complex pattern recognition problems. Pulse-based communication allows the designer to make trade-offs between power consumption and processing speed. Self-organization sidesteps the scalability issues of characterization, compilation and configuration. Network dynamics supplies a graceful response to device death. We present simulation results of such a network-a self-organized spatial filter array-that demonstrate its performance as a function of defects and device variation

  12. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  13. Influence of university network structures on forming the network environment of regional economy (on the example of national research universities of Tatarstan Republic

    Directory of Open Access Journals (Sweden)

    Darya-Anna Alekseevna Kaibiyainen

    2015-03-01

    Full Text Available Objective to elaborate theoretical and applied aspects of the processes of forming the new network institutional environment of the Russian regional economy under the influence of the developing integral educational network structures basing on the study of the experience of national research universities of Tatarstan Republic Methods general scientific logical methods of analysis and synthesis induction and deduction scientific abstraction as well as the method of systemicfunctional analysis. Results the practical examples are revealed and analyzed of introducing the new network integral principles into the functioning of national research universities which have a real economic effect and influencing such indicators of regional economy as the growth of employment reduction of unemployment etc. Scientific novelty problems of network structures development in the Russian education have not been thoroughly studied yet. The article analyzes the experience reveals and describes the methods and techniques of forming the network educational structures in the functioning of national research universities in Tatarstan Republic Practical value the author shows the ability of network university structures not only to play a significant role forming the new institutional environment of the regional economy but also to influence the macro and microeconomic indicators of development of the region and the country. nbsp

  14. A Wearable Wireless Sensor Network for Indoor Smart Environment Monitoring in Safety Applications.

    Science.gov (United States)

    Antolín, Diego; Medrano, Nicolás; Calvo, Belén; Pérez, Francisco

    2017-02-14

    This paper presents the implementation of a wearable wireless sensor network aimed at monitoring harmful gases in industrial environments. The proposed solution is based on a customized wearable sensor node using a low-power low-rate wireless personal area network (LR-WPAN) communications protocol, which as a first approach measures CO₂ concentration, and employs different low power strategies for appropriate energy handling which is essential to achieving long battery life. These wearables nodes are connected to a deployed static network and a web-based application allows data storage, remote control and monitoring of the complete network. Therefore, a complete and versatile remote web application with a locally implemented decision-making system is accomplished, which allows early detection of hazardous situations for exposed workers.

  15. A Wearable Wireless Sensor Network for Indoor Smart Environment Monitoring in Safety Applications

    Directory of Open Access Journals (Sweden)

    Diego Antolín

    2017-02-01

    Full Text Available This paper presents the implementation of a wearable wireless sensor network aimed at monitoring harmful gases in industrial environments. The proposed solution is based on a customized wearable sensor node using a low-power low-rate wireless personal area network (LR-WPAN communications protocol, which as a first approach measures CO2 concentration, and employs different low power strategies for appropriate energy handling which is essential to achieving long battery life. These wearables nodes are connected to a deployed static network and a web-based application allows data storage, remote control and monitoring of the complete network. Therefore, a complete and versatile remote web application with a locally implemented decision-making system is accomplished, which allows early detection of hazardous situations for exposed workers.

  16. Analysis of radio wave propagation for ISM 2.4 GHz Wireless Sensor Networks in inhomogeneous vegetation environments.

    Science.gov (United States)

    Azpilicueta, Leire; López-Iturri, Peio; Aguirre, Erik; Mateo, Ignacio; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2014-12-10

    The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs) in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.

  17. Analysis of Radio Wave Propagation for ISM 2.4 GHz Wireless Sensor Networks in Inhomogeneous Vegetation Environments

    Directory of Open Access Journals (Sweden)

    Leire Azpilicueta

    2014-12-01

    Full Text Available The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.

  18. An Analysis of Density and Degree-Centrality According to the Social Networking Structure Formed in an Online Learning Environment

    Science.gov (United States)

    Ergün, Esin; Usluel, Yasemin Koçak

    2016-01-01

    In this study, we assessed the communication structure in an educational online learning environment using social network analysis (SNA). The communication structure was examined with respect to time, and instructor's participation. The course was implemented using ELGG, a network learning environment, blended with face-to-face sessions over a…

  19. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  20. Test and Evaluation of a Prototyped Sensor-Camera Network for Persistent Intelligence, Surveillance, and Reconnaissance in Support of Tactical Coalition Networking Environments

    Science.gov (United States)

    2006-06-01

    networks is home automation . Wireless sensor networks can be employed in a home environment similar to the ways they are deployed in environmental...and industrial settings. Home automation provides increased control of home appliances and security. Climate control and security systems are the...most common types of home automation applications. However, as technology 12 has increased, new applications are emerging. For example

  1. Three Dimensional Virtual Environments as a Tool for Development of Personal Learning Networks

    Directory of Open Access Journals (Sweden)

    Aggeliki Nikolaou

    2013-01-01

    Full Text Available Technological advances have altered how, where, when, and what information is created, presented and diffused in working and social environments as well as how learners interact with that information. Virtual worlds constitute an emerging realm for collaborative play, learning and work. This paper describes how virtual worlds provide a mechanism to facilitate the creation and development of Personal Learning Networks. This qualitative investigation focuses on the role of three-dimensional virtual environments (3DVEs in the creation and development of Personal Learning Networks (PLNs. More specifically, this work investigates the reasons that drive members of Education Orientated Groups (hereafter “Groups” in Second Life (SL, to adopt a technological innovation as a milieu of learning, the ways they use it and the types of learning that are occurring in it. The authors also discuss the collaborative and social characteristics of these environments which, provide access to excellence of a specific area of interest and promote innovative ideas on a global scale, through sharing educational resources and developing good educational practices without spatial and temporal constraints.

  2. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  3. RADYBAN: A tool for reliability analysis of dynamic fault trees through conversion into dynamic Bayesian networks

    International Nuclear Information System (INIS)

    Montani, S.; Portinale, L.; Bobbio, A.; Codetta-Raiteri, D.

    2008-01-01

    In this paper, we present RADYBAN (Reliability Analysis with DYnamic BAyesian Networks), a software tool which allows to analyze a dynamic fault tree relying on its conversion into a dynamic Bayesian network. The tool implements a modular algorithm for automatically translating a dynamic fault tree into the corresponding dynamic Bayesian network and exploits classical algorithms for the inference on dynamic Bayesian networks, in order to compute reliability measures. After having described the basic features of the tool, we show how it operates on a real world example and we compare the unreliability results it generates with those returned by other methodologies, in order to verify the correctness and the consistency of the results obtained

  4. On Network Coded Distributed Storage

    DEFF Research Database (Denmark)

    Cabrera Guerrero, Juan Alberto; Roetter, Daniel Enrique Lucani; Fitzek, Frank Hanns Paul

    2016-01-01

    systems typically rely on expensive infrastructure with centralized control to store, repair and access the data. This approach introduces a large delay for accessing and storing the data driven in part by a high RTT between users and the cloud. These characteristics are at odds with the massive increase......This paper focuses on distributed fog storage solutions, where a number of unreliable devices organize themselves in Peer-to-Peer (P2P) networks with the purpose to store reliably their data and that of other devices and/or local users and provide lower delay and higher throughput. Cloud storage...... of devices and generated data in coming years as well as the requirements of low latency in many applications. We focus on characterizing optimal solutions for maintaining data availability when nodes in the fog continuously leave the network. In contrast with state-of-the-art data repair formulations, which...

  5. Network and user interface for PAT DOME virtual motion environment system

    Science.gov (United States)

    Worthington, J. W.; Duncan, K. M.; Crosier, W. G.

    1993-01-01

    The Device for Orientation and Motion Environments Preflight Adaptation Trainer (DOME PAT) provides astronauts a virtual microgravity sensory environment designed to help alleviate tye symptoms of space motion sickness (SMS). The system consists of four microcomputers networked to provide real time control, and an image generator (IG) driving a wide angle video display inside a dome structure. The spherical display demands distortion correction. The system is currently being modified with a new graphical user interface (GUI) and a new Silicon Graphics IG. This paper will concentrate on the new GUI and the networking scheme. The new GUI eliminates proprietary graphics hardware and software, and instead makes use of standard and low cost PC video (CGA) and off the shelf software (Microsoft's Quick C). Mouse selection for user input is supported. The new Silicon Graphics IG requires an Ethernet interface. The microcomputer known as the Real Time Controller (RTC), which has overall control of the system and is written in Ada, was modified to use the free public domain NCSA Telnet software for Ethernet communications with the Silicon Graphics IG. The RTC also maintains the original ARCNET communications through Novell Netware IPX with the rest of the system. The Telnet TCP/IP protocol was first used for real-time communication, but because of buffering problems the Telnet datagram (UDP) protocol needed to be implemented. Since the Telnet modules are written in C, the Adap pragma 'Interface' was used to interface with the network calls.

  6. Traffic dynamics on coupled spatial networks

    International Nuclear Information System (INIS)

    Du, Wen-Bo; Zhou, Xing-Lian; Chen, Zhen; Cai, Kai-Quan; Cao, Xian-Bin

    2014-01-01

    With the rapid development of modern traffic, various means of transportation systems make it more convenient and diversified for passengers to travel out. In this paper, we establish a two-layered spatial network model where the low-speed lower layer is a regular lattice and the high-speed upper layer is a scale-free network embedded in the lattice. Passengers will travel along the path with the minimal travel time, and they can transfer from one layer to the other, which will induce extra transfer cost. We extensively investigate the traffic process on these coupled spatial networks and focus on the effect of the parameter α, the speed ratio between two networks. It is found that, as α grows, the network capacity of the coupled networks increases in the early stage and then decreases, indicating that cooperation between the coupled networks will induce the highest network capacity at an optimal α. We then provide an explanation for this non-monotonous dependence from a micro-scope point of view. The travel time reliability is also examined. Both in free-flow state and congestion state, the travel time is linearly related to the Euclidean distance. However, the variance of travel time in the congestion state is remarkably larger than that in the free-flow state, namely, people have to set aside more redundant time in an unreliable traffic system

  7. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment.

    Science.gov (United States)

    Lee, Wei-Po; Hsiao, Yu-Ting; Hwang, Wei-Che

    2014-01-16

    To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high

  8. Monitoring and classifying animal behavior using ZigBee-based mobile ad hoc wireless sensor networks and artificial neural networks

    DEFF Research Database (Denmark)

    S. Nadimi, Esmaeil; Nyholm Jørgensen, Rasmus; Blanes-Vidal, Victoria

    2012-01-01

    Animal welfare is an issue of great importance in modern food production systems. Because animal behavior provides reliable information about animal health and welfare, recent research has aimed at designing monitoring systems capable of measuring behavioral parameters and transforming them...... into their corresponding behavioral modes. However, network unreliability and high-energy consumption have limited the applicability of those systems. In this study, a 2.4-GHz ZigBee-based mobile ad hoc wireless sensor network (MANET) that is able to overcome those problems is presented. The designed MANET showed high...... communication reliability, low energy consumption and low packet loss rate (14.8%) due to the deployment of modern communication protocols (e.g. multi-hop communication and handshaking protocol). The measured behavioral parameters were transformed into the corresponding behavioral modes using a multilayer...

  9. Terrain Mapping and Classification in Outdoor Environments Using Neural Networks

    OpenAIRE

    Alberto Yukinobu Hata; Denis Fernando Wolf; Gustavo Pessin; Fernando Osório

    2009-01-01

    This paper describes a three-dimensional terrain mapping and classification technique to allow the operation of mobile robots in outdoor environments using laser range finders. We propose the use of a multi-layer perceptron neural network to classify the terrain into navigable, partially navigable, and non-navigable. The maps generated by our approach can be used for path planning, navigation, and local obstacle avoidance. Experimental tests using an outdoor robot and a laser sensor demonstra...

  10. DRDT: distributed and reliable data transmission with cooperative nodes for lossy wireless sensor networks.

    Science.gov (United States)

    Seo, Jaewan; Kim, Moonseong; Hur, In; Choi, Wook; Choo, Hyunseung

    2010-01-01

    Recent studies have shown that in realistic wireless sensor network environments links are extremely unreliable. To recover from corrupted packets, most routing schemes with an assumption of ideal radio environments use a retransmission mechanism, which may cause unnecessary retransmissions. Therefore, guaranteeing energy-efficient reliable data transmission is a fundamental routing issue in wireless sensor networks. However, it is not encouraged to propose a new reliable routing scheme in the sense that every existing routing scheme cannot be replaced with the new one. This paper proposes a Distributed and Reliable Data Transmission (DRDT) scheme with a goal to efficiently guarantee reliable data transmission. In particular, this is based on a pluggable modular approach so that it can be extended to existing routing schemes. DRDT offers reliable data transmission using neighbor nodes, i.e., helper nodes. A helper node is selected among the neighbor nodes of the receiver node which overhear the data packet in a distributed manner. DRDT effectively reduces the number of retransmissions by delegating the retransmission task from the sender node to the helper node that has higher link quality to the receiver node when the data packet reception fails due to the low link quality between the sender and the receiver nodes. Comprehensive simulation results show that DRDT improves end-to-end transmission cost by up to about 45% and reduces its delay by about 40% compared to existing schemes.

  11. DRDT: Distributed and Reliable Data Transmission with Cooperative Nodes for LossyWireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewan Seo

    2010-03-01

    Full Text Available Recent studies have shown that in realistic wireless sensor network environments links are extremely unreliable. To recover from corrupted packets, most routing schemes with an assumption of ideal radio environments use a retransmission mechanism, which may cause unnecessary retransmissions. Therefore, guaranteeing energy-efficient reliable data transmission is a fundamental routing issue in wireless sensor networks. However, it is not encouraged to propose a new reliable routing scheme in the sense that every existing routing scheme cannot be replaced with the new one. This paper proposes a Distributed and Reliable Data Transmission (DRDT scheme with a goal to efficiently guarantee reliable data transmission. In particular, this is based on a pluggable modular approach so that it can be extended to existing routing schemes. DRDT offers reliable data transmission using neighbor nodes, i.e., helper nodes. A helper node is selected among the neighbor nodes of the receiver node which overhear the data packet in a distributed manner. DRDT effectively reduces the number of retransmissions by delegating the retransmission task from the sender node to the helper node that has higher link quality to the receiver node when the data packet reception fails due to the low link quality between the sender and the receiver nodes. Comprehensive simulation results show that DRDT improves end-to-end transmission cost by up to about 45% and reduces its delay by about 40% compared to existing schemes.

  12. Renormalization group theory for percolation in time-varying networks.

    Science.gov (United States)

    Karschau, Jens; Zimmerling, Marco; Friedrich, Benjamin M

    2018-05-22

    Motivated by multi-hop communication in unreliable wireless networks, we present a percolation theory for time-varying networks. We develop a renormalization group theory for a prototypical network on a regular grid, where individual links switch stochastically between active and inactive states. The question whether a given source node can communicate with a destination node along paths of active links is equivalent to a percolation problem. Our theory maps the temporal existence of multi-hop paths on an effective two-state Markov process. We show analytically how this Markov process converges towards a memoryless Bernoulli process as the hop distance between source and destination node increases. Our work extends classical percolation theory to the dynamic case and elucidates temporal correlations of message losses. Quantification of temporal correlations has implications for the design of wireless communication and control protocols, e.g. in cyber-physical systems such as self-organized swarms of drones or smart traffic networks.

  13. A document preparation system in a large network environment

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, M.; Bouchier, S.; Sanders, C.; Sydoriak, S.; Wheeler, K.

    1988-01-01

    At Los Alamos National Laboratory, we have developed an integrated document preparation system that produces publication-quality documents. This system combines text formatters and computer graphics capabilities that have been adapted to meet the needs of users in a large scientific research laboratory. This paper describes the integration of document processing technology to develop a system architecture, based on a page description language, to provide network-wide capabilities in a distributed computing environment. We describe the Laboratory requirements, the integration and implementation issues, and the challenges we faced developing this system.

  14. Building Resilient Cloud Over Unreliable Commodity Infrastructure

    OpenAIRE

    Kedia, Piyus; Bansal, Sorav; Deshpande, Deepak; Iyer, Sreekanth

    2012-01-01

    Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage. Usually such infrastructure is dedicated, physically secured and has reliable power and networking infrastructure. However, much of our idle compute capacity is present in unmanaged infrastructure like idle desktops, lab machines, physically distant server machines, and lapto...

  15. Air-Sense: indoor environment monitoring evaluation system based on ZigBee network

    Science.gov (United States)

    Huang, Yang; Hu, Liang; Yang, Disheng; Liu, Hengchang

    2017-08-01

    In the modern life, people spend most of their time indoors. However, indoor environmental quality problems have always been affecting people’s social activities. In general, indoor environmental quality is also related to our indoor activities. Since most of the organic irritants and volatile gases are colorless, odorless and too tiny to be seen, because we have been unconsciously overlooked indoor environment quality. Consequently, our body suffer a great health problem. In this work, we propose Air-Sense system which utilizes the platform of ZigBee Network to collect and detect the real-time indoor environment quality. What’s more, Air-Sense system can also provide data analysis, and visualizing the results of the indoor environment to the user.

  16. Students' Personal Networks in Virtual and Personal Learning Environments: A Case Study in Higher Education Using Learning Analytics Approach

    Science.gov (United States)

    Casquero, Oskar; Ovelar, Ramón; Romo, Jesús; Benito, Manuel; Alberdi, Mikel

    2016-01-01

    The main objective of this paper is to analyse the effect of the affordances of a virtual learning environment and a personal learning environment (PLE) in the configuration of the students' personal networks in a higher education context. The results are discussed in light of the adaptation of the students to the learning network made up by two…

  17. Virtual Learning Environments as Sociomaterial Agents in the Network of Teaching Practice

    Science.gov (United States)

    Johannesen, Monica; Erstad, Ola; Habib, Laurence

    2012-01-01

    This article presents findings related to the sociomaterial agency of educators and their practice in Norwegian education. Using actor-network theory, we ask how Virtual Learning Environments (VLEs) negotiate the agency of educators and how they shape their teaching practice. Since the same kinds of VLE tools have been widely implemented…

  18. Chaos and reliability in balanced spiking networks with temporal drive.

    Science.gov (United States)

    Lajoie, Guillaume; Lin, Kevin K; Shea-Brown, Eric

    2013-05-01

    Biological information processing is often carried out by complex networks of interconnected dynamical units. A basic question about such networks is that of reliability: If the same signal is presented many times with the network in different initial states, will the system entrain to the signal in a repeatable way? Reliability is of particular interest in neuroscience, where large, complex networks of excitatory and inhibitory cells are ubiquitous. These networks are known to autonomously produce strongly chaotic dynamics-an obvious threat to reliability. Here, we show that such chaos persists in the presence of weak and strong stimuli, but that even in the presence of chaos, intermittent periods of highly reliable spiking often coexist with unreliable activity. We elucidate the local dynamical mechanisms involved in this intermittent reliability, and investigate the relationship between this phenomenon and certain time-dependent attractors arising from the dynamics. A conclusion is that chaotic dynamics do not have to be an obstacle to precise spike responses, a fact with implications for signal coding in large networks.

  19. Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems

    KAUST Repository

    Alsibyani, Hassan M.

    2018-05-15

    Cloud computing usage is increasing and a common concern is the privacy and security of the data and computation. Third party cloud environments are not considered fit for processing private information because the data will be revealed to the cloud provider. However, Trusted Execution Environments (TEEs), such as Intel SGX, provide a way for applications to run privately and securely on untrusted platforms. Nonetheless, using a TEE by itself for stream processing systems is not sufficient since network communication patterns may leak properties of the data under processing. This work addresses leaky topology structures and suggests mitigation techniques for each of these. We create specific metrics to evaluate leaks occurring from the network patterns; the metrics measure information leaked when the stream processing system is running. We consider routing techniques for inter-stage communication in a streaming application to mitigate this data leakage. We consider a dynamic policy to change the mitigation technique depending on how much information is currently leaking. Additionally, we consider techniques to hide irregularities resulting from a filtering stage in a topology. We also consider leakages resulting from applications containing cycles. For each of the techniques, we explore their effectiveness in terms of the advantage they provide in overcoming the network leakage. The techniques are tested partly using simulations and some were implemented in a prototype SGX-based stream processing system.

  20. A Novel Energy-Aware Distributed Clustering Algorithm for Heterogeneous Wireless Sensor Networks in the Mobile Environment.

    Science.gov (United States)

    Gao, Ying; Wkram, Chris Hadri; Duan, Jiajie; Chou, Jarong

    2015-12-10

    In order to prolong the network lifetime, energy-efficient protocols adapted to the features of wireless sensor networks should be used. This paper explores in depth the nature of heterogeneous wireless sensor networks, and finally proposes an algorithm to address the problem of finding an effective pathway for heterogeneous clustering energy. The proposed algorithm implements cluster head selection according to the degree of energy attenuation during the network's running and the degree of candidate nodes' effective coverage on the whole network, so as to obtain an even energy consumption over the whole network for the situation with high degree of coverage. Simulation results show that the proposed clustering protocol has better adaptability to heterogeneous environments than existing clustering algorithms in prolonging the network lifetime.

  1. Long-term performance of the SwissQuantum quantum key distribution network in a field environment

    International Nuclear Information System (INIS)

    Stucki, D; Gisin, N; Thew, R; Legré, M; Clausen, B; Monat, L; Page, J-B; Ribordy, G; Rochas, A; Robyr, S; Trinkler, P; Buntschu, F; Perroud, D; Felber, N; Henzen, L; Junod, P; Monbaron, P; Ventura, S; Litzistorf, G; Tavares, J

    2011-01-01

    In this paper, we report on the performance of the SwissQuantum quantum key distribution (QKD) network. The network was installed in the Geneva metropolitan area and ran for more than one-and-a-half years, from the end of March 2009 to the beginning of January 2011. The main goal of this experiment was to test the reliability of the quantum layer over a long period of time in a production environment. A key management layer has been developed to manage the key between the three nodes of the network. This QKD-secure network was utilized by end-users through an application layer. (paper)

  2. Design and Test of the Cross-Format Schema Protocol (XFSP) for Networked Virtual Environments

    National Research Council Canada - National Science Library

    Serin, Ekrem

    2003-01-01

    A Networked Virtual Environment (Net-VE) is a distributed software system in which multiple users interact with each other in real time even though these users may be located around the world Zyda 99...

  3. A source-initiated on-demand routing algorithm based on the Thorup-Zwick theory for mobile wireless sensor networks.

    Science.gov (United States)

    Mao, Yuxin; Zhu, Ping

    2013-01-01

    The unreliability and dynamics of mobile wireless sensor networks make it hard to perform end-to-end communications. This paper presents a novel source-initiated on-demand routing mechanism for efficient data transmission in mobile wireless sensor networks. It explores the Thorup-Zwick theory to achieve source-initiated on-demand routing with time efficiency. It is able to find out shortest routing path between source and target in a network and transfer data in linear time. The algorithm is easy to be implemented and performed in resource-constrained mobile wireless sensor networks. We also evaluate the approach by analyzing its cost in detail. It can be seen that the approach is efficient to support data transmission in mobile wireless sensor networks.

  4. Tweeting badges: user motivations for displaying achievement in publicly networked environments.

    Science.gov (United States)

    Kwon, K Hazel; Halavais, Alexander; Havener, Shannon

    2015-02-01

    Badge systems, a common mechanism for gamification on social media platforms, provide a way for users to present their knowledge or experience to others. This study aims to contribute to the understanding of why social media users publicize their achievements in the form of online badges. Five motivational factors for badge display in public networked environments are distinguished-self-efficacy, social incentives, networked support, passing time, and inattentive sharing-and it is suggested that different badge types are associated with different motivations. System developers are advised to consider these components in their designs, applying the elements most appropriate to the communities they serve. Comparing user motivations associated with badges shared across boundaries provides a better understanding of how online badges relate to the larger social media ecosystem.

  5. Supporting tactical intelligence using collaborative environments and social networking

    Science.gov (United States)

    Wollocko, Arthur B.; Farry, Michael P.; Stark, Robert F.

    2013-05-01

    Modern military environments place an increased emphasis on the collection and analysis of intelligence at the tactical level. The deployment of analytical tools at the tactical level helps support the Warfighter's need for rapid collection, analysis, and dissemination of intelligence. However, given the lack of experience and staffing at the tactical level, most of the available intelligence is not exploited. Tactical environments are staffed by a new generation of intelligence analysts who are well-versed in modern collaboration environments and social networking. An opportunity exists to enhance tactical intelligence analysis by exploiting these personnel strengths, but is dependent on appropriately designed information sharing technologies. Existing social information sharing technologies enable users to publish information quickly, but do not unite or organize information in a manner that effectively supports intelligence analysis. In this paper, we present an alternative approach to structuring and supporting tactical intelligence analysis that combines the benefits of existing concepts, and provide detail on a prototype system embodying that approach. Since this approach employs familiar collaboration support concepts from social media, it enables new-generation analysts to identify the decision-relevant data scattered among databases and the mental models of other personnel, increasing the timeliness of collaborative analysis. Also, the approach enables analysts to collaborate visually to associate heterogeneous and uncertain data within the intelligence analysis process, increasing the robustness of collaborative analyses. Utilizing this familiar dynamic collaboration environment, we hope to achieve a significant reduction of time and skill required to glean actionable intelligence in these challenging operational environments.

  6. GRAdient Cost Establishment (GRACE for an Energy-Aware Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Noor M. Khan

    2009-01-01

    Full Text Available In Wireless Sensor Network (WSN, the nodes have limitations in terms of energy-constraint, unreliable links, and frequent topology change. In this paper we propose an energy-aware routing protocol, that outperforms the existing ones with an enhanced network lifetime and more reliable data delivery. Major issues in the design of a routing strategy in wireless sensor networks are to make efficient use of energy and to increase reliability in data delivery. The proposed approach reduces both energy consumption and communication-bandwidth requirements and prolongs the lifetime of the wireless sensor network. Using both analysis and extensive simulations, we show that the proposed dynamic routing helps achieve the desired system performance under dynamically changing network conditions. The proposed algorithm is compared with one of the best existing routing algorithms, GRAB. Moreover, a modification in GRAB is proposed which not only improves its performance but also prolongs its lifetime.

  7. Motion planning for autonomous vehicle based on radial basis function neural network in unstructured environment.

    Science.gov (United States)

    Chen, Jiajia; Zhao, Pan; Liang, Huawei; Mei, Tao

    2014-09-18

    The autonomous vehicle is an automated system equipped with features like environment perception, decision-making, motion planning, and control and execution technology. Navigating in an unstructured and complex environment is a huge challenge for autonomous vehicles, due to the irregular shape of road, the requirement of real-time planning, and the nonholonomic constraints of vehicle. This paper presents a motion planning method, based on the Radial Basis Function (RBF) neural network, to guide the autonomous vehicle in unstructured environments. The proposed algorithm extracts the drivable region from the perception grid map based on the global path, which is available in the road network. The sample points are randomly selected in the drivable region, and a gradient descent method is used to train the RBF network. The parameters of the motion-planning algorithm are verified through the simulation and experiment. It is observed that the proposed approach produces a flexible, smooth, and safe path that can fit any road shape. The method is implemented on autonomous vehicle and verified against many outdoor scenes; furthermore, a comparison of proposed method with the existing well-known Rapidly-exploring Random Tree (RRT) method is presented. The experimental results show that the proposed method is highly effective in planning the vehicle path and offers better motion quality.

  8. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history...... of their development, how they are integrated into operational planning through strategies of deliberate targeting for modern operations. The paper will draw experience and case studies from Iraq, Syria, and Afghanistan and will offer some lessons learned as well as insight into the future of these methodologies....... Including their possible application on a national security level for managing longer strategic endeavors....

  9. Anatomy and histology as socially networked learning environments: some preliminary findings.

    Science.gov (United States)

    Hafferty, Frederic W; Castellani, Brian; Hafferty, Philip K; Pawlina, Wojciech

    2013-09-01

    An exploratory study to better understand the "networked" life of the medical school as a learning environment. In a recent academic year, the authors gathered data during two six-week blocks of a sequential histology and anatomy course at a U.S. medical college. An eight-item questionnaire captured different dimensions of student interactions. The student cohort/network was 48 first-year medical students. Using social network analysis (SNA), the authors focused on (1) the initial structure and the evolution of informal class networks over time, (2) how informal class networks compare to formal in-class small-group assignments in influencing student information gathering, and (3) how peer assignment of professionalism role model status is shaped more by informal than formal ties. In examining these latter two issues, the authors explored not only how formal group assignment persisted over time but also how it functioned to prevent the tendency for groupings based on gender or ethnicity. The study revealed an evolving dynamic between the formal small-group learning structure of the course blocks and the emergence of informal student networks. For example, whereas formal group membership did influence in-class questions and did prevent formation of groups of like gender and ethnicity, outside-class questions and professionalism were influenced more by informal group ties where gender and, to a much lesser extent, ethnicity influence student information gathering. The richness of these preliminary findings suggests that SNA may be a useful tool in examining an array of medical student learning encounters.

  10. Learning under uncertainty in smart home environments.

    Science.gov (United States)

    Zhang, Shuai; McClean, Sally; Scotney, Bryan; Nugent, Chris

    2008-01-01

    Technologies and services for the home environment can provide levels of independence for elderly people to support 'ageing in place'. Learning inhabitants' patterns of carrying out daily activities is a crucial component of these technological solutions with sensor technologies being at the core of such smart environments. Nevertheless, identifying high-level activities from low-level sensor events can be a challenge, as information may be unreliable resulting in incomplete data. Our work addresses the issues of learning in the presence of incomplete data along with the identification and the prediction of inhabitants and their activities under such uncertainty. We show via the evaluation results that our approach also offers the ability to assess the impact of various sensors in the activity recognition process. The benefit of this work is that future predictions can be utilised in a proposed intervention mechanism in a real smart home environment.

  11. Physical and hydrologic environments of the Mulberry coal reserves in eastern Kansas

    Science.gov (United States)

    Kenny, J.F.; Bevans, H.E.; Diaz, A.M.

    1982-01-01

    Strippable reserves of Mulberry coal underlie an area of approximately 300 square miles of Miami, Linn, and Bourbon Counties of eastern Kansas. Although subject to State reclamation law, current and projected strip mining of this relatively thin coal seam could alter and hydrologic environment of the study area. Drained by the Marais des Cygnes and Little Osage Rivers and their tributaries, this area is characterized by low relief and moderately impermeable soils. Streamflows are poorly sustained by ground-water discharge and fluctuate widely due to climatic extremes and usage of surface-water supplies. Because ground-water supplies are generally unreliable in quantity and quality, surface water is used to meet most water requirements in the study area. Primary used of surface waters are for domestic supplies, maintenance of wildlife and recreational areas, and cooling needs at LaCygne Power Plant. The prevailing chemical type of the natural streamflow is calcium bicarbonate, with concentrations of dissolved solids generally less than 500 milligrams per liter and pH near neutral. Additional streamflow and water-quality data are needed to evaluate the premining characteristics of and the anticipated changes in the hydrologic environment as strip mining proceeds within the study area. A network of data-collection stations and a sampling scheme have been established to acquire this additional information. (USGS)

  12. When are network coding based dynamic multi-homing techniques beneficial?

    DEFF Research Database (Denmark)

    Pereira, Carlos; Aguiar, Ana; Roetter, Daniel Enrique Lucani

    2016-01-01

    Mechanisms that can cope with unreliable wireless channels in an efficient manner are required due to the increasing number of resource constrained devices. Concurrent use of multiple communications technologies can be instrumental towards improving services to mobile devices in heterogeneous...... networks. In our previous work, we developed an optimization framework to generate channel-aware transmission policies for multi-homed devices under different cost criteria. Our formulation considers network coding as a key technique that simplifies load allocation across multiple channels and provides...... high resiliency under time-varying channel conditions. This paper seeks to explore the parameter space and identify the operating regions where dynamic coded policies offer most improvement over static ones in terms of energy consumption and channel utilization. We leverage meta-heuristics to find...

  13. Preventive maintenance and the interval availability distribution of an unreliable production system

    International Nuclear Information System (INIS)

    Dijkhuizen, G. van; Heijden, M. van der

    1999-01-01

    Traditionally, the optimal preventive maintenance interval for an unreliable production system has been determined by maximizing its limiting availability. Nowadays, it is widely recognized that this performance measure does not always provide relevant information for practical purposes. This is particularly true for order-driven manufacturing systems, in which due date performance has become a more important, and even a competitive factor. Under these circumstances, the so-called interval availability distribution is often seen as a more appropriate performance measure. Surprisingly enough, the relation between preventive maintenance and interval availability has received little attention in the existing literature. In this article, a series of mathematical models and optimization techniques is presented, with which the optimal preventive maintenance interval can be determined from an interval availability point of view, rather than from a limiting availability perspective. Computational results for a class of representative test problems indicate that significant improvements of up to 30% in the guaranteed interval availability can be obtained, by increasing preventive maintenance frequencies somewhere between 10 and 70%

  14. Representing the environment 3.0. Maps, models, networks.

    Directory of Open Access Journals (Sweden)

    Letizia Bollini

    2014-05-01

    Full Text Available Web 3.0 is changing the world we live and perceive the environment anthropomorphized, making a stratifation of levels of experience and mediated by the devices. If the urban landscape is designed, shaped and planned space, there is a social landscape that overwrite the territory of values, representations shared images, narratives of personal and collective history. Mobile technology introduces an additional parameter, a kind of non-place, which allows the coexistence of the here and elsewhere in an sort of digital landscape. The maps, mental models, the system of social networks become, then, the way to present, represented and represent themselves in a kind of ideal coring of the co-presence of levels of physical, cognitive and collective space.

  15. MDA-image: an environment of networked desktop computers for teleradiology/pathology.

    Science.gov (United States)

    Moffitt, M E; Richli, W R; Carrasco, C H; Wallace, S; Zimmerman, S O; Ayala, A G; Benjamin, R S; Chee, S; Wood, P; Daniels, P

    1991-04-01

    MDA-Image, a project of The University of Texas M. D. Anderson Cancer Center, is an environment of networked desktop computers for teleradiology/pathology. Radiographic film is digitized with a film scanner and histopathologic slides are digitized using a red, green, and blue (RGB) video camera connected to a microscope. Digitized images are stored on a data server connected to the institution's computer communication network (Ethernet) and can be displayed from authorized desktop computers connected to Ethernet. Images are digitized for cases presented at the Bone Tumor Management Conference, a multidisciplinary conference in which treatment options are discussed among clinicians, surgeons, radiologists, pathologists, radiotherapists, and medical oncologists. These radiographic and histologic images are shown on a large screen computer monitor during the conference. They are available for later review for follow-up or representation.

  16. Conservation of filtering in manufacturing systems with unreliable machines and finished goods buffers

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available This paper addresses the issue of reliable satisfaction of customer demand by unreliable production systems. In the framework of a simple production-storage-customer model, we show that this can be accomplished by using an appropriate level of filtering of production randomness. The filtering is ensured by finished goods buffers (filtering in space and shipping periods (filtering in time. The following question is considered: how are filtering in space and filtering in time interrelated? As an answer, we show that there exists a conservation law: in lean manufacturing systems, the amount of filtering in space multiplied by the amount of filteringin time (both measured in appropriate dimensionless units ispractically constant. Along with providing an insight into the nature of manufacturing systems, this law offers a tool for selecting the smallest, that is, lean, finished goods buffering, which is necessary and sufficient to ensure the desired level ofcustomer demand satisfaction.

  17. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  18. Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam-For

    2017-01-01

    compromised by insider attacks. In this paper, we adopt the existing CIDN framework and aim to apply a collaborative trust-based approach to reduce unwanted packets. More specifically, we develop a collaborative trust-based packet filter, which can be deployed in collaborative networks and be robust against...... typical insider attacks (e.g., betrayal attacks). Experimental results in various simulated and practical environments demonstrate that our filter can perform effectively in reducing unwanted traffic and can defend against insider attacks through identifying malicious nodes in a quick manner, as compared...

  19. Next-Generation Environment-Aware Cellular Networks: Modern Green Techniques and Implementation Challenges

    KAUST Repository

    Ghazzai, Hakim

    2016-09-16

    Over the last decade, mobile communications have been witnessing a noteworthy increase of data traffic demand that is causing an enormous energy consumption in cellular networks. The reduction of their fossil fuel consumption in addition to the huge energy bills paid by mobile operators is considered as the most important challenges for the next-generation cellular networks. Although most of the proposed studies were focusing on individual physical layer power optimizations, there is a growing necessity to meet the green objective of fifth-generation cellular networks while respecting the user\\'s quality of service. This paper investigates four important techniques that could be exploited separately or together in order to enable wireless operators achieve significant economic benefits and environmental savings: 1) the base station sleeping strategy; 2) the optimized energy procurement from the smart grid; 3) the base station energy sharing; and 4) the green networking collaboration between competitive mobile operators. The presented simulation results measure the gain that could be obtained using these techniques compared with that of traditional scenarios. Finally, this paper discusses the issues and challenges related to the implementations of these techniques in real environments. © 2016 IEEE.

  20. Unmanned Aerial Vehicle Based Wireless Sensor Network for Marine-Coastal Environment Monitoring.

    Science.gov (United States)

    Trasviña-Moreno, Carlos A; Blasco, Rubén; Marco, Álvaro; Casas, Roberto; Trasviña-Castro, Armando

    2017-02-24

    Marine environments are delicate ecosystems which directly influence local climates, flora, fauna, and human activities. Their monitorization plays a key role in their preservation, which is most commonly done through the use of environmental sensing buoy networks. These devices transmit data by means of satellite communications or close-range base stations, which present several limitations and elevated infrastructure costs. Unmanned Aerial Vehicles (UAV) are another alternative for remote environmental monitoring which provide new types of data and ease of use. These aircraft are mainly used in video capture related applications, in its various light spectrums, and do not provide the same data as sensing buoys, nor can they be used for such extended periods of time. The aim of this research is to provide a flexible, easy to deploy and cost-effective Wireless Sensor Network (WSN) for monitoring marine environments. This proposal uses a UAV as a mobile data collector, low-power long-range communications and sensing buoys as part of a single WSN. A complete description of the design, development, and implementation of the various parts of this system is presented, as well as its validation in a real-world scenario.

  1. Efficient computation in networks of spiking neurons: simulations and theory

    International Nuclear Information System (INIS)

    Natschlaeger, T.

    1999-01-01

    One of the most prominent features of biological neural systems is that individual neurons communicate via short electrical pulses, the so called action potentials or spikes. In this thesis we investigate possible mechanisms which can in principle explain how complex computations in spiking neural networks (SNN) can be performed very fast, i.e. within a few 10 milliseconds. Some of these models are based on the assumption that relevant information is encoded by the timing of individual spikes (temporal coding). We will also discuss a model which is based on a population code and still is able to perform fast complex computations. In their natural environment biological neural systems have to process signals with a rich temporal structure. Hence it is an interesting question how neural systems process time series. In this context we explore possible links between biophysical characteristics of single neurons (refractory behavior, connectivity, time course of postsynaptic potentials) and synapses (unreliability, dynamics) on the one hand and possible computations on times series on the other hand. Furthermore we describe a general model of computation that exploits dynamic synapses. This model provides a general framework for understanding how neural systems process time-varying signals. (author)

  2. Gaining insight into business networks : A simulation based support environment to improve process orchestration

    NARCIS (Netherlands)

    Tewoldeberhan, T.W.

    2005-01-01

    In today's world, organizations are becoming increasingly interested in using business networks as a means to adapt to the ever-changing environment to increase their performance level. As a result, the focus of efforts to improve the performance of organizations has shifted from organizational

  3. Adaptive management in agricultural innovation systems: The interactions between innovation networks and their environment

    NARCIS (Netherlands)

    Klerkx, L.W.A.; Aarts, M.N.C.; Leeuwis, C.

    2010-01-01

    The purpose of this article is to investigate effective reformism: strategies that innovation networks deploy to create changes in their environment in order to establish a more conducive context for the realization and durable embedding of their innovation projects. Using a case study approach,

  4. Cyber entertainment system using an immersive networked virtual environment

    Science.gov (United States)

    Ihara, Masayuki; Honda, Shinkuro; Kobayashi, Minoru; Ishibashi, Satoshi

    2002-05-01

    Authors are examining a cyber entertainment system that applies IPT (Immersive Projection Technology) displays to the entertainment field. This system enables users who are in remote locations to communicate with each other so that they feel as if they are together. Moreover, the system enables those users to experience a high degree of presence, this is due to provision of stereoscopic vision as well as a haptic interface and stereo sound. This paper introduces this system from the viewpoint of space sharing across the network and elucidates its operation using the theme of golf. The system is developed by integrating avatar control, an I/O device, communication links, virtual interaction, mixed reality, and physical simulations. Pairs of these environments are connected across the network. This allows the two players to experience competition. An avatar of each player is displayed by the other player's IPT display in the remote location and is driven by only two magnetic sensors. That is, in the proposed system, users don't need to wear any data suit with a lot of sensors and they are able to play golf without any encumbrance.

  5. Location capability of a sparse regional network (RSTN) using a multi-phase earthquake location algorithm (REGLOC)

    Energy Technology Data Exchange (ETDEWEB)

    Hutchings, L.

    1994-01-01

    The Regional Seismic Test Network (RSTN) was deployed by the US Department of Energy (DOE) to determine whether data recorded by a regional network could be used to detect and accurately locate seismic events that might be clandestine nuclear tests. The purpose of this paper is to evaluate the location capability of the RSTN. A major part of this project was the development of the location algorithm REGLOC and application of Basian a prior statistics for determining the accuracy of the location estimates. REGLOC utilizes all identifiable phases, including backazimuth, in the location. Ninty-four events, distributed throughout the network area, detected by both the RSTN and located by local networks were used in the study. The location capability of the RSTN was evaluated by estimating the location accuracy, error ellipse accuracy, and the percentage of events that could be located, as a function of magnitude. The location accuracy was verified by comparing the RSTN results for the 94 events with published locations based on data from the local networks. The error ellipse accuracy was evaluated by determining whether the error ellipse includes the actual location. The percentage of events located was assessed by combining detection capability with location capability to determine the percentage of events that could be located within the study area. Events were located with both an average crustal model for the entire region, and with regional velocity models along with station corrections obtained from master events. Most events with a magnitude <3.0 can only be located with arrivals from one station. Their average location errors are 453 and 414 km for the average- and regional-velocity model locations, respectively. Single station locations are very unreliable because they depend on accurate backazimuth estimates, and backazimuth proved to be a very unreliable computation.

  6. Evolutionary Design of Convolutional Neural Networks for Human Activity Recognition in Sensor-Rich Environments.

    Science.gov (United States)

    Baldominos, Alejandro; Saez, Yago; Isasi, Pedro

    2018-04-23

    Human activity recognition is a challenging problem for context-aware systems and applications. It is gaining interest due to the ubiquity of different sensor sources, wearable smart objects, ambient sensors, etc. This task is usually approached as a supervised machine learning problem, where a label is to be predicted given some input data, such as the signals retrieved from different sensors. For tackling the human activity recognition problem in sensor network environments, in this paper we propose the use of deep learning (convolutional neural networks) to perform activity recognition using the publicly available OPPORTUNITY dataset. Instead of manually choosing a suitable topology, we will let an evolutionary algorithm design the optimal topology in order to maximize the classification F1 score. After that, we will also explore the performance of committees of the models resulting from the evolutionary process. Results analysis indicates that the proposed model was able to perform activity recognition within a heterogeneous sensor network environment, achieving very high accuracies when tested with new sensor data. Based on all conducted experiments, the proposed neuroevolutionary system has proved to be able to systematically find a classification model which is capable of outperforming previous results reported in the state-of-the-art, showing that this approach is useful and improves upon previously manually-designed architectures.

  7. Sensor and Communication Network Technology for Harsh Environments in the Nuclear Power Plant

    International Nuclear Information System (INIS)

    Cho, Jai Wan; Choi, Young Soo; Lee, Jae Chul; Choi, Yu Rak; Jung, Gwang Il; Jung, Jong Eun; Park, Hee Yoon; Hong, Seok Bong; Koo, In Soo

    2008-02-01

    One of the challenges in harsh environments qualification and verification for emerging new I and C system of the nuclear power plant is to define the operational environment of these new emerging I and C sensor and communication network such that they are tested to the limits of a mission without requiring expensive over design. To aid this, this report defines, discusses and recommends environmental guideline and verification requirements for using state-of-the-art RPS sensors, fiber optic communication system, wireless communication and wireless smart sensors in nuclear harsh environments. This report focuses on advances in sensors (e.g., temperature, pressure, neutron and thermal power sensors) and their potential impact. Discussed are: radiation, thermal, electromagnetic, and electrical environment specifications. Presented are the typical performance data (survivability guidelines and experimental data), evaluation procedure and standard test method of communication devices, state-of-the-art RPS sensors, and communication systems

  8. Sensor and Communication Network Technology for Harsh Environments in the Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Jai Wan; Choi, Young Soo; Lee, Jae Chul; Choi, Yu Rak; Jung, Gwang Il; Jung, Jong Eun; Park, Hee Yoon; Hong, Seok Bong; Koo, In Soo

    2008-02-15

    One of the challenges in harsh environments qualification and verification for emerging new I and C system of the nuclear power plant is to define the operational environment of these new emerging I and C sensor and communication network such that they are tested to the limits of a mission without requiring expensive over design. To aid this, this report defines, discusses and recommends environmental guideline and verification requirements for using state-of-the-art RPS sensors, fiber optic communication system, wireless communication and wireless smart sensors in nuclear harsh environments. This report focuses on advances in sensors (e.g., temperature, pressure, neutron and thermal power sensors) and their potential impact. Discussed are: radiation, thermal, electromagnetic, and electrical environment specifications. Presented are the typical performance data (survivability guidelines and experimental data), evaluation procedure and standard test method of communication devices, state-of-the-art RPS sensors, and communication systems.

  9. Will Jakarta Be The Next Atlantis? Excessive Groundwater Use Resulting From A Failing Piped Water Network

    Directory of Open Access Journals (Sweden)

    Nicola Colbran

    2009-06-01

    Full Text Available This article examines the connection between a failing piped water network and excessive groundwater use in Jakarta. It discusses the political history of the city's piped water network, which was privatised in 1998, and how privatisation was intended to increase access to clean, safe water for its residents. The article asserts that this has not eventuated, and that tap water remains costly, unreliable and does not provide noticeable benefits when compared with groundwater. The result is that households, industry, businesses, luxury apartment complexes and hotels choose alternative water sources and distribution methods, in particular groundwater. This is having an unsustainable impact on groundwater levels and Jakarta 's natural environment, causing significant land subsidence, pollution and salinisation of aquifers, and increased levels of flooding. The effect is so severe that the World Bank has predicted much of Jakarta will be inundated by seawater in 2025, rendering one third of the city uninhabitable and displacing millions. The article concludes by discussing and assessing the steps the government has taken to address excessive and unlicensed groundwater use. These steps include new regulations on groundwater, a public awareness campaign on the importance of groundwater and a commitment to improve the raw water supplied to the piped water network. However, the article observes that the government is yet to develop long term policies for improvement of the network itself. The question therefore remains, has the government done enough, or will groundwater use continue unabated making Jakarta the next lost city of Atlantis?

  10. Wireless sensor network performance metrics for building applications

    Energy Technology Data Exchange (ETDEWEB)

    Jang, W.S. (Department of Civil Engineering Yeungnam University 214-1 Dae-Dong, Gyeongsan-Si Gyeongsangbuk-Do 712-749 South Korea); Healy, W.M. [Building and Fire Research Laboratory, 100 Bureau Drive, Gaithersburg, MD 20899-8632 (United States)

    2010-06-15

    Metrics are investigated to help assess the performance of wireless sensors in buildings. Wireless sensor networks present tremendous opportunities for energy savings and improvement in occupant comfort in buildings by making data about conditions and equipment more readily available. A key barrier to their adoption, however, is the uncertainty among users regarding the reliability of the wireless links through building construction. Tests were carried out that examined three performance metrics as a function of transmitter-receiver separation distance, transmitter power level, and obstruction type. These tests demonstrated, via the packet delivery rate, a clear transition from reliable to unreliable communications at different separation distances. While the packet delivery rate is difficult to measure in actual applications, the received signal strength indication correlated well with the drop in packet delivery rate in the relatively noise-free environment used in these tests. The concept of an equivalent distance was introduced to translate the range of reliability in open field operation to that seen in a typical building, thereby providing wireless system designers a rough estimate of the necessary spacing between sensor nodes in building applications. It is anticipated that the availability of straightforward metrics on the range of wireless sensors in buildings will enable more widespread sensing in buildings for improved control and fault detection. (author)

  11. The modern research environment

    DEFF Research Database (Denmark)

    Topsøe, Flemming

    1993-01-01

    Information Technology, research environment, structured documents, networked information retrieval......Information Technology, research environment, structured documents, networked information retrieval...

  12. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-01-01

    . This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions

  13. MX/G/1 unreliable retrial queue with option of additional service and Bernoulli vacation

    Directory of Open Access Journals (Sweden)

    Charan Jeet Singh

    2016-03-01

    Full Text Available In this paper, retrial queue with unreliable server and bulk arrivals is investigated. The server is capable of providing m-optional services and any one of these available services, may be rendered to the customer after the first essential service if the customer opts for the same. It is assumed that the server may fail while rendering any phase of service and undergoes for the immediate repair. After the completion of the service of a customer, the server may either take a vacation for a random period or may continue to provide the service to the other customers waiting in the queue. The supplementary variables corresponding to service time, repair time and retrial time are incorporated to determine the queue size distribution. To examine the effect of different parameters on the performance measures of the system, the numerical illustration is given which is supported by numerical simulation and sensitivity analysis.

  14. Reliability/unreliability of mixture rule in a low alloy ferrite–martensite dual phase steel

    International Nuclear Information System (INIS)

    Fereiduni, E.; Ghasemi Banadkouki, S.S.

    2013-01-01

    Highlights: •The ferrite hardening response is quite variable in DP microstructures. •Martensite microhardness has not shown a specific manner in DP microstructures. •There is a major difference between experimental and calculated hardness values. •Mixture rule can be applied to predict the hardness if using some assumptions. -- Abstract: The aim of this paper is to investigate in details the relationship between the volume fractions of ferrite and martensite with the variation of hardness in a low alloy ferrite–martensite dual phase (DP) steel. For this purpose, a wide variety of ferrite–martensite DP samples consisting different volume fractions of ferrite and martensite have been developed using step quenching heat treatment cycle involving reheating at 860 °C for 60 min, soaking at 600 °C salt bath for various holding times followed by 70 °C hot oil quenching. Optical microscopy has been supplemented by electron microscopy and hardness measurements to follow microstructural changes and their relation to the variation in hardness. The results showed that there is a non-linear relationship between the hardness of DP samples with the volume fraction of phase constituents indicating that the mixture rule is not reliable in the ferrite–martensite DP microstructures. The unreliability of mixture rule is related to the variation of ferrite and martensite hardening responses developed in the DP samples. The DP microstructure consisting 6–7% volume fraction of continuous grain boundary ferrite in the vicinity of martensite has been associated with a remarkable higher hardness for both ferrite and martensite in comparison with the other DP microstructures. The higher martensite hardness is due to the higher carbon content of the remaining metastable austenite developed in the ferrite–austenite two phase field area, leading to the harder martensite formation on the subsequent 70 °C hot oil quenching. The harder ferrite grains have been developed as a

  15. BTP: a Block Transfer Protocol for Delay Tolerant Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Biagioni, Edoardo S.

    2010-01-01

    Wireless sensor networks that are energy-constrained must transmit and receive data as efficiently as possible.  If the transmission is delay tolerant, transferring blocks of accumulated data can be more efficient than transferring each sensed measurement as soon as it is available.  This paper...... proposes a Block Transfer Protocol (BTP) designed for efficient and reliable transmission in wireless sensor networks.  BTP reduces the time it takes to reliably transfer a block of packets compared to conventional link layer protocols, by piggybacking in data packets information about the transfer......, minimizing the number of acknowledgements needed for reliable transmission, and reducing the need for timeouts, which can substantially slow down communication when transmission is unreliable.  In addition, BTP improves reliability by handling false positive acknowledgements and by letting the receivers...

  16. Evolutionary Design of Convolutional Neural Networks for Human Activity Recognition in Sensor-Rich Environments

    Directory of Open Access Journals (Sweden)

    Alejandro Baldominos

    2018-04-01

    Full Text Available Human activity recognition is a challenging problem for context-aware systems and applications. It is gaining interest due to the ubiquity of different sensor sources, wearable smart objects, ambient sensors, etc. This task is usually approached as a supervised machine learning problem, where a label is to be predicted given some input data, such as the signals retrieved from different sensors. For tackling the human activity recognition problem in sensor network environments, in this paper we propose the use of deep learning (convolutional neural networks to perform activity recognition using the publicly available OPPORTUNITY dataset. Instead of manually choosing a suitable topology, we will let an evolutionary algorithm design the optimal topology in order to maximize the classification F1 score. After that, we will also explore the performance of committees of the models resulting from the evolutionary process. Results analysis indicates that the proposed model was able to perform activity recognition within a heterogeneous sensor network environment, achieving very high accuracies when tested with new sensor data. Based on all conducted experiments, the proposed neuroevolutionary system has proved to be able to systematically find a classification model which is capable of outperforming previous results reported in the state-of-the-art, showing that this approach is useful and improves upon previously manually-designed architectures.

  17. Evolutionary Design of Convolutional Neural Networks for Human Activity Recognition in Sensor-Rich Environments

    Science.gov (United States)

    2018-01-01

    Human activity recognition is a challenging problem for context-aware systems and applications. It is gaining interest due to the ubiquity of different sensor sources, wearable smart objects, ambient sensors, etc. This task is usually approached as a supervised machine learning problem, where a label is to be predicted given some input data, such as the signals retrieved from different sensors. For tackling the human activity recognition problem in sensor network environments, in this paper we propose the use of deep learning (convolutional neural networks) to perform activity recognition using the publicly available OPPORTUNITY dataset. Instead of manually choosing a suitable topology, we will let an evolutionary algorithm design the optimal topology in order to maximize the classification F1 score. After that, we will also explore the performance of committees of the models resulting from the evolutionary process. Results analysis indicates that the proposed model was able to perform activity recognition within a heterogeneous sensor network environment, achieving very high accuracies when tested with new sensor data. Based on all conducted experiments, the proposed neuroevolutionary system has proved to be able to systematically find a classification model which is capable of outperforming previous results reported in the state-of-the-art, showing that this approach is useful and improves upon previously manually-designed architectures. PMID:29690587

  18. Path planning in GPS-denied environments via collective intelligence of distributed sensor networks

    Science.gov (United States)

    Jha, Devesh K.; Chattopadhyay, Pritthi; Sarkar, Soumik; Ray, Asok

    2016-05-01

    This paper proposes a framework for reactive goal-directed navigation without global positioning facilities in unknown dynamic environments. A mobile sensor network is used for localising regions of interest for path planning of an autonomous mobile robot. The underlying theory is an extension of a generalised gossip algorithm that has been recently developed in a language-measure-theoretic setting. The algorithm has been used to propagate local decisions of target detection over a mobile sensor network and thus, it generates a belief map for the detected target over the network. In this setting, an autonomous mobile robot may communicate only with a few mobile sensing nodes in its own neighbourhood and localise itself relative to the communicating nodes with bounded uncertainties. The robot makes use of the knowledge based on the belief of the mobile sensors to generate a sequence of way-points, leading to a possible goal. The estimated way-points are used by a sampling-based motion planning algorithm to generate feasible trajectories for the robot. The proposed concept has been validated by numerical simulation on a mobile sensor network test-bed and a Dubin's car-like robot.

  19. Distributed reconfigurable control strategies for switching topology networked multi-agent systems.

    Science.gov (United States)

    Gallehdari, Z; Meskin, N; Khorasani, K

    2017-11-01

    In this paper, distributed control reconfiguration strategies for directed switching topology networked multi-agent systems are developed and investigated. The proposed control strategies are invoked when the agents are subject to actuator faults and while the available fault detection and isolation (FDI) modules provide inaccurate and unreliable information on the estimation of faults severities. Our proposed strategies will ensure that the agents reach a consensus while an upper bound on the team performance index is ensured and satisfied. Three types of actuator faults are considered, namely: the loss of effectiveness fault, the outage fault, and the stuck fault. By utilizing quadratic and convex hull (composite) Lyapunov functions, two cooperative and distributed recovery strategies are designed and provided to select the gains of the proposed control laws such that the team objectives are guaranteed. Our proposed reconfigurable control laws are applied to a team of autonomous underwater vehicles (AUVs) under directed switching topologies and subject to simultaneous actuator faults. Simulation results demonstrate the effectiveness of our proposed distributed reconfiguration control laws in compensating for the effects of sudden actuator faults and subject to fault diagnosis module uncertainties and unreliabilities. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  20. A Comparative Study on Cooperative Learning in Multimedia and Network Environment Used by English Majors between China Mainland and Taiwan

    Directory of Open Access Journals (Sweden)

    Gong Xue

    2018-02-01

    Full Text Available This paper first based on the theory of cooperative learning research. It analyses the characteristics and advantages of cooperative learning under the multimedia network environment.And then take China Three Gorges University and Taiwan I-Shou University English major students for example, using questionnaires and interviews to investigate the students's cooperative learning in the network environment. Survey results showed that cooperative learning teaching mode has been widely used in English classrooms across the Taiwan Strait. Students think highly of cooperative learning in the multimedia-aided, and it can have a positive effect on learning; but on cooperative learning ability and the specific learning process, students still have some problems.Nowadays,cooperative learning in the network environment has various ways, but there exist certain differences in the learning styles across the Strait. Taiwan students rely more on teachers’ help and teachers feedback, while students in mainland depend mainly on networking and panel discussion. On qualitative analysis of interview is a supplement to the questionnaire and further explore its deeper causes, which provide valuable evidence for the study and learning practice. Finally, according to the comparative analysis ,the author puts forward some constructive suggestions.

  1. Effects of social environment and personality on communication in male Siamese fighting fish in an artificial network

    DEFF Research Database (Denmark)

    Matessi, Giuliano; Matos, Ricardo Jorge Santa Clara; Peake, Tom M.

    2010-01-01

    of the individuals surrounding it within a network. We investigated the effects of a change of local social environment on two behavioural types, ‘persistent' versus ‘sporadic' signaller, in Siamese fighting fish, Betta splendens. Males visually interacted for 1 day in a communication network of seven fish in tanks...... the time spent in the inner front part of their tank, from which they could observe but not interact with the neighbours. Social instability (i.e. number of changed neighbours) raised the signalling levels of individuals independently of their behavioural types. We discuss the relationship between...... information gathering in a communication network and network composition in terms of behavioural types of its members....

  2. Lessons Learnt from and Sustainability of Adopting a Personal Learning Environment & Network (Ple&N)

    Science.gov (United States)

    Tsui, Eric; Sabetzadeh, Farzad

    2014-01-01

    This paper describes the feedback from the configuration and deployment of a Personal Learning Environment & Network (PLE&N) tool to support peer-based social learning for university students and graduates. An extension of an earlier project in which a generic and PLE&N was deployed for all learners, the current PLE&N is a…

  3. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  4. The national network of measurements of radioactivity in the environment. Management report - 2010

    International Nuclear Information System (INIS)

    Leprieur, Fabrice; Chaptal-Gradoz, Nathalie; Wyckaert, Laure; Guldner, Bruno; Jaunet, Pierrick; Levelut, Marie-Noelle

    2010-01-01

    This report presents the objectives and challenges of the French national network for the measurement of radioactivity in the environment, its legal and regulatory context, its operation, its actors (ASN, IRSN and other actors). It proposes the moral report on the steering committee and work-groups. It describes the development of the information system: main stages, synthetic description, process from data transmission to edition on Internet sites, exploitation of the public Internet site, of the requester internet site, of hosting platforms, harmonization of transmitted data, planning for 2011. It presents the exploitation assessment for 2011: technical support activities, interactions between the IRSN and the national network information system host, and so on. The last part deals with communication and publication activities

  5. Designing for Learning: Online Social Networks as a Classroom Environment

    Directory of Open Access Journals (Sweden)

    Gail Casey

    2011-11-01

    Full Text Available This paper deploys notions of emergence, connections, and designs for learning to conceptualize high school students’ interactions when using online social media as a learning environment. It makes links to chaos and complexity theories and to fractal patterns as it reports on a part of the first author’s action research study, conducted while she was a teacher working in an Australian public high school and completing her PhD. The study investigates the use of a Ning online social network as a learning environment shared by seven classes, and it examines students’ reactions and online activity while using a range of social media and Web 2.0 tools.The authors use Graham Nuthall’s (2007 “lens on learning” to explore the social processes and culture of this shared online classroom. The paper uses his extensive body of research and analyses of classroom learning processes to conceptualize and analyze data throughout the action research cycle. It discusses the pedagogical implications that arise from the use of social media and, in so doing, challenges traditional models of teaching and learning.

  6. Using Web 2.0 Techniques in NASA's Ares Engineering Operations Network (AEON) Environment - First Impressions

    Science.gov (United States)

    Scott, David W.

    2010-01-01

    The Mission Operations Laboratory (MOL) at Marshall Space Flight Center (MSFC) is responsible for Engineering Support capability for NASA s Ares rocket development and operations. In pursuit of this, MOL is building the Ares Engineering and Operations Network (AEON), a web-based portal to support and simplify two critical activities: Access and analyze Ares manufacturing, test, and flight performance data, with access to Shuttle data for comparison Establish and maintain collaborative communities within the Ares teams/subteams and with other projects, e.g., Space Shuttle, International Space Station (ISS). AEON seeks to provide a seamless interface to a) locally developed engineering applications and b) a Commercial-Off-The-Shelf (COTS) collaborative environment that includes Web 2.0 capabilities, e.g., blogging, wikis, and social networking. This paper discusses how Web 2.0 might be applied to the typically conservative engineering support arena, based on feedback from Integration, Verification, and Validation (IV&V) testing and on searching for their use in similar environments.

  7. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  8. VRML and Collaborative Environments: New Tools for Networked Visualization

    Science.gov (United States)

    Crutcher, R. M.; Plante, R. L.; Rajlich, P.

    We present two new applications that engage the network as a tool for astronomical research and/or education. The first is a VRML server which allows users over the Web to interactively create three-dimensional visualizations of FITS images contained in the NCSA Astronomy Digital Image Library (ADIL). The server's Web interface allows users to select images from the ADIL, fill in processing parameters, and create renderings featuring isosurfaces, slices, contours, and annotations; the often extensive computations are carried out on an NCSA SGI supercomputer server without the user having an individual account on the system. The user can then download the 3D visualizations as VRML files, which may be rotated and manipulated locally on virtually any class of computer. The second application is the ADILBrowser, a part of the NCSA Horizon Image Data Browser Java package. ADILBrowser allows a group of participants to browse images from the ADIL within a collaborative session. The collaborative environment is provided by the NCSA Habanero package which includes text and audio chat tools and a white board. The ADILBrowser is just an example of a collaborative tool that can be built with the Horizon and Habanero packages. The classes provided by these packages can be assembled to create custom collaborative applications that visualize data either from local disk or from anywhere on the network.

  9. Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhuangbin Chen

    2017-01-01

    Full Text Available In smart Industrial Wireless Sensor Networks (IWSNs, sensor nodes usually adopt a programmable technology. These smart devices can obtain new or special functions by reprogramming: they upgrade their soft systems through receiving new version of program codes. If sensor nodes need to be upgraded, the sink node will propagate program code packets to them through “one-to-many” broadcasting, and therefore new capabilities can be obtained, forming the so-called Software Defined Network (SDN. However, due to the high volume of code packet, the constraint energy of sensor node, and the unreliable link quality of wireless network, rapidly broadcasting the code packets to all nodes in network can be a challenge issue. In this paper, a novel Energy-efficient Broadcast scheme with adjustable broadcasting radius is proposed aiming to improve the performance of network upgrade. In our scheme, the nonhotspots sensor nodes take full advantage of their residual energy caused in data collection period to improve the packet reception probability and reduce the broadcasting delay of code packet transmission by enlarging the broadcasting radius, that is, the transmitting power. The theoretical analyses and experimental results show that, compared with previous work, our approach can averagely reduce the Network Upgrade Delay (NUD by 14.8%–45.2% and simultaneously increase the reliability without harming the lifetime of network.

  10. The Worldviews Network: Transformative Global Change Education in Immersive Environments

    Science.gov (United States)

    Hamilton, H.; Yu, K. C.; Gardiner, N.; McConville, D.; Connolly, R.; "Irving, Lindsay", L. S.

    2011-12-01

    Our modern age is defined by an astounding capacity to generate scientific information. From DNA to dark matter, human ingenuity and technologies create an endless stream of data about ourselves and the world of which we are a part. Yet we largely founder in transforming information into understanding, and understanding into rational action for our society as a whole. Earth and biodiversity scientists are especially frustrated by this impasse because the data they gather often point to a clash between Earth's capacity to sustain life and the decisions that humans make to garner the planet's resources. Immersive virtual environments offer an underexplored link in the translation of scientific data into public understanding, dialogue, and action. The Worldviews Network is a collaboration of scientists, artists, and educators focused on developing best practices for the use of immersive environments for science-based ecological literacy education. A central tenet of the Worldviews Network is that there are multiple ways to know and experience the world, so we are developing scientifically accurate, geographically relevant, and culturally appropriate programming to promote ecological literacy within informal science education programs across the United States. The goal of Worldviews Network is to offer transformative learning experiences, in which participants are guided on a process integrating immersive visual explorations, critical reflection and dialogue, and design-oriented approaches to action - or more simply, seeing, knowing, and doing. Our methods center on live presentations, interactive scientific visualizations, and sustainability dialogues hosted at informal science institutions. Our approach uses datasets from the life, Earth, and space sciences to illuminate the complex conditions that support life on earth and the ways in which ecological systems interact. We are leveraging scientific data from federal agencies, non-governmental organizations, and our

  11. THE APPLICATION OF DIGITAL LINE GRAPHS AND MAP IN THE NETWORK ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    X. Guo

    2012-07-01

    Full Text Available WebGIS is an important research field in GIS. W3C organization established SVG standard, which laid a foundation for WebGIS based on vector data. In China, Digital Line Graphs(DLG is a significant GIS product and it has been used in many medium and large WebGIS system. Geographic information-portrayal is the common method of DLG visualization. However, the inherent characteristics of Geographic information-portrayal may lead to a relatively higher data production input, still, the visualization effect is not ideal. We put forward a new product named Digital Line Graphs and Map(DLGM, which consists of DLG and DLG's cartographic presentation data. It provides visualization data based on the cartographic standards. Due to the manufacture and management of DLGM data that are independent from software and platform, its data can be used in many fields. Network application is one of them. This paper is to use DLGM in the network applications. First it reveals the connotation and characteristics of DLGM then analyses the model that DLGM organizes, manages DLG and map symbol data. After that, combined with SVG standards, we put forward DLGM’s SVG encoding method without any information loss. Finally we provide a web map system based on local area network by using 1:10000 DLGM data of a certain area. Based on this study, we conclude that DLGM can be used in the network environment providing high quality DLG and cartographic data for WebGIS.

  12. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    Science.gov (United States)

    Jang, Seung-Jae; Lee, Young-Gu; Lee, Kwang-Hyung; Kim, Tai-Hoon; Jun, Moon-Seog

    2011-01-01

    These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes. PMID:22164072

  13. A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

    Directory of Open Access Journals (Sweden)

    Moon-Seog Jun

    2011-08-01

    Full Text Available These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes.

  14. Application and Network-Cognizant Proxies - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Antonio Ortega; Daniel C. Lee

    2003-03-24

    OAK B264 Application and Network-Cognizant Proxies - Final Report. Current networks show increasing heterogeneity both in terms of their bandwidths/delays and the applications they are required to support. This is a trend that is likely to intensify in the future, as real-time services, such as video, become more widely available and networking access over wireless links becomes more widespread. For this reason they propose that application-specific proxies, intermediate network nodes that broker the interactions between server and client, will become an increasingly important network element. These proxies will allow adaptation to changes in network characteristics without requiring a direct intervention of either server or client. Moreover, it will be possible to locate these proxies strategically at those points where a mismatch occurs between subdomains (for example, a proxy could be placed so as to act as a bridge between a reliable network domain and an unreliable one). This design philosophy favors scalability in the sense that the basic network infrastructure can remain unchanged while new functionality can be added to proxies, as required by the applications. While proxies can perform numerous generic functions, such as caching or security, they concentrate here on media-specific, and in particular video-specific, tasks. The goal of this project was to demonstrate that application- and network-specific knowledge at a proxy can improve overall performance especially under changing network conditions. They summarize below the work performed to address these issues. Particular effort was spent in studying caching techniques and on video classification to enable DiffServ delivery. other work included analysis of traffic characteristics, optimized media scheduling, coding techniques based on multiple description coding, and use of proxies to reduce computation costs. This work covered much of what was originally proposed but with a necessarily reduced scope.

  15. Prediction of Thermal Environment in a Large Space Using Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Hyun-Jung Yoon

    2018-02-01

    Full Text Available Since the thermal environment of large space buildings such as stadiums can vary depending on the location of the stands, it is important to divide them into different zones and evaluate their thermal environment separately. The thermal environment can be evaluated using physical values measured with the sensors, but the occupant density of the stadium stands is high, which limits the locations available to install the sensors. As a method to resolve the limitations of installing the sensors, we propose a method to predict the thermal environment of each zone in a large space. We set six key thermal factors affecting the thermal environment in a large space to be predicted factors (indoor air temperature, mean radiant temperature, and clothing and the fixed factors (air velocity, metabolic rate, and relative humidity. Using artificial neural network (ANN models and the outdoor air temperature and the surface temperature of the interior walls around the stands as input data, we developed a method to predict the three thermal factors. Learning and verification datasets were established using STAR CCM+ (2016.10, Siemens PLM software, Plano, TX, USA. An analysis of each model’s prediction results showed that the prediction accuracy increased with the number of learning data points. The thermal environment evaluation process developed in this study can be used to control heating, ventilation, and air conditioning (HVAC facilities in each zone in a large space building with sufficient learning by ANN models at the building testing or the evaluation stage.

  16. Enhancement of environment and resources engineering studies through an international cooperation network

    Science.gov (United States)

    Caporali, E.; Tuneski, A.

    2012-12-01

    , following the criteria and conditions for setting up a Joint Postgraduate Degree. The new second cycle degree courses are going to be activated in the academic year 2012/2012. Both the first and second cycle curricula, developed through the co-operation, exchange of know-how and expertise between partners, are based on the European Credit Transfer System and are in accordance with the Bologna Process. In DEREL a second objective is to implement a sustainable regional network aimed to offer lifelong learning seminars for environment and resources engineering education and training of interested stakeholders and organize workshops focused on strengthening the links in the knowledge triangle: environment education-innovation-research, with participation of postgraduate students, public services, enterprises and NGO's. Also, the good collaborative environment created, since 2005, with the project partners can be surely mentioned as an additional valuable objective of the two TEMPUS projects, enabling implementation of a sustainable international network for environment and resources engineering studies enhancement and development.

  17. A novel method of predicting microRNA-disease associations based on microRNA, disease, gene and environment factor networks.

    Science.gov (United States)

    Peng, Wei; Lan, Wei; Zhong, Jiancheng; Wang, Jianxin; Pan, Yi

    2017-07-15

    MicroRNAs have been reported to have close relationship with diseases due to their deregulation of the expression of target mRNAs. Detecting disease-related microRNAs is helpful for disease therapies. With the development of high throughput experimental techniques, a large number of microRNAs have been sequenced. However, it is still a big challenge to identify which microRNAs are related to diseases. Recently, researchers are interesting in combining multiple-biological information to identify the associations between microRNAs and diseases. In this work, we have proposed a novel method to predict the microRNA-disease associations based on four biological properties. They are microRNA, disease, gene and environment factor. Compared with previous methods, our method makes predictions not only by using the prior knowledge of associations among microRNAs, disease, environment factors and genes, but also by using the internal relationship among these biological properties. We constructed four biological networks based on the similarity of microRNAs, diseases, environment factors and genes, respectively. Then random walking was implemented on the four networks unequally. In the walking course, the associations can be inferred from the neighbors in the same networks. Meanwhile the association information can be transferred from one network to another. The results of experiment showed that our method achieved better prediction performance than other existing state-of-the-art methods. Copyright © 2017 Elsevier Inc. All rights reserved.

  18. A Mobile Sensor Network to Map CO2 in Urban Environments

    Science.gov (United States)

    Lee, J.; Christen, A.; Nesic, Z.; Ketler, R.

    2014-12-01

    Globally, an estimated 80% of all fuel-based CO2 emissions into the atmosphere are attributable to cities, but there is still a lack of tools to map, visualize and monitor emissions to the scales at which emissions reduction strategies can be implemented - the local and urban scale. Mobile CO2 sensors, such as those attached to taxis and other existing mobile platforms, may be a promising way to observe and map CO2 mixing ratios across heterogenous urban environments with a limited number of sensors. Emerging modular open source technologies, and inexpensive compact sensor components not only enable rapid prototyping and replication, but also are allowing for the miniaturization and mobilization of traditionally fixed sensor networks. We aim to optimize the methods and technologies for monitoring CO2 in cities using a network of CO2 sensors deployable on vehicles and bikes. Our sensor technology is contained in a compact weather-proof case (35.8cm x 27.8cm x 11.8cm), powered independently by battery or by car, and includes the Li-Cor Li-820 infrared gas analyzer (Licor Inc, lincoln, NB, USA), Arduino Mega microcontroller (Arduino CC, Italy) and Adafruit GPS (Adafruit Technologies, NY, USA), and digital air temperature thermometer which measure CO2 mixing ratios (ppm), geolocation and speed, pressure and temperature, respectively at 1-second intervals. With the deployment of our sensor technology, we will determine if such a semi-autonomous mobile approach to monitoring CO2 in cities can determine excess urban CO2 mixing ratios (i.e. the 'urban CO2 dome') when compared to values measured at a fixed, remote background site. We present results from a pilot study in Vancouver, BC, where the a network of our new sensors was deployed both in fixed network and in a mobile campaign and examine the spatial biases of the two methods.

  19. QoS Parameters Evaluation in a VPN-MPLS Diffserv Network under a Complete Free Software Emulation Environment

    Directory of Open Access Journals (Sweden)

    Miroslava Aracely Zapata Rodríguez

    2017-12-01

    Full Text Available The use of Virtual Private Network – Multi Protocol Label Switching (VPN-MPLS networks has become very common inside enterprises thanks to their multiple advantages; such as, the private communication across a public network infrastructure between geographically diverse sites. This leads to a need for an efficient network in terms of Quality of Service (QoS to guarantee reliability and security of information. However, the implementation of a VPN-MPLS network is neither easy nor cheap for small and medium companies; hence, in most cases, it is required the use of emulators that are not free either. In this paper, we analyze a VPN-MPLS network in terms of QoS metrics: delay, jitter and packet loss. This evaluation was performed in a virtual environment using only free software tools under two test scenarios, with and without Differentiated Services (DiffServ. The results showed that a VPN-MPLS DiffServ network reduces the delay by approximately 96.78% in VoIP, 39.21% in Data and 66.83% in Streaming; furthermore, the jitter was reduced by approximately 27.88% in VoIP and 41.09% in Data.

  20. Elementary Students' Affective Variables in a Networked Learning Environment Supported by a Blog: A Case Study

    Science.gov (United States)

    Allaire, Stéphane; Thériault, Pascale; Gagnon, Vincent; Lalancette, Evelyne

    2013-01-01

    This study documents to what extent writing on a blog in a networked learning environment could influence the affective variables of elementary-school students' writing. The framework is grounded more specifically in theory of self-determination (Deci & Ryan, 1985), relationship to writing (Chartrand & Prince, 2009) and the transactional…

  1. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  2. Fuzzy mobile-robot positioning in intelligent spaces using wireless sensor networks.

    Science.gov (United States)

    Herrero, David; Martínez, Humberto

    2011-01-01

    This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using wireless sensor networks (WSNs). The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.

  3. Trust and Control Dynamics in Agrifood Supply Networks: Communication Strategies for Electronic Transaction Environments

    OpenAIRE

    Fritz, Melanie; Hausen, Tobias

    2006-01-01

    Agrifood supply networks are dynamic structures where firms regularly face the need to search for new market partners. A decision for a transaction with a new partner requires the existence of appropriate control and safeguard mechanisms as well as trust to overcome perceived risk and uncertainties. Electronic transaction environments offer new potentials for the identification of new transaction partners. However, trust and control need to be communicated appropriately in electronic transact...

  4. An Integrated Environment Monitoring System for Underground Coal Mines—Wireless Sensor Network Subsystem with Multi-Parameter Monitoring

    OpenAIRE

    Zhang, Yu; Yang, Wei; Han, Dongsheng; Kim, Young-Il

    2014-01-01

    Environment monitoring is important for the safety of underground coal mine production, and it is also an important application of Wireless Sensor Networks (WSNs). We put forward an integrated environment monitoring system for underground coal mine, which uses the existing Cable Monitoring System (CMS) as the main body and the WSN with multi-parameter monitoring as the supplementary technique. As CMS techniques are mature, this paper mainly focuses on the WSN and the interconnection between t...

  5. Cramer-Rao Lower Bound Evaluation for Linear Frequency Modulation Based Active Radar Networks Operating in a Rice Fading Environment.

    Science.gov (United States)

    Shi, Chenguang; Salous, Sana; Wang, Fei; Zhou, Jianjiang

    2016-12-06

    This paper investigates the joint target parameter (delay and Doppler) estimation performance of linear frequency modulation (LFM)-based radar networks in a Rice fading environment. The active radar networks are composed of multiple radar transmitters and multichannel receivers placed on moving platforms. First, the log-likelihood function of the received signal for a Rician target is derived, where the received signal scattered off the target comprises of dominant scatterer (DS) component and weak isotropic scatterers (WIS) components. Then, the analytically closed-form expressions of the Cramer-Rao lower bounds (CRLBs) on the Cartesian coordinates of target position and velocity are calculated, which can be adopted as a performance metric to access the target parameter estimation accuracy for LFM-based radar network systems in a Rice fading environment. It is found that the cumulative Fisher information matrix (FIM) is a linear combination of both DS component and WIS components, and it also demonstrates that the joint CRLB is a function of signal-to-noise ratio (SNR), target's radar cross section (RCS) and transmitted waveform parameters, as well as the relative geometry between the target and the radar network architectures. Finally, numerical results are provided to indicate that the joint target parameter estimation performance of active radar networks can be significantly improved with the exploitation of DS component.

  6. Cramer-Rao Lower Bound Evaluation for Linear Frequency Modulation Based Active Radar Networks Operating in a Rice Fading Environment

    Directory of Open Access Journals (Sweden)

    Chenguang Shi

    2016-12-01

    Full Text Available This paper investigates the joint target parameter (delay and Doppler estimation performance of linear frequency modulation (LFM-based radar networks in a Rice fading environment. The active radar networks are composed of multiple radar transmitters and multichannel receivers placed on moving platforms. First, the log-likelihood function of the received signal for a Rician target is derived, where the received signal scattered off the target comprises of dominant scatterer (DS component and weak isotropic scatterers (WIS components. Then, the analytically closed-form expressions of the Cramer-Rao lower bounds (CRLBs on the Cartesian coordinates of target position and velocity are calculated, which can be adopted as a performance metric to access the target parameter estimation accuracy for LFM-based radar network systems in a Rice fading environment. It is found that the cumulative Fisher information matrix (FIM is a linear combination of both DS component and WIS components, and it also demonstrates that the joint CRLB is a function of signal-to-noise ratio (SNR, target’s radar cross section (RCS and transmitted waveform parameters, as well as the relative geometry between the target and the radar network architectures. Finally, numerical results are provided to indicate that the joint target parameter estimation performance of active radar networks can be significantly improved with the exploitation of DS component.

  7. Efficient Routing in Wireless Sensor Networks with Multiple Sessions

    Directory of Open Access Journals (Sweden)

    Dianjie Lu

    2014-05-01

    Full Text Available Wireless Sensor Networks (WSNs are subject to node failures because of limited energy and link unreliability which makes the design of routing protocols in such networks a challenging task. The multipath routing scheme is an optimal alternative to address this problem which splits the traffic across multiple paths instead of routing all the traffic along a single path. However, using more paths introduces more contentions which degrade energy efficiency. The problem becomes even more difficult in the scenario of multiple sessions since different source-destination pairs may pass the same link which makes the flow distribution of each link uncertain. Our goal is to minimize the energy cost and provide the robust transmission by choosing the optimal paths. We first study the problem from a theoretical standpoint by mapping it to the multi-commodity network design problem. Since it is hard to build a global addressing scheme due to the great number of sensor nodes, we propose a Distributed Energy Efficient Routing protocol (D2ER. In D2ER, we employ the transportation method which can optimize the flow distribution with minimal energy consumption. Simulation results demonstrate that our optimal algorithm can save energy drastically.

  8. An integrated environment monitoring system for underground coal mines--Wireless Sensor Network subsystem with multi-parameter monitoring.

    Science.gov (United States)

    Zhang, Yu; Yang, Wei; Han, Dongsheng; Kim, Young-Il

    2014-07-21

    Environment monitoring is important for the safety of underground coal mine production, and it is also an important application of Wireless Sensor Networks (WSNs). We put forward an integrated environment monitoring system for underground coal mine, which uses the existing Cable Monitoring System (CMS) as the main body and the WSN with multi-parameter monitoring as the supplementary technique. As CMS techniques are mature, this paper mainly focuses on the WSN and the interconnection between the WSN and the CMS. In order to implement the WSN for underground coal mines, two work modes are designed: periodic inspection and interrupt service; the relevant supporting technologies, such as routing mechanism, collision avoidance, data aggregation, interconnection with the CMS, etc., are proposed and analyzed. As WSN nodes are limited in energy supply, calculation and processing power, an integrated network management scheme is designed in four aspects, i.e., topology management, location management, energy management and fault management. Experiments were carried out both in a laboratory and in a real underground coal mine. The test results indicate that the proposed integrated environment monitoring system for underground coal mines is feasible and all designs performed well as expected.

  9. An Integrated Environment Monitoring System for Underground Coal Mines—Wireless Sensor Network Subsystem with Multi-Parameter Monitoring

    Science.gov (United States)

    Zhang, Yu; Yang, Wei; Han, Dongsheng; Kim, Young-Il

    2014-01-01

    Environment monitoring is important for the safety of underground coal mine production, and it is also an important application of Wireless Sensor Networks (WSNs). We put forward an integrated environment monitoring system for underground coal mine, which uses the existing Cable Monitoring System (CMS) as the main body and the WSN with multi-parameter monitoring as the supplementary technique. As CMS techniques are mature, this paper mainly focuses on the WSN and the interconnection between the WSN and the CMS. In order to implement the WSN for underground coal mines, two work modes are designed: periodic inspection and interrupt service; the relevant supporting technologies, such as routing mechanism, collision avoidance, data aggregation, interconnection with the CMS, etc., are proposed and analyzed. As WSN nodes are limited in energy supply, calculation and processing power, an integrated network management scheme is designed in four aspects, i.e., topology management, location management, energy management and fault management. Experiments were carried out both in a laboratory and in a real underground coal mine. The test results indicate that the proposed integrated environment monitoring system for underground coal mines is feasible and all designs performed well as expected. PMID:25051037

  10. An Integrated Environment Monitoring System for Underground Coal Mines—Wireless Sensor Network Subsystem with Multi-Parameter Monitoring

    Directory of Open Access Journals (Sweden)

    Yu Zhang

    2014-07-01

    Full Text Available Environment monitoring is important for the safety of underground coal mine production, and it is also an important application of Wireless Sensor Networks (WSNs. We put forward an integrated environment monitoring system for underground coal mine, which uses the existing Cable Monitoring System (CMS as the main body and the WSN with multi-parameter monitoring as the supplementary technique. As CMS techniques are mature, this paper mainly focuses on the WSN and the interconnection between the WSN and the CMS. In order to implement the WSN for underground coal mines, two work modes are designed: periodic inspection and interrupt service; the relevant supporting technologies, such as routing mechanism, collision avoidance, data aggregation, interconnection with the CMS, etc., are proposed and analyzed. As WSN nodes are limited in energy supply, calculation and processing power, an integrated network management scheme is designed in four aspects, i.e., topology management, location management, energy management and fault management. Experiments were carried out both in a laboratory and in a real underground coal mine. The test results indicate that the proposed integrated environment monitoring system for underground coal mines is feasible and all designs performed well as expected.

  11. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  12. The networked student: A design-based research case study of student constructed personal learning environments in a middle school science course

    Science.gov (United States)

    Drexler, Wendy

    This design-based research case study applied a networked learning approach to a seventh grade science class at a public school in the southeastern United States. Students adapted emerging Web applications to construct personal learning environments for in-depth scientific inquiry of poisonous and venomous life forms. The personal learning environments constructed used Application Programming Interface (API) widgets to access, organize, and synthesize content from a number of educational Internet resources and social network connections. This study examined the nature of personal learning environments; the processes students go through during construction, and patterns that emerged. The project was documented from both an instructional and student-design perspective. Findings revealed that students applied the processes of: practicing digital responsibility; practicing digital literacy; organizing content; collaborating and socializing; and synthesizing and creating. These processes informed a model of the networked student that will serve as a framework for future instructional designs. A networked learning approach that incorporates these processes into future designs has implications for student learning, teacher roles, professional development, administrative policies, and delivery. This work is significant in that it shifts the focus from technology innovations based on tools to student empowerment based on the processes required to support learning. It affirms the need for greater attention to digital literacy and responsibility in K12 schools as well as consideration for those skills students will need to achieve success in the 21st century. The design-based research case study provides a set of design principles for teachers to follow when facilitating student construction of personal learning environments.

  13. Gamification, Social Networks and Sustainable Environments

    Directory of Open Access Journals (Sweden)

    Fábio Silva

    2013-12-01

    Full Text Available Intelligent environments and ambient intelligence enabled systems provide means to gather rich information from both environments and its users. With the help of such systems, it is possible to foster communities of ambient intelligence systems with community driven knowledge, which is created by individual actions and setups in each of the environments. Such arrangements provides the potential to build systems that promote better practices and more efficient and sustainable environments by promoting the community best examples and engaging users to adopt and develop proactive behaviors to improve their standings in the community. This work aims to use knowledge from communities of intelligent environments to their own benefit. The approach presented in this work uses information from different environments, ranking them according to their sustainability assessment. Recommendations are then computed using similarity and clustering functions ranking users and environments, updating their previous records and launching new recommendations in the process. Gamification concepts are used in order to keep users motivation and engage them actively to produce better results in terms of sustainability.

  14. Gamification, social networks and sustainable environments

    OpenAIRE

    Silva, Fábio; Analide, César; Rosa, Luís; Felgueiras, Gilberto; Pimenta, Cedric

    2013-01-01

    Intelligent environments and ambient intelligence enabled systems provide means to gather rich information from both environments and its users. With the help of such systems, it is possible to foster communities of ambient intelligence systems with community driven knowledge, which is created by individual actions and setups in each of the environments. Such arrangements provides the potential to build systems that promote better practices and more efficient and sustainable environments by p...

  15. Unreliability and error in the military's "gold standard" measure of sexual harassment by education and gender.

    Science.gov (United States)

    Murdoch, Maureen; Pryor, John B; Griffin, Joan M; Ripley, Diane Cowper; Gackstetter, Gary D; Polusny, Melissa A; Hodges, James S

    2011-01-01

    The Department of Defense's "gold standard" sexual harassment measure, the Sexual Harassment Core Measure (SHCore), is based on an earlier measure that was developed primarily in college women. Furthermore, the SHCore requires a reading grade level of 9.1. This may be higher than some troops' reading abilities and could generate unreliable estimates of their sexual harassment experiences. Results from 108 male and 96 female soldiers showed that the SHCore's temporal stability and alternate-forms reliability was significantly worse (a) in soldiers without college experience compared to soldiers with college experience and (b) in men compared to women. For men without college experience, almost 80% of the temporal variance in SHCore scores was attributable to error. A plain language version of the SHCore had mixed effects on temporal stability depending on education and gender. The SHCore may be particularly ill suited for evaluating population trends of sexual harassment in military men without college experience.

  16. User Identification Framework in Social Network Services Environment

    Directory of Open Access Journals (Sweden)

    Brijesh BAKARIYA

    2014-01-01

    Full Text Available Social Network Service is a one of the service where people may communicate with one an-other; and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a type of network. Such type of web application plays a dominant role in internet technology. In such type of online community, people may share their common interest. Facebook LinkedIn, orkut and many more are the Social Network Service and it is good medium of making link with people having unique or common interest and goals. But the problem of privacy protection is a big issue in today’s world. As social networking sites allows anonymous users to share information of other stuffs. Due to which cybercrime is also increasing to a rapid extent. In this article we preprocessed the web log data of Social Network Services and assemble that data on the basis of image file format like jpg, jpeg, gif, png, bmp etc. and also propose a framework for victim’s identification.

  17. Wireless sensor network-based greenhouse environment monitoring and automatic control system for dew condensation prevention.

    Science.gov (United States)

    Park, Dae-Heon; Park, Jang-Woo

    2011-01-01

    Dew condensation on the leaf surface of greenhouse crops can promote diseases caused by fungus and bacteria, affecting the growth of the crops. In this paper, we present a WSN (Wireless Sensor Network)-based automatic monitoring system to prevent dew condensation in a greenhouse environment. The system is composed of sensor nodes for collecting data, base nodes for processing collected data, relay nodes for driving devices for adjusting the environment inside greenhouse and an environment server for data storage and processing. Using the Barenbrug formula for calculating the dew point on the leaves, this system is realized to prevent dew condensation phenomena on the crop's surface acting as an important element for prevention of diseases infections. We also constructed a physical model resembling the typical greenhouse in order to verify the performance of our system with regard to dew condensation control.

  18. Construction of the main building network environment in IHEP

    International Nuclear Information System (INIS)

    Wang Yanming

    2004-01-01

    Based on the new network structure at IHEP, we re-constructed the network in Main Building at IHEP in order to realize the goal of steadily supporting the network application. We chose high performance and administrable switches and configured them properly. This improved that the network security, management ability. So the network at Main Building became more safe, steady, reliable and high-efficient. (authors)

  19. Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.

    Science.gov (United States)

    Liu, Yang; Xu, Songhua; Tourassi, Georgia

    2015-01-01

    In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.

  20. Virtual Community, social network and media environment of Canary Isands regional digital newspapers

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Manuel Mateos Rodríguez

    2008-01-01

    Full Text Available The impact of the new communication and information technologies has favoured the creation of multiple local newspaper websites in the Canary Islands, thus making the regional press emerge as an alternative on the rise. This tendency affects significantly both traditional and new editions of the different regional and local newspapers from the Canaries and motivates a different distribution, positioning and development within the local media environment in which these media share a novel dimension of communication with a specific virtual community and social network within the World Wide Web.

  1. A hybridised variable neighbourhood tabu search heuristic to increase security in a utility network

    International Nuclear Information System (INIS)

    Janssens, Jochen; Talarico, Luca; Sörensen, Kenneth

    2016-01-01

    We propose a decision model aimed at increasing security in a utility network (e.g., electricity, gas, water or communication network). The network is modelled as a graph, the edges of which are unreliable. We assume that all edges (e.g., pipes, cables) have a certain, not necessarily equal, probability of failure, which can be reduced by selecting edge-specific security strategies. We develop a mathematical programming model and a metaheuristic approach that uses a greedy random adaptive search procedure to find an initial solution and uses tabu search hybridised with iterated local search and a variable neighbourhood descend heuristic to improve this solution. The main goal is to reduce the risk of service failure between an origin and a destination node by selecting the right combination of security measures for each network edge given a limited security budget. - Highlights: • A decision model aimed at increasing security in a utility network is proposed. • The goal is to reduce the risk of service failure given a limited security budget. • An exact approach and a variable neighbourhood tabu search heuristic are developed. • A generator for realistic networks is built and used to test the solution methods. • The hybridised heuristic reduces the total risk on average with 32%.

  2. Report on the survey in fiscal 1998. Survey on an environment technology transfer information network; 1998 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This paper describes a survey on an environment technology transfer information network. Based on the achievements obtained by the surveys in fiscal 1995 and 1996, the ICETT has participated as one organization constituting the APEC environment technology exchange virtual center, and begun providing information since April 1997. As the environment technology information, those items actually employed by factories and operation sites in Japan are put into a data base, and into a home page including training information centering around those contained in the data base, and examples of works done by local governments for prevention of pollution. Furthermore in fiscal 1997, a simulation software for a model process has been developed. Fiscal 1998 strengthened the data base for environment preservation technology information, investigated environment preserving model companies and summarized them including even their management aspect. Investigations were carried out in developing countries on application of cleaner technologies. Gaps far exceeding anticipation exist in every field between these developing countries and Japan. Environment protection measures applied and succeeded in the developing countries as the means to narrow the gaps were collected, and compiled as the specific examples. (NEDO)

  3. Assessing offshore emergency evacuation behavior in a virtual environment using a Bayesian Network approach

    International Nuclear Information System (INIS)

    Musharraf, Mashrura; Smith, Jennifer; Khan, Faisal; Veitch, Brian; MacKinnon, Scott

    2016-01-01

    In the performance influencing factor (PIF) hierarchy, person-based influencing factors reside in the top level along with machine-based, team-based, organization-based and situation/stressor-based factors. Though person-based PIFs like morale, motivation, and attitude (MMA) play an important role in shaping performance, it is nearly impossible to assess such PIFs directly. However, it is possible to measure behavioral indicators (e.g. compliance, use of information) that can provide insight regarding the state of the unobservable person-based PIFs. One common approach to measuring these indicators is to carry out a self-reported questionnaire survey. Significant work has been done to make such questionnaires reliable, but the potential validity problem associated with any questionnaire is that the data are subjective and thus may bear a limited relationship to reality. This paper describes the use of a virtual environment to measure behavioral indicators, which in turn can be used as proxies to assess otherwise unobservable PIFs like MMA. A Bayesian Network (BN) model is first developed to define the relationship between person-based PIFs and measurable behavioral indicators. The paper then shows how these indicators can be measured using evidence collected from a virtual environment of an offshore petroleum installation. A study that focused on emergency evacuation scenarios was done with 36 participants. The participants were first assessed using a multiple choice test. They were then assessed based on their observed performance during simulated offshore emergency evacuation conditions. A comparison of the two assessments demonstrates the potential benefits and challenges of using virtual environments to assess behavioral indicators, and thus the person-based PIFs. - Highlights: • New approach to use virtual environment as measure of behavioral indicators. • New model to study morale, motivation, and attitude. • Bayesian Network model to define the

  4. SOCIAL NETWORKS AS THE ENVIRONMENT EDUCATION

    Directory of Open Access Journals (Sweden)

    Wojsław Czupryński

    2016-12-01

    Full Text Available The emergence of the global Internet has changed the way the entire human population communicates. The internet has become a platform, where human societies build their lives, and traditional communication over the last few years has been replaced by social networks. Today, social networks are the subject of many debates concerning their advantages, disadvantages and the ideas of what they bring to the future. Portals are not only the way of communication, fun, an idea to spend free time, but also source of social and humanistic knowledge too. Against that, social media could be a huge risk for those who use them. The assigned job above discusses about the topic the detrimental effect what the social networks bring. A series of deviant behaviors caused by use of the portal is also presented in this report. Often they become a dysfunctional generator of actions that manifest themselves among the youth. Consequently, there was a need to take action to stop the growth of this phenomenon among young people. First of all the primary activities at this level are prevention and education in the family.

  5. Performance Comparison of Wireless Sensor Network Standard Protocols in an Aerospace Environment: ISA100.11a and ZigBee

    Science.gov (United States)

    Wagner, Raymond S.; Barton, Richard J.

    2011-01-01

    Wireless Sensor Networks (WSNs) can provide a substantial benefit in spacecraft systems, reducing launch weight and providing unprecedented flexibility by allowing instrumentation capabilities to grow and change over time. Achieving data transport reliability on par with that of wired systems, however, can prove extremely challenging in practice. Fortunately, much progress has been made in developing standard WSN radio protocols for applications from non-critical home automation to mission-critical industrial process control. The relative performances of candidate protocols must be compared in representative aerospace environments, however, to determine their suitability for spaceflight applications. In this paper, we will present the results of a rigorous laboratory analysis of the performance of two standards-based, low power, low data rate WSN protocols: ZigBee Pro and ISA100.11a. Both are based on IEEE 802.15.4 and augment that standard's specifications to build complete, multi-hop networking stacks. ZigBee Pro targets primarily the home and office automation markets, providing an ad-hoc protocol that is computationally lightweight and easy to implement in inexpensive system-on-a-chip components. As a result of this simplicity, however, ZigBee Pro can be susceptible to radio frequency (RF) interference. ISA100.11a, on the other hand, targets the industrial process control market, providing a robust, centrally-managed protocol capable of tolerating a significant amount of RF interference. To achieve these gains, a coordinated channel hopping mechanism is employed, which entails a greater computational complexity than ZigBee and requires more sophisticated and costly hardware. To guide future aerospace deployments, we must understand how well these standards relatively perform in analog environments under expected operating conditions. Specifically, we are interested in evaluating goodput -- application level throughput -- in a representative crewed environment

  6. Key Economic Parameters for an Optimal Pharmacy Network in a Regulated Environment

    Directory of Open Access Journals (Sweden)

    Franjo MLINARIC

    2016-10-01

    Full Text Available Pharmacies are an integral part of the modern healthcare system which strives for a holistic and effi cient care. General practitioners and pharmacists are held in high esteem among local communities as they are the fi rst point of contact when people have health issues. However, a strong demand for health services in developed countries and its present fi nancing schemes undermined the sustainability of the whole health system (8.9% of GDP in 2013 and growing. According to WHO and EU recommendations, the whole healthcare system shall accept a holistic approach and focus on education, prevention and proper medicine consume. Part of this strategy is a seamless care concept, where medical doctors and pharmacists build a team around the well-being of a patient. Financing scheme incentives and KPI’s (key performance indicators will be focused on keeping people healthy, instead of paying for procedures. The future healthcare ecosystem obliges pharmacists to optimize network coverage and to extend health services. Nevertheless, their growth strategy needs to be gradual, considering the present level of network coverage, the low pace of private and public expenditures for medicine and services, and the fact that a new fi nancing model for pharmacies is still unknown. Thus, we expect the development of pharmacy network in regulated environment to be fi nanced predominantly from retained earnings in publicly owned pharmacies and by awarding pharmacy concessions.

  7. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  8. Fuzzy Mobile-Robot Positioning in Intelligent Spaces Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    David Herrero

    2011-11-01

    Full Text Available This work presents the development and experimental evaluation of a method based on fuzzy logic to locate mobile robots in an Intelligent Space using Wireless Sensor Networks (WSNs. The problem consists of locating a mobile node using only inter-node range measurements, which are estimated by radio frequency signal strength attenuation. The sensor model of these measurements is very noisy and unreliable. The proposed method makes use of fuzzy logic for modeling and dealing with such uncertain information. Besides, the proposed approach is compared with a probabilistic technique showing that the fuzzy approach is able to handle highly uncertain situations that are difficult to manage by well-known localization methods.

  9. On network representations of antennas inside resonating environments

    Directory of Open Access Journals (Sweden)

    F. Gronwald

    2007-06-01

    Full Text Available We discuss network representations of dipole antennas within electromagnetic cavities. It is pointed out that for a given configuration these representations are not unique. For an efficient evaluation a network representation should be chosen such that it involves as few network elements as possible. The field theoretical analogue of this circumstance is the possibility to express electromagnetic cavities' Green's functions by representations which exhibit different convergence properties. An explicit example of a dipole antenna within a rectangular cavity clarifies the corresponding interrelation between network theory and electromagnetic field theory. As an application, current spectra are calculated for the case that the antenna is nonlinearly loaded and subject to a two-tone excitation.

  10. Wireless Sensor Network-Based Greenhouse Environment Monitoring and Automatic Control System for Dew Condensation Prevention

    Science.gov (United States)

    Park, Dae-Heon; Park, Jang-Woo

    2011-01-01

    Dew condensation on the leaf surface of greenhouse crops can promote diseases caused by fungus and bacteria, affecting the growth of the crops. In this paper, we present a WSN (Wireless Sensor Network)-based automatic monitoring system to prevent dew condensation in a greenhouse environment. The system is composed of sensor nodes for collecting data, base nodes for processing collected data, relay nodes for driving devices for adjusting the environment inside greenhouse and an environment server for data storage and processing. Using the Barenbrug formula for calculating the dew point on the leaves, this system is realized to prevent dew condensation phenomena on the crop’s surface acting as an important element for prevention of diseases infections. We also constructed a physical model resembling the typical greenhouse in order to verify the performance of our system with regard to dew condensation control. PMID:22163813

  11. Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Su, Chunhua

    2017-01-01

    many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend...... against insider attacks through implementing proper trustbased mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian......-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become...

  12. An Environment IoT Sensor Network for Monitoring the Environment

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Bragg, O.; Black, A.; Bader, S.; Basford, P. J.; Bragg, G. M.; Fabre, A.

    2016-12-01

    The Internet of Things is a term which has emerged to describe the increase of Internet connectivity of everyday objects. While wireless sensor networks have developed highly energy efficient designs they need a step-change in their interoperability and usability to become more commonly used in Earth Science. IoT techniques can bring many of these advances while reusing some of the technologies developed for low power sensing. Here we concentrate on developing effective use of internet protocols throughout a low power sensor network. This includes 6LowPAN to provide a mesh IPv6 network, 40mW 868 MHz CC1120 radio transceivers to save power but provide kilometre range, a CC2538 ARM® Cortex®-M3 as main processor and CoAP to provide a binary HTTP-like interface to the nodes. We discuss in detail a system we deployed to monitor periglacial, peat and fluvial processes in the Scottish Highlands. The system linked initial nodes 3km away further up the mountain 2km away and used a CoAP GET sequence from a base station in the valley to gather the data. The IPv6 addressing and tunnelling allowed direct connectivity to desktops in Southampton. This provides insights into how the combination of low power techniques and emerging internet standards will bring advantages in interoperability, heterogeneity, usability and maintainability.

  13. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  14. Fuzzy production planning models for an unreliable production system with fuzzy production rate and stochastic/fuzzy demand rate

    Directory of Open Access Journals (Sweden)

    K. A. Halim

    2011-01-01

    Full Text Available In this article, we consider a single-unit unreliable production system which produces a single item. During a production run, the production process may shift from the in-control state to the out-of-control state at any random time when it produces some defective items. The defective item production rate is assumed to be imprecise and is characterized by a trapezoidal fuzzy number. The production rate is proportional to the demand rate where the proportionality constant is taken to be a fuzzy number. Two production planning models are developed on the basis of fuzzy and stochastic demand patterns. The expected cost per unit time in the fuzzy sense is derived in each model and defuzzified by using the graded mean integration representation method. Numerical examples are provided to illustrate the optimal results of the proposed fuzzy models.

  15. Semantic integration to identify overlapping functional modules in protein interaction networks

    Directory of Open Access Journals (Sweden)

    Ramanathan Murali

    2007-07-01

    Full Text Available Abstract Background The systematic analysis of protein-protein interactions can enable a better understanding of cellular organization, processes and functions. Functional modules can be identified from the protein interaction networks derived from experimental data sets. However, these analyses are challenging because of the presence of unreliable interactions and the complex connectivity of the network. The integration of protein-protein interactions with the data from other sources can be leveraged for improving the effectiveness of functional module detection algorithms. Results We have developed novel metrics, called semantic similarity and semantic interactivity, which use Gene Ontology (GO annotations to measure the reliability of protein-protein interactions. The protein interaction networks can be converted into a weighted graph representation by assigning the reliability values to each interaction as a weight. We presented a flow-based modularization algorithm to efficiently identify overlapping modules in the weighted interaction networks. The experimental results show that the semantic similarity and semantic interactivity of interacting pairs were positively correlated with functional co-occurrence. The effectiveness of the algorithm for identifying modules was evaluated using functional categories from the MIPS database. We demonstrated that our algorithm had higher accuracy compared to other competing approaches. Conclusion The integration of protein interaction networks with GO annotation data and the capability of detecting overlapping modules substantially improve the accuracy of module identification.

  16. Analysis and Design of Complex Network Environments

    Science.gov (United States)

    2012-03-01

    and J. Lowe, “The myths and facts behind cyber security risks for industrial control systems ,” in the Proceedings of the VDE Kongress, VDE Congress...questions about 1) how to model them, 2) the design of experiments necessary to discover their structure (and thus adapt system inputs to optimize the...theoretical work that clarifies fundamental limitations of complex networks with network engineering and systems biology to implement specific designs and

  17. Artificial neural networks contribution to the operational security of embedded systems. Artificial neural networks contribution to fault tolerance of on-board functions in space environment

    International Nuclear Information System (INIS)

    Vintenat, Lionel

    1999-01-01

    A good quality often attributed to artificial neural networks is fault tolerance. In general presentation works, this property is almost always introduced as 'natural', i.e. being obtained without any specific precaution during learning. Besides, space environment is known to be aggressive towards on-board hardware, inducing various abnormal operations. Particularly, digital components suffer from upset phenomenon, i.e. misplaced switches of memory flip-flops. These two observations lead to the question: would neural chips constitute an interesting and robust solution to implement some board functions of spacecrafts? First, the various aspects of the problem are detailed: artificial neural networks and their fault tolerance, neural chips, space environment and resulting failures. Further to this presentation, a particular technique to carry out neural chips is selected because of its simplicity, and especially because it requires few memory flip-flops: random pulse streams. An original method for star recognition inside a field-of-view is then proposed for the board function 'attitude computation'. This method relies on a winner-takes-all competition network, and on a Kohonen self-organized map. An hardware implementation of those two neural models is then proposed using random pulse streams. Thanks to this realization, on one hand difficulties related to that particular implementation technique can be highlighted, and on the other hand a first evaluation of its practical fault tolerance can be carried out. (author) [fr

  18. Social Support Networks and HIV/STI Risk Behaviors Among Latino Immigrants in a New Receiving Environment.

    Science.gov (United States)

    Althoff, Meghan D; Theall, Katherine; Schmidt, Norine; Hembling, John; Gebrekristos, Hirut T; Thompson, Michelle M; Muth, Stephen Q; Friedman, Samuel R; Kissinger, Patricia

    2017-12-01

    The objectives of this study were to: (1) describe the quantity and quality of social support networks of Latino immigrants living in a new receiving environment, and (2) determine the role such networks play in their HIV/STI risk behaviors, including substance use. Double incentivized convenience sampling was used to collect egocentric social support network data on 144 Latino immigrants. Latent class analysis was used for data reduction and to identify items best suited to measure quality and quantity of social support. Moderate and high quantity and quality of social support were protective of HIV/STI sexual risk behavior compared to low quantity and quality of support, after adjustment for gender, years in New Orleans and residing with family. Neither measure of social support was associated with binge drinking. The findings suggest that increased quantity and quality of social support decrease HIV/STI sexual risk behaviors but do not influence binge drinking. Interventions that improve the quantity and quality of social support are needed for Latino immigrants.

  19. An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zichuan Xu

    2010-10-01

    Full Text Available A high degree of reliability for critical data transmission is required in body sensor networks (BSNs. However, BSNs are usually vulnerable to channel impairments due to body fading effect and RF interference, which may potentially cause data transmission to be unreliable. In this paper, an adaptive and flexible fault-tolerant communication scheme for BSNs, namely AFTCS, is proposed. AFTCS adopts a channel bandwidth reservation strategy to provide reliable data transmission when channel impairments occur. In order to fulfill the reliability requirements of critical sensors, fault-tolerant priority and queue are employed to adaptively adjust the channel bandwidth allocation. Simulation results show that AFTCS can alleviate the effect of channel impairments, while yielding lower packet loss rate and latency for critical sensors at runtime.

  20. A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack

    Directory of Open Access Journals (Sweden)

    Ramanpreet Kaur

    2016-01-01

    Full Text Available The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave, and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. One attack to compromise the service availability in overlay network is intentional churn (join/leave attack, where a large number of malicious users will join and leave the overlay network so frequently that the entire structure collapses and becomes unavailable. The focus of this paper is to provide a new robust, efficient, and scalable hierarchical overlay architecture that will counter these attacks by providing a structure that can accommodate the fleeting behaviour of nodes without causing much structural inconsistencies. The performance evaluation showed that the proposed architecture has more failure resilience and self-organization as compared to chord based architecture. Experimental results have demonstrated that the effect of failures on an overlay is proportional to the size of failure.

  1. DLTAP: A Network-efficient Scheduling Method for Distributed Deep Learning Workload in Containerized Cluster Environment

    OpenAIRE

    Qiao Wei; Li Ying; Wu Zhong-Hai

    2017-01-01

    Deep neural networks (DNNs) have recently yielded strong results on a range of applications. Training these DNNs using a cluster of commodity machines is a promising approach since training is time consuming and compute-intensive. Furthermore, putting DNN tasks into containers of clusters would enable broader and easier deployment of DNN-based algorithms. Toward this end, this paper addresses the problem of scheduling DNN tasks in the containerized cluster environment. Efficiently scheduling ...

  2. Analysis of Network Parameters Influencing Performance of Hybrid Multimedia Networks

    Directory of Open Access Journals (Sweden)

    Dominik Kovac

    2013-10-01

    Full Text Available Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP calls or file transfers. Such a heterogeneous system has to be able satisfy all network and end-user requirements which are increasing constantly. Therefore the simulation tools enabling deep analysis in order to find the key performance indicators and factors which influence the overall quality for specific network service the most are highly needed. This paper provides a study on the network parameters like communication technology, routing protocol, QoS mechanism, etc. and their effect on the performance of hybrid multimedia network. The analysis was performed in OPNET Modeler environment and the most interesting results are discussed at the end of this paper

  3. Spatial-Temporal Data Collection with Compressive Sensing in Mobile Sensor Networks.

    Science.gov (United States)

    Zheng, Haifeng; Li, Jiayin; Feng, Xinxin; Guo, Wenzhong; Chen, Zhonghui; Xiong, Neal

    2017-11-08

    Compressive sensing (CS) provides an energy-efficient paradigm for data gathering in wireless sensor networks (WSNs). However, the existing work on spatial-temporal data gathering using compressive sensing only considers either multi-hop relaying based or multiple random walks based approaches. In this paper, we exploit the mobility pattern for spatial-temporal data collection and propose a novel mobile data gathering scheme by employing the Metropolis-Hastings algorithm with delayed acceptance, an improved random walk algorithm for a mobile collector to collect data from a sensing field. The proposed scheme exploits Kronecker compressive sensing (KCS) for spatial-temporal correlation of sensory data by allowing the mobile collector to gather temporal compressive measurements from a small subset of randomly selected nodes along a random routing path. More importantly, from the theoretical perspective we prove that the equivalent sensing matrix constructed from the proposed scheme for spatial-temporal compressible signal can satisfy the property of KCS models. The simulation results demonstrate that the proposed scheme can not only significantly reduce communication cost but also improve recovery accuracy for mobile data gathering compared to the other existing schemes. In particular, we also show that the proposed scheme is robust in unreliable wireless environment under various packet losses. All this indicates that the proposed scheme can be an efficient alternative for data gathering application in WSNs .

  4. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  5. Case matching and the reduction of selection bias in quasi-experiments: The relative importance of pretest measures of outcome, of unreliable measurement, and of mode of data analysis.

    Science.gov (United States)

    Cook, Thomas D; Steiner, Peter M

    2010-03-01

    In this article, we note the many ontological, epistemological, and methodological similarities between how Campbell and Rubin conceptualize causation. We then explore 3 differences in their written emphases about individual case matching in observational studies. We contend that (a) Campbell places greater emphasis than Rubin on the special role of pretest measures of outcome among matching variables; (b) Campbell is more explicitly concerned with unreliability in the covariates; and (c) for analyzing the outcome, only Rubin emphasizes the advantages of using propensity score over regression methods. To explore how well these 3 factors reduce bias, we reanalyze and review within-study comparisons that contrast experimental and statistically adjusted nonexperimental causal estimates from studies with the same target population and treatment content. In this context, the choice of covariates counts most for reducing selection bias, and the pretest usually plays a special role relative to all the other covariates considered singly. Unreliability in the covariates also influences bias reduction but by less. Furthermore, propensity score and regression methods produce comparable degrees of bias reduction, though these within-study comparisons may not have met the theoretically specified conditions most likely to produce differences due to analytic method.

  6. Program Helps Simulate Neural Networks

    Science.gov (United States)

    Villarreal, James; Mcintire, Gary

    1993-01-01

    Neural Network Environment on Transputer System (NNETS) computer program provides users high degree of flexibility in creating and manipulating wide variety of neural-network topologies at processing speeds not found in conventional computing environments. Supports back-propagation and back-propagation-related algorithms. Back-propagation algorithm used is implementation of Rumelhart's generalized delta rule. NNETS developed on INMOS Transputer(R). Predefines back-propagation network, Jordan network, and reinforcement network to assist users in learning and defining own networks. Also enables users to configure other neural-network paradigms from NNETS basic architecture. Small portion of software written in OCCAM(R) language.

  7. Distributed optimization-based control of multi-agent networks in complex environments

    CERN Document Server

    Zhu, Minghui

    2015-01-01

    This book offers a concise and in-depth exposition of specific algorithmic solutions for distributed optimization based control of multi-agent networks and their performance analysis. It synthesizes and analyzes distributed strategies for three collaborative tasks: distributed cooperative optimization, mobile sensor deployment and multi-vehicle formation control. The book integrates miscellaneous ideas and tools from dynamic systems, control theory, graph theory, optimization, game theory and Markov chains to address the particular challenges introduced by such complexities in the environment as topological dynamics, environmental uncertainties, and potential cyber-attack by human adversaries. The book is written for first- or second-year graduate students in a variety of engineering disciplines, including control, robotics, decision-making, optimization and algorithms and with backgrounds in aerospace engineering, computer science, electrical engineering, mechanical engineering and operations research. Resea...

  8. Assessing Ambiguity of Context Data in Intelligent Environments: Towards a More Reliable Context Managing System

    Directory of Open Access Journals (Sweden)

    Diego López-de-Ipiña

    2012-04-01

    Full Text Available Modeling and managing correctly the user context in Smart Environments is important to achieve robust and reliable systems. When modeling reality we must take into account its ambiguous nature. Considering the uncertainty and vagueness in context data information it is possible to attain a more precise picture of the environment, thus leading to a more accurate inference process. To achieve these goals we present an ontology that models the ambiguity in intelligent environments and a data fusion and inference process that takes advantage of that extra information to provide better results. Our system can assess the certainty of the captured measurements, discarding the unreliable ones and combining the rest into a unified vision of the current user context. It also models the vagueness of the system, combining it with the uncertainty to obtain a richer inference process.

  9. Crowdsourcing the nodulation gene network discovery environment.

    Science.gov (United States)

    Li, Yupeng; Jackson, Scott A

    2016-05-26

    The Legumes (Fabaceae) are an economically and ecologically important group of plant species with the conspicuous capacity for symbiotic nitrogen fixation in root nodules, specialized plant organs containing symbiotic microbes. With the aim of understanding the underlying molecular mechanisms leading to nodulation, many efforts are underway to identify nodulation-related genes and determine how these genes interact with each other. In order to accurately and efficiently reconstruct nodulation gene network, a crowdsourcing platform, CrowdNodNet, was created. The platform implements the jQuery and vis.js JavaScript libraries, so that users are able to interactively visualize and edit the gene network, and easily access the information about the network, e.g. gene lists, gene interactions and gene functional annotations. In addition, all the gene information is written on MediaWiki pages, enabling users to edit and contribute to the network curation. Utilizing the continuously updated, collaboratively written, and community-reviewed Wikipedia model, the platform could, in a short time, become a comprehensive knowledge base of nodulation-related pathways. The platform could also be used for other biological processes, and thus has great potential for integrating and advancing our understanding of the functional genomics and systems biology of any process for any species. The platform is available at http://crowd.bioops.info/ , and the source code can be openly accessed at https://github.com/bioops/crowdnodnet under MIT License.

  10. Empirical Bayes conditional independence graphs for regulatory network recovery

    Science.gov (United States)

    Mahdi, Rami; Madduri, Abishek S.; Wang, Guoqing; Strulovici-Barel, Yael; Salit, Jacqueline; Hackett, Neil R.; Crystal, Ronald G.; Mezey, Jason G.

    2012-01-01

    Motivation: Computational inference methods that make use of graphical models to extract regulatory networks from gene expression data can have difficulty reconstructing dense regions of a network, a consequence of both computational complexity and unreliable parameter estimation when sample size is small. As a result, identification of hub genes is of special difficulty for these methods. Methods: We present a new algorithm, Empirical Light Mutual Min (ELMM), for large network reconstruction that has properties well suited for recovery of graphs with high-degree nodes. ELMM reconstructs the undirected graph of a regulatory network using empirical Bayes conditional independence testing with a heuristic relaxation of independence constraints in dense areas of the graph. This relaxation allows only one gene of a pair with a putative relation to be aware of the network connection, an approach that is aimed at easing multiple testing problems associated with recovering densely connected structures. Results: Using in silico data, we show that ELMM has better performance than commonly used network inference algorithms including GeneNet, ARACNE, FOCI, GENIE3 and GLASSO. We also apply ELMM to reconstruct a network among 5492 genes expressed in human lung airway epithelium of healthy non-smokers, healthy smokers and individuals with chronic obstructive pulmonary disease assayed using microarrays. The analysis identifies dense sub-networks that are consistent with known regulatory relationships in the lung airway and also suggests novel hub regulatory relationships among a number of genes that play roles in oxidative stress and secretion. Availability and implementation: Software for running ELMM is made available at http://mezeylab.cb.bscb.cornell.edu/Software.aspx. Contact: ramimahdi@yahoo.com or jgm45@cornell.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:22685074

  11. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  12. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  13. Associative memory for online learning in noisy environments using self-organizing incremental neural network.

    Science.gov (United States)

    Sudo, Akihito; Sato, Akihiro; Hasegawa, Osamu

    2009-06-01

    Associative memory operating in a real environment must perform well in online incremental learning and be robust to noisy data because noisy associative patterns are presented sequentially in a real environment. We propose a novel associative memory that satisfies these requirements. Using the proposed method, new associative pairs that are presented sequentially can be learned accurately without forgetting previously learned patterns. The memory size of the proposed method increases adaptively with learning patterns. Therefore, it suffers neither redundancy nor insufficiency of memory size, even in an environment in which the maximum number of associative pairs to be presented is unknown before learning. Noisy inputs in real environments are classifiable into two types: noise-added original patterns and faultily presented random patterns. The proposed method deals with two types of noise. To our knowledge, no conventional associative memory addresses noise of both types. The proposed associative memory performs as a bidirectional one-to-many or many-to-one associative memory and deals not only with bipolar data, but also with real-valued data. Results demonstrate that the proposed method's features are important for application to an intelligent robot operating in a real environment. The originality of our work consists of two points: employing a growing self-organizing network for an associative memory, and discussing what features are necessary for an associative memory for an intelligent robot and proposing an associative memory that satisfies those requirements.

  14. An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Jinhuan; Long, Jun

    2017-06-12

    Wireless sensor networks (WSNs) are one of the important supporting technologies of edge computing. In WSNs, reliable communications are essential for most applications due to the unreliability of wireless links. In addition, network lifetime is also an important performance metric and needs to be considered in many WSN studies. In the paper, an energy-aware hybrid Automatic Repeat-reQuest protocol (ARQ) scheme is proposed to ensure energy efficiency under the guarantee of network transmission reliability. In the scheme, the source node sends data packets continuously with the correct window size and it does not need to wait for the acknowledgement (ACK) confirmation for each data packet. When the destination receives K data packets, it will return multiple copies of one ACK for confirmation to avoid ACK packet loss. The energy consumption of each node in flat circle network applying the proposed scheme is statistical analyzed and the cases under which it is more energy efficiency than the original scheme is discussed. Moreover, how to select parameters of the scheme is addressed to extend the network lifetime under the constraint of the network reliability. In addition, the energy efficiency of the proposed schemes is evaluated. Simulation results are presented to demonstrate that a node energy consumption reduction could be gained and the network lifetime is prolonged.

  15. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    Directory of Open Access Journals (Sweden)

    Seung-Man Chun

    2017-01-01

    Full Text Available Under unreliable constrained wireless networks for Internet of Things (IoT environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6 and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF Constrained Application Protocol (CoAP retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  16. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    Science.gov (United States)

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  17. Car-to-Pedestrian Communication Safety System Based on the Vehicular Ad-Hoc Network Environment: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Peng Jing

    2017-10-01

    Full Text Available With the unparalleled growth of motor vehicles, traffic accident between pedestrians and vehicles is one of the most serious issues in the word-wild. Plenty of injuries and fatalities are caused by the traffic accidents and crashes. The connected vehicular ad hoc network as an emerging approach which has the potential to reduce and even avoid accidents have been focused on by many researchers. A large number of car-to-pedestrian communication safety systems based on the vehicular ad hoc network are researching and developing. However, to our limited knowledge, a systematic review about the car-to-pedestrian communication safety system based on the vehicular ad-hoc network has not be written. The purpose and goal of this review is to systematically evaluate and access the reliability of car-to-pedestrian communication safety system based on the vehicular ad-hoc network environment and provide some recommendations for the future works according to throwing some light on the previous literatures. A quality evaluation was developed through established items and instruments tailored to this review. Future works are needed to focus on developing a valid as well as effective communication safety system based on the vehicular ad hoc network to protect the vulnerable road users.

  18. ATM Tactical Network - a challenge for the military networks

    NARCIS (Netherlands)

    Waveren, C.J. van; Luiijf, H.A.M.; Burakowski, W.; Kopertowski, Z.

    1997-01-01

    The next generation of tactical networks will be based on the ATM technology. The POST-2000 tactical network is just in the designing phase. The objective of this paper is to point out the main problems which should be solved to adopt ATM technology into the tactical network environment. The

  19. Investigation of the network delay on Profibus-DP based network

    OpenAIRE

    Yılmaz, C.; Gürdal, O.; Sayan, H.H.

    2008-01-01

    The mathematical model of the network-induced delay control systems (NDCS) is given. Also the role of the NDCS’s components such as controller, sensor and network environment on the network-induced delay are included in the mathematical model of the system. The network delay is investigated on Profibus-DP based network application and experimental results obtained are presented graphically. The experimental results obtained show that the network induced delay is randomly changed according to ...

  20. Software/hardware distributed processing network supporting the Ada environment

    Science.gov (United States)

    Wood, Richard J.; Pryk, Zen

    1993-09-01

    A high-performance, fault-tolerant, distributed network has been developed, tested, and demonstrated. The network is based on the MIPS Computer Systems, Inc. R3000 Risc for processing, VHSIC ASICs for high speed, reliable, inter-node communications and compatible commercial memory and I/O boards. The network is an evolution of the Advanced Onboard Signal Processor (AOSP) architecture. It supports Ada application software with an Ada- implemented operating system. A six-node implementation (capable of expansion up to 256 nodes) of the RISC multiprocessor architecture provides 120 MIPS of scalar throughput, 96 Mbytes of RAM and 24 Mbytes of non-volatile memory. The network provides for all ground processing applications, has merit for space-qualified RISC-based network, and interfaces to advanced Computer Aided Software Engineering (CASE) tools for application software development.

  1. Optimal Dispatch of Unreliable Electric Grid-Connected Diesel Generator-Battery Power Systems

    Science.gov (United States)

    Xu, D.; Kang, L.

    2015-06-01

    Diesel generator (DG)-battery power systems are often adopted by telecom operators, especially in semi-urban and rural areas of developing countries. Unreliable electric grids (UEG), which have frequent and lengthy outages, are peculiar to these regions. DG-UEG-battery power system is an important kind of hybrid power system. System dispatch is one of the key factors to hybrid power system integration. In this paper, the system dispatch of a DG-UEG-lead acid battery power system is studied with the UEG of relatively ample electricity in Central African Republic (CAR) and UEG of poor electricity in Congo Republic (CR). The mathematical models of the power system and the UEG are studied for completing the system operation simulation program. The net present cost (NPC) of the power system is the main evaluation index. The state of charge (SOC) set points and battery bank charging current are the optimization variables. For the UEG in CAR, the optimal dispatch solution is SOC start and stop points 0.4 and 0.5 that belong to the Micro-Cycling strategy and charging current 0.1 C. For the UEG in CR, the optimal dispatch solution is of 0.1 and 0.8 that belongs to the Cycle-Charging strategy and 0.1 C. Charging current 0.1 C is suitable for both grid scenarios compared to 0.2 C. It makes the dispatch strategy design easier in commercial practices that there are a few very good candidate dispatch solutions with system NPC values close to that of the optimal solution for both UEG scenarios in CAR and CR.

  2. Did Your Mailed Ballot Count: The Unrecognized Unreliability of Voting By Mail

    Directory of Open Access Journals (Sweden)

    Alec Yasinsac

    2012-10-01

    Full Text Available Voting By Mail (VBM was developed to support absentee voters. It was originally intended to handle canonical absentee voters who now fall under the Uniformed and Overseas Citizens Voting Act (UOCAVA and those with legally acceptable reasons for being unable to appear at the polls on Election Day. Its use slowly expanded to more casual justifications, such as those with planned Election Day travel. More recently, there has been a trend of further expansion to on-demand VBM in many states. As a result, the percentage of VBM ballots has skyrocketed, with little research regarding its impacts on security, privacy, reliability, and accuracy on U. S. elections. In virtually every close election, the outcome must await tabulation of VBM ballots. Yet, VBM may be the least reliable voting approach in wide spread use today. Vote By Mail fraud is recognized by some as possibly the single greatest security vulnerability in U. S. elections. The lack of in-person, at-the-polls accountability makes absentee ballots the tool of choice for those inclined to commit fraud," the Florida Department of Law Enforcement concluded in 1998, after a mayoral election in Miami was thrown out when officials learned that "vote brokers" had signed hundreds of phony absentee ballots.1 Conversely, others recognize theoretical weaknesses in VBM, but generally dismiss its practical impact [1, 2]. Others continue to promote VBM expansion [3, 4]. In this paper, we identify inherent, widespread vulnerability in VBM systems and illustrate their practical impact with numerous examples. We show specifically why VBM systems are not auditable and demonstrate how their unreliability can negatively impact real elections.

  3. Evaluation of wireless Local Area Networks

    Science.gov (United States)

    McBee, Charles L.

    1993-09-01

    This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.

  4. Teaching Network Security in a Virtual Learning Environment

    Science.gov (United States)

    Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik

    2004-01-01

    This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…

  5. Dry Ports-Seaports Sustainable Logistics Network Optimization: Considering the Environment Constraints and the Concession Cooperation Relationships

    Directory of Open Access Journals (Sweden)

    Wei Hairui

    2017-11-01

    Full Text Available In China dry ports enter into a rapid development period now, however for many Chinese dry ports, the operation faces difficulties duo to inefficient logistics networks and cooperation relationship between dry ports and seaports. Focusing on the concession cooperation mechanism of seaports and dry ports, and the environmental constraints (carbon emissions and congestion cost, a bi-objective location-allocation MILP model for the sustainable hinterland-dry ports-seaports logistics network optimization is formulated, aiming at the system logistics costs and carbon emissions to be minimized. Moreover, for the cooperation mechanism of seaports to dry ports, a parameter called cooperation cost concession coefficient is proposed for the optimization model, and a new evaluation method based on the ordered weighted averaging (OWA operator is used to evaluate it. Then a location-allocation decision-making framework for the hinterland-dry port-seaport logistics network is proposed. The innovative aspect of the model is that it can proposes a effective and environment friendly dry ports location strategic and also give insights into the connective cooperation relationships, and cargo flows of the network. A case study involving configuration of dry ports in Henan Province is conducted, and the model is successfully applied.

  6. Ada Run Time Support Environments and a common APSE Interface Set. [Ada Programming Support Environment

    Science.gov (United States)

    Mckay, C. W.; Bown, R. L.

    1985-01-01

    The paper discusses the importance of linking Ada Run Time Support Environments to the Common Ada Programming Support Environment (APSE) Interface Set (CAIS). A non-stop network operating systems scenario is presented to serve as a forum for identifying the important issues. The network operating system exemplifies the issues involved in the NASA Space Station data management system.

  7. An Improved Model for Headway-Based Bus Service Unreliability Prevention with Vehicle Load Capacity Constraint at Bus Stops

    Directory of Open Access Journals (Sweden)

    Weiya Chen

    2012-01-01

    Full Text Available This paper presents an improved model for improving headway-based bus route service reliability at bus stops using real-time preventive operation control, taking into account dynamic interaction among random passenger demand, stochastic driving conditions of route segments, and vehicle load capacity constraint. In this model, the real-time information of passenger demand and vehicle operation is involved to predict the imminent unacceptable headway deviation, in the case of which some in-time preventive control strategies are deployed according to the given control rules. As a case study, a single fixed bus route with high-frequency services was simulated and different scenarios of real-time preventive operation control were performed. Headway adherence and average passenger wait time were used to measure bus service reliability. The results show that the improved model is closer to the real bus route service, and using real-time information to predict potential service unreliability and trigger in-time preventive control can reduce bus bunching and avoid big gap.

  8. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  9. Use of the Remote Access Virtual Environment Network (RAVEN) for coordinated IVA-EVA astronaut training and evaluation.

    Science.gov (United States)

    Cater, J P; Huffman, S D

    1995-01-01

    This paper presents a unique virtual reality training and assessment tool developed under a NASA grant, "Research in Human Factors Aspects of Enhanced Virtual Environments for Extravehicular Activity (EVA) Training and Simulation." The Remote Access Virtual Environment Network (RAVEN) was created to train and evaluate the verbal, mental and physical coordination required between the intravehicular (IVA) astronaut operating the Remote Manipulator System (RMS) arm and the EVA astronaut standing in foot restraints on the end of the RMS. The RAVEN system currently allows the EVA astronaut to approach the Hubble Space Telescope (HST) under control of the IVA astronaut and grasp, remove, and replace the Wide Field Planetary Camera drawer from its location in the HST. Two viewpoints, one stereoscopic and one monoscopic, were created all linked by Ethernet, that provided the two trainees with the appropriate training environments.

  10. Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation

    Science.gov (United States)

    2015-06-01

    virtualized environment. First, we automatically build topological ground truth according to various network generation models and create emulated Cisco ...to various network generation models and create emulated Cisco router networks by leveraging and modifying existing emulation software. We then au... markets , to verifying compliance with policy, as in recent “network neutrality” rules established in the United States. The Internet is a network of

  11. An Analysis of the Network Selection Problem for Heterogeneous Environments with User-Operator Joint Satisfaction and Multi-RAT Transmission

    Directory of Open Access Journals (Sweden)

    J. J. Escudero-Garzás

    2017-01-01

    Full Text Available The trend in wireless networks is that several wireless radio access technologies (RATs coexist in the same area, forming heterogeneous networks in which the users may connect to any of the available RATs. The problem of associating a user to the most suitable RAT, known as network selection problem (NSP, is of capital importance for the satisfaction of the users in these emerging environments. However, also the satisfaction of the operator is important in this scenario. In this work, we propose that a connection may be served by more than one RAT by using multi-RAT terminals. We formulate the NSP with multiple RAT association based on utility functions that take into consideration both user’s satisfaction and provider’s satisfaction. As users are characterized according to their expected quality of service, our results exhaustively analyze the influence of the user’s profile, along with the network topology and the type of applications served.

  12. The influence of management and environment on local health department organizational structure and adaptation: a longitudinal network analysis.

    Science.gov (United States)

    Keeling, Jonathan W; Pryde, Julie A; Merrill, Jacqueline A

    2013-01-01

    The nation's 2862 local health departments (LHDs) are the primary means for assuring public health services for all populations. The objective of this study is to assess the effect of organizational network analysis on management decisions in LHDs and to demonstrate the technique's ability to detect organizational adaptation over time. We conducted a longitudinal network analysis in a full-service LHD with 113 employees serving about 187,000 persons. Network survey data were collected from employees at 3 times: months 0, 8, and 34. At time 1 the initial analysis was presented to LHD managers as an intervention with information on evidence-based management strategies to address the findings. At times 2 and 3 interviews documented managers' decision making and events in the task environment. Response rates for the 3 network analyses were 90%, 97%, and 83%. Postintervention (time 2) results showed beneficial changes in network measures of communication and integration. Screening and case identification increased for chlamydia and for gonorrhea. Outbreak mitigation was accelerated by cross-divisional teaming. Network measurements at time 3 showed LHD adaptation to H1N1 and budget constraints with increased centralization. Task redundancy increased dramatically after National Incident Management System training. Organizational network analysis supports LHD management with empirical evidence that can be translated into strategic decisions about communication, allocation of resources, and addressing knowledge gaps. Specific population health outcomes were traced directly to management decisions based on network evidence. The technique can help managers improve how LHDs function as organizations and contribute to our understanding of public health systems.

  13. Challenges of Health Games in the Social Network Environment.

    Science.gov (United States)

    Paredes, Hugo; Pinho, Anabela; Zagalo, Nelson

    2012-04-01

    Virtual communities and their benefits have been widely exploited to support patients, caregivers, families, and healthcare providers. The complexity of the social organization evolved the concept of virtual community to social networks, exploring the establishment of ties and relations between people. These technological platforms provide a way to keep up with one's connections network, through a set of communication and interaction tools. Games, as social interactive technologies, have great potential, ensuring a supportive community and thereby reducing social isolation. Serious social health games bring forward several research challenges. This article examines the potential benefits of the triad "health-serious games-social networks" and discusses some research challenges and opportunities of the liaison of serious health games and social networks.

  14. ComboCoding: Combined intra-/inter-flow network coding for TCP over disruptive MANETs

    Directory of Open Access Journals (Sweden)

    Chien-Chia Chen

    2011-07-01

    Full Text Available TCP over wireless networks is challenging due to random losses and ACK interference. Although network coding schemes have been proposed to improve TCP robustness against extreme random losses, a critical problem still remains of DATA–ACK interference. To address this issue, we use inter-flow coding between DATA and ACK to reduce the number of transmissions among nodes. In addition, we also utilize a “pipeline” random linear coding scheme with adaptive redundancy to overcome high packet loss over unreliable links. The resulting coding scheme, ComboCoding, combines intra-flow and inter-flow coding to provide robust TCP transmission in disruptive wireless networks. The main contributions of our scheme are twofold; the efficient combination of random linear coding and XOR coding on bi-directional streams (DATA and ACK, and the novel redundancy control scheme that adapts to time-varying and space-varying link loss. The adaptive ComboCoding was tested on a variable hop string topology with unstable links and on a multipath MANET with dynamic topology. Simulation results show that TCP with ComboCoding delivers higher throughput than with other coding options in high loss and mobile scenarios, while introducing minimal overhead in normal operation.

  15. "Unreliability as a threat to understanding psychopathology: The cautionary tale of attentional bias": Correction to Rodebaugh et al. (2016).

    Science.gov (United States)

    2016-10-01

    Reports an error in "Unreliability as a threat to understanding psychopathology: The cautionary tale of attentional bias" by Thomas L. Rodebaugh, Rachel B. Scullin, Julia K. Langer, David J. Dixon, Jonathan D. Huppert, Amit Bernstein, Ariel Zvielli and Eric J. Lenze ( Journal of Abnormal Psychology , 2016[Aug], Vol 125[6], 840-851). There was an error in the Author Note concerning the support of the MacBrain Face Stimulus Set. The correct statement is provided. (The following abstract of the original article appeared in record 2016-30117-001.) The use of unreliable measures constitutes a threat to our understanding of psychopathology, because advancement of science using both behavioral and biologically oriented measures can only be certain if such measurements are reliable. Two pillars of the National Institute of Mental Health's portfolio-the Research Domain Criteria (RDoC) initiative for psychopathology and the target engagement initiative in clinical trials-cannot succeed without measures that possess the high reliability necessary for tests involving mediation and selection based on individual differences. We focus on the historical lack of reliability of attentional bias measures as an illustration of how reliability can pose a threat to our understanding. Our own data replicate previous findings of poor reliability for traditionally used scores, which suggests a serious problem with the ability to test theories regarding attentional bias. This lack of reliability may also suggest problems with the assumption (in both theory and the formula for the scores) that attentional bias is consistent and stable across time. In contrast, measures accounting for attention as a dynamic process in time show good reliability in our data. The field is sorely in need of research reporting findings and reliability for attentional bias scores using multiple methods, including those focusing on dynamic processes over time. We urge researchers to test and report reliability of

  16. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  17. Unreliability as a Threat to Understanding Psychopathology: The Cautionary Tale of Attentional Bias

    Science.gov (United States)

    Rodebaugh, Thomas L.; Scullin, Rachel B.; Langer, Julia K.; Dixon, David J.; Huppert, Jonathan D.; Bernstein, Amit; Zvielli, Ariel; Lenze, Eric J.

    2016-01-01

    The use of unreliable measures constitutes a threat to our understanding of psychopathology, because advancement of science using both behavioral and biologically-oriented measures can only be certain if such measurements are reliable. Two pillars of NIMH’s portfolio – the Research Domain Criteria (RDoC) initiative for psychopathology and the target engagement initiative in clinical trials – cannot succeed without measures that possess the high reliability necessary for tests involving mediation and selection based on individual differences. We focus on the historical lack of reliability of attentional bias measures as an illustration of how reliability can pose a threat to our understanding. Our own data replicate previous findings of poor reliability for traditionally-used scores, which suggests a serious problem with the ability to test theories regarding attentional bias. This lack of reliability may also suggest problems with the assumption (in both theory and the formula for the scores) that attentional bias is consistent and stable across time. In contrast, measures accounting for attention as a dynamic process in time show good reliability in our data. The field is sorely in need of research reporting findings and reliability for attentional bias scores using multiple methods, including those focusing on dynamic processes over time. We urge researchers to test and report reliability of all measures, considering findings of low reliability not just as a nuisance but as an opportunity to modify and improve upon the underlying theory. Full assessment of reliability of measures will maximize the possibility that RDoC (and psychological science more generally) will succeed. PMID:27322741

  18. Multimodal processes scheduling in mesh-like network environment

    Directory of Open Access Journals (Sweden)

    Bocewicz Grzegorz

    2015-06-01

    Full Text Available Multimodal processes planning and scheduling play a pivotal role in many different domains including city networks, multimodal transportation systems, computer and telecommunication networks and so on. Multimodal process can be seen as a process partially processed by locally executed cyclic processes. In that context the concept of a Mesh-like Multimodal Transportation Network (MMTN in which several isomorphic subnetworks interact each other via distinguished subsets of common shared intermodal transport interchange facilities (such as a railway station, bus station or bus/tram stop as to provide a variety of demand-responsive passenger transportation services is examined. Consider a mesh-like layout of a passengers transport network equipped with different lines including buses, trams, metro, trains etc. where passenger flows are treated as multimodal processes. The goal is to provide a declarative model enabling to state a constraint satisfaction problem aimed at multimodal transportation processes scheduling encompassing passenger flow itineraries. Then, the main objective is to provide conditions guaranteeing solvability of particular transport lines scheduling, i.e. guaranteeing the right match-up of local cyclic acting bus, tram, metro and train schedules to a given passengers flow itineraries.

  19. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  20. Principals' Perceptions of Social Networking Access, Its Relationship to Cyberbullying, the Importance of Student Achievement, and the School Environment

    Science.gov (United States)

    Townsel, Andrae

    2015-01-01

    The purpose of this study was to examine the principals' perceptions of social networking access and its relationship to cyberbullying, the importance of student achievement, and the school environment across the United States. This research provides some evidence on how principals perceive and understand the threat of cyberbullying and its…

  1. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  2. Scalable Networked Information Processing Environment (SNIPE)

    Energy Technology Data Exchange (ETDEWEB)

    Fagg, G.E.; Moore, K. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science; Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science]|[Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.; Geist, A. [Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.

    1997-11-01

    SNIPE is a metacomputing system that aims to provide a reliable, secure, fault tolerant environment for long term distributed computing applications and data stores across the global Internet. This system combines global naming and replication of both processing and data to support large scale information processing applications leading to better availability and reliability than currently available with typical cluster computing and/or distributed computer environments.

  3. A Novel Petri Nets-Based Modeling Method for the Interaction between the Sensor and the Geographic Environment in Emerging Sensor Networks

    Science.gov (United States)

    Zhang, Feng; Xu, Yuetong; Chou, Jarong

    2016-01-01

    The service of sensor device in Emerging Sensor Networks (ESNs) is the extension of traditional Web services. Through the sensor network, the service of sensor device can communicate directly with the entity in the geographic environment, and even impact the geographic entity directly. The interaction between the sensor device in ESNs and geographic environment is very complex, and the interaction modeling is a challenging problem. This paper proposed a novel Petri Nets-based modeling method for the interaction between the sensor device and the geographic environment. The feature of the sensor device service in ESNs is more easily affected by the geographic environment than the traditional Web service. Therefore, the response time, the fault-tolerant ability and the resource consumption become important factors in the performance of the whole sensor application system. Thus, this paper classified IoT services as Sensing services and Controlling services according to the interaction between IoT service and geographic entity, and classified GIS services as data services and processing services. Then, this paper designed and analyzed service algebra and Colored Petri Nets model to modeling the geo-feature, IoT service, GIS service and the interaction process between the sensor and the geographic enviroment. At last, the modeling process is discussed by examples. PMID:27681730

  4. A Novel Petri Nets-Based Modeling Method for the Interaction between the Sensor and the Geographic Environment in Emerging Sensor Networks

    Directory of Open Access Journals (Sweden)

    Feng Zhang

    2016-09-01

    Full Text Available The service of sensor device in Emerging Sensor Networks (ESNs is the extension of traditional Web services. Through the sensor network, the service of sensor device can communicate directly with the entity in the geographic environment, and even impact the geographic entity directly. The interaction between the sensor device in ESNs and geographic environment is very complex, and the interaction modeling is a challenging problem. This paper proposed a novel Petri Nets-based modeling method for the interaction between the sensor device and the geographic environment. The feature of the sensor device service in ESNs is more easily affected by the geographic environment than the traditional Web service. Therefore, the response time, the fault-tolerant ability and the resource consumption become important factors in the performance of the whole sensor application system. Thus, this paper classified IoT services as Sensing services and Controlling services according to the interaction between IoT service and geographic entity, and classified GIS services as data services and processing services. Then, this paper designed and analyzed service algebra and Colored Petri Nets model to modeling the geo-feature, IoT service, GIS service and the interaction process between the sensor and the geographic enviroment. At last, the modeling process is discussed by examples.

  5. Dynamic Sensor Networks

    National Research Council Canada - National Science Library

    Schott, Brian

    2004-01-01

    ...: Declarative Languages and Execution Environment includes topographical soldier interface and a sensor network simulation environment for algorithm development, deployment planning, and operational support. Finally, Task 3...

  6. Perspectives on Advanced Learning Technologies and Learning Networks and Future Aerospace Workforce Environments

    Science.gov (United States)

    Noor, Ahmed K. (Compiler)

    2003-01-01

    An overview of the advanced learning technologies is given in this presentation along with a brief description of their impact on future aerospace workforce development. The presentation is divided into five parts (see Figure 1). In the first part, a brief historical account of the evolution of learning technologies is given. The second part describes the current learning activities. The third part describes some of the future aerospace systems, as examples of high-tech engineering systems, and lists their enabling technologies. The fourth part focuses on future aerospace research, learning and design environments. The fifth part lists the objectives of the workshop and some of the sources of information on learning technologies and learning networks.

  7. Performance Evaluation of Concurrent Multipath Video Streaming in Multihomed Mobile Networks

    Directory of Open Access Journals (Sweden)

    James Nightingale

    2013-01-01

    Full Text Available High-quality real-time video streaming to users in mobile networks is challenging due to the dynamically changing nature of the network paths, particularly the limited bandwidth and varying end-to-end delay. In this paper, we empirically investigate the performance of multipath streaming in the context of multihomed mobile networks. Existing schemes that make use of the aggregated bandwidth of multiple paths can overcome bandwidth limitations on a single path but suffer an efficiency penalty caused by retransmission of lost packets in reliable transport schemes or path switching overheads in unreliable transport schemes. This work focuses on the evaluation of schemes to permit concurrent use of multiple paths to deliver video streams. A comprehensive streaming framework for concurrent multipath video streaming is proposed and experimentally evaluated, using current state-of-the-art H.264 Scalable Video Coding (H.264/SVC and the next generation High Efficiency Video Coding (HEVC standards. It provides a valuable insight into the benefit of using such schemes in conjunction with encoder specific packet prioritisation mechanisms for quality-aware packet scheduling and scalable streaming. The remaining obstacles to deployment of concurrent multipath schemes are identified, and the challenges in realising HEVC based concurrent multipath streaming are highlighted.

  8. DLTAP: A Network-efficient Scheduling Method for Distributed Deep Learning Workload in Containerized Cluster Environment

    Directory of Open Access Journals (Sweden)

    Qiao Wei

    2017-01-01

    Full Text Available Deep neural networks (DNNs have recently yielded strong results on a range of applications. Training these DNNs using a cluster of commodity machines is a promising approach since training is time consuming and compute-intensive. Furthermore, putting DNN tasks into containers of clusters would enable broader and easier deployment of DNN-based algorithms. Toward this end, this paper addresses the problem of scheduling DNN tasks in the containerized cluster environment. Efficiently scheduling data-parallel computation jobs like DNN over containerized clusters is critical for job performance, system throughput, and resource utilization. It becomes even more challenging with the complex workloads. We propose a scheduling method called Deep Learning Task Allocation Priority (DLTAP which performs scheduling decisions in a distributed manner, and each of scheduling decisions takes aggregation degree of parameter sever task and worker task into account, in particularly, to reduce cross-node network transmission traffic and, correspondingly, decrease the DNN training time. We evaluate the DLTAP scheduling method using a state-of-the-art distributed DNN training framework on 3 benchmarks. The results show that the proposed method can averagely reduce 12% cross-node network traffic, and decrease the DNN training time even with the cluster of low-end servers.

  9. Dispersal networks for enhancing bacterial degradation in heterogeneous environments

    International Nuclear Information System (INIS)

    Banitz, Thomas; Wick, Lukas Y.; Fetzer, Ingo; Frank, Karin; Harms, Hauke; Johst, Karin

    2011-01-01

    Successful biodegradation of organic soil pollutants depends on their bioavailability to catabolically active microorganisms. In particular, environmental heterogeneities often limit bacterial access to pollutants. Experimental and modelling studies revealed that fungal networks can facilitate bacterial dispersal and may thereby improve pollutant bioavailability. Here, we investigate the influence of such bacterial dispersal networks on biodegradation performance under spatially heterogeneous abiotic conditions using a process-based simulation model. To match typical situations in polluted soils, two types of abiotic conditions are studied: heterogeneous bacterial dispersal conditions and heterogeneous initial resource distributions. The model predicts that networks facilitating bacterial dispersal can enhance biodegradation performance for a wide range of these conditions. Additionally, the time horizon over which this performance is assessed and the network's spatial configuration are key factors determining the degree of biodegradation improvement. Our results support the idea of stimulating the establishment of fungal mycelia for enhanced bioremediation of polluted soils. - Highlights: → Bacterial dispersal networks can considerably improve biodegradation performance. → They facilitate bacterial access to dispersal-limited areas and remote resources. → Abiotic conditions, time horizon and network structure govern the improvements. → Stimulating the establishment of fungal mycelia promises enhanced soil remediation. - Simulation modelling demonstrates that fungus-mediated bacterial dispersal can considerably improve the bioavailability of organic pollutants under spatially heterogeneous abiotic conditions typical for water-unsaturated soils.

  10. Dispersal networks for enhancing bacterial degradation in heterogeneous environments

    Energy Technology Data Exchange (ETDEWEB)

    Banitz, Thomas, E-mail: thomas.banitz@ufz.de [Department of Ecological Modelling, UFZ - Helmholtz Centre for Environmental Research, Permoserstr. 15, 04318 Leipzig (Germany); Wick, Lukas Y.; Fetzer, Ingo [Department of Environmental Microbiology, UFZ - Helmholtz Centre for Environmental Research, Permoserstr. 15, 04318 Leipzig (Germany); Frank, Karin [Department of Ecological Modelling, UFZ - Helmholtz Centre for Environmental Research, Permoserstr. 15, 04318 Leipzig (Germany); Harms, Hauke [Department of Environmental Microbiology, UFZ - Helmholtz Centre for Environmental Research, Permoserstr. 15, 04318 Leipzig (Germany); Johst, Karin [Department of Ecological Modelling, UFZ - Helmholtz Centre for Environmental Research, Permoserstr. 15, 04318 Leipzig (Germany)

    2011-10-15

    Successful biodegradation of organic soil pollutants depends on their bioavailability to catabolically active microorganisms. In particular, environmental heterogeneities often limit bacterial access to pollutants. Experimental and modelling studies revealed that fungal networks can facilitate bacterial dispersal and may thereby improve pollutant bioavailability. Here, we investigate the influence of such bacterial dispersal networks on biodegradation performance under spatially heterogeneous abiotic conditions using a process-based simulation model. To match typical situations in polluted soils, two types of abiotic conditions are studied: heterogeneous bacterial dispersal conditions and heterogeneous initial resource distributions. The model predicts that networks facilitating bacterial dispersal can enhance biodegradation performance for a wide range of these conditions. Additionally, the time horizon over which this performance is assessed and the network's spatial configuration are key factors determining the degree of biodegradation improvement. Our results support the idea of stimulating the establishment of fungal mycelia for enhanced bioremediation of polluted soils. - Highlights: > Bacterial dispersal networks can considerably improve biodegradation performance. > They facilitate bacterial access to dispersal-limited areas and remote resources. > Abiotic conditions, time horizon and network structure govern the improvements. > Stimulating the establishment of fungal mycelia promises enhanced soil remediation. - Simulation modelling demonstrates that fungus-mediated bacterial dispersal can considerably improve the bioavailability of organic pollutants under spatially heterogeneous abiotic conditions typical for water-unsaturated soils.

  11. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  12. SCAFFOLDING IN CONNECTIVIST MOBILE LEARNING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Ozlem OZAN

    2013-04-01

    Full Text Available Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: Ø to learn in a networked environment, Ø to manage their networked learning process, Ø to interact in a networked society, and Ø to use the tools belonging to the network society. The researcher described how Vygotsky's “scaffolding” concept, Berge’s “learner support” strategies, and Siemens’ “connectivism” approach can be used together to satisfy mobile learners’ needs. A connectivist mobile learning environment was designed for the research, and the research was executed as a mixed-method study. Data collection tools were Facebook wall entries, personal messages, chat records; Twitter, Diigo, blog entries; emails, mobile learning management system statistics, perceived learning survey and demographic information survey. Results showed that there were four major aspects of scaffolding in connectivist mobile learning environment as type of it, provider of it, and timing of it and strategies of it. Participants preferred mostly social scaffolding, and then preferred respectively, managerial, instructional and technical scaffolding. Social scaffolding was mostly provided by peers, and managerial scaffolding was mostly provided by instructor. Use of mobile devices increased the learner motivation and interest. Some participants stated that learning was more permanent by using mobile technologies. Social networks and mobile technologies made it easier to manage the learning process and expressed a positive impact on perceived learning.

  13. Virtualization in control system environment

    International Nuclear Information System (INIS)

    Shen, L.R.; Liu, D.K.; Wan, T.M.

    2012-01-01

    In large scale distributed control system, there are lots of common service composed an environment for the entire control system, such as the server system for the common software base library, application server, archive server and so on. This paper gives a description of a virtualization realization for control system environment including the virtualization for server, storage, network system and application for the control system. With a virtualization instance of the EPICS based control system environment that was built by the VMware vSphere v4, we tested the whole functionality of this virtualization environment in the SSRF control system, including the common server of the NFS, NIS, NTP, Boot and EPICS base and extension library tools, we also have applied virtualization to application servers such as the Archive, Alarm, EPICS gateway and all of the network based IOC. Specially, we test the high availability and VMotion for EPICS asynchronous IOC successful under the different VLAN configuration of the current SSRF control system network. (authors)

  14. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  15. Local area networking in a radio quiet environment

    Science.gov (United States)

    Childers, Edwin L.; Hunt, Gareth; Brandt, Joseph J.

    2002-11-01

    The Green Bank facility of the National Radio Astronomy Observatory is spread out over 2,700 acres in the Allegheny Mountains of West Virginia. Good communication has always been needed between the radio telescopes and the control buildings. The National Radio Quiet Zone helps protect the Green Bank site from radio transmissions that interfere with the astronomical signals. Due to stringent Radio Frequency Interference (RFI) requirements, a fiber optic communication system was used for Ethernet transmissions on the site and coaxial cable within the buildings. With the need for higher speed communications, the entire network has been upgraded to use optical fiber with modern Ethernet switches. As with most modern equipment, the implementation of the control of the newly deployed Green Bank Telescope (GBT) depends heavily on TCP/IP. In order to protect the GBT from the commodity Internet, the GBT uses a non-routable network. Communication between the control building Local Area Network (LAN) and the GBT is implemented using a Virtual LAN (VLAN). This configuration will be extended to achieve isolation between trusted local user systems, the GBT, and other Internet users. Legitimate access to the site, for example by remote observers, is likely to be implemented using a virtual private network (VPN).

  16. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  17. Low Power Multi-Hop Networking Analysis in Intelligent Environments.

    Science.gov (United States)

    Etxaniz, Josu; Aranguren, Gerardo

    2017-05-19

    Intelligent systems are driven by the latest technological advances in many different areas such as sensing, embedded systems, wireless communications or context recognition. This paper focuses on some of those areas. Concretely, the paper deals with wireless communications issues in embedded systems. More precisely, the paper combines the multi-hop networking with Bluetooth technology and a quality of service (QoS) metric, the latency. Bluetooth is a radio license-free worldwide communication standard that makes low power multi-hop wireless networking available. It establishes piconets (point-to-point and point-to-multipoint links) and scatternets (multi-hop networks). As a result, many Bluetooth nodes can be interconnected to set up ambient intelligent networks. Then, this paper presents the results of the investigation on multi-hop latency with park and sniff Bluetooth low power modes conducted over the hardware test bench previously implemented. In addition, the empirical models to estimate the latency of multi-hop communications over Bluetooth Asynchronous Connectionless Links (ACL) in park and sniff mode are given. The designers of devices and networks for intelligent systems will benefit from the estimation of the latency in Bluetooth multi-hop communications that the models provide.

  18. Reduction of Uncertainty Propagation in the Airport Operations Network

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez Sanz, A.; Gomez Comendador, F.; Arnaldo Valdes, R.

    2016-07-01

    Airport operations are a complex system involving multiple elements (ground access, landside, airside and airspace), stakeholders (ANS providers, airlines, airport managers, policy makers and ground handling companies) and interrelated processes. To ensure appropriate and safe operation it is necessary to understand these complex relationships and how the effects of potential incidents, failures and delays (due to unexpected events or capacity constraints) may propagate throughout the different stages of the system. An incident may easily ripple through the network and affect the operation of the airport as a whole, making the entire system vulnerable. A holistic view of the processes that also takes all of the parties (and the connections between them) into account would significantly reduce the risks associated with airport operations, while at the same time improving efficiency. Therefore, this paper proposes a framework to integrate all relevant stakeholders and reduce uncertainty in delay propagation, thereby lowering the cause-effect chain probability of the airport system (which is crucial for the operation and development of air transport). Firstly, we developed a model (map) to identify the functional relationships and interdependencies between the different stakeholders and processes that make up the airport operations network. This will act as a conceptual framework. Secondly, we reviewed and characterised the main causes of delay. Finally, we extended the system map to create a probabilistic graphical model, using a Bayesian Network approach and influence diagrams, in order to predict the propagation of unexpected delays across the airport operations network. This will enable us to learn how potential incidents may spread throughout the network creating unreliable, uncertain system states. Policy makers, regulators and airport managers may use this conceptual framework (and the associated indicators) to understand how delays propagate across the airport

  19. Mountainous Ecosystem Sensor Array (MESA): a mesh sensor network for climate change research in remote mountainous environments

    Science.gov (United States)

    Robinson, P. W.; Neal, D.; Frome, D.; Kavanagh, K.; Davis, A.; Gessler, P. E.; Hess, H.; Holden, Z. A.; Link, T. E.; Newingham, B. A.; Smith, A. M.

    2013-12-01

    Developing sensor networks robust enough to perform unattended in the world's remote regions is critical since these regions serve as important benchmarks that lack anthropogenic influence. Paradoxically, the factors that make these remote, natural sites challenging for sensor networking are often what make them indispensable for climate change research. The MESA (Mountainous Ecosystem Sensor Array) project has faced these challenges and developed a wireless mesh sensor network across a 660 m topoclimatic gradient in a wilderness area in central Idaho. This sensor array uses advances in sensing, networking, and power supply technologies to provide near real-time synchronized data covering a suite of biophysical parameters used in ecosystem process models. The 76 sensors in the network monitor atmospheric carbon dioxide concentration, humidity, air and soil temperature, soil water content, precipitation, incoming and outgoing shortwave and longwave radiation, snow depth, wind speed and direction, and leaf wetness at synchronized time intervals ranging from two minutes to two hours and spatial scales from a few meters to two kilometers. We present our novel methods of placing sensors and network nodes above, below, and throughout the forest canopy without using meteorological towers. In addition, we explain our decision to use different forms of power (wind and solar) and the equipment we use to control and integrate power harvesting. Further, we describe our use of the network to sense and quantify its own power use. Using examples of environmental data from the project, we discuss how these data may be used to increase our understanding of the effects of climate change on ecosystem processes in mountainous environments. MESA sensor locations across a 700 m topoclimatic gradient at the University of Idaho Taylor Wilderness Research Station.

  20. An Optimal Path Computation Architecture for the Cloud-Network on Software-Defined Networking

    Directory of Open Access Journals (Sweden)

    Hyunhun Cho

    2015-05-01

    Full Text Available Legacy networks do not open the precise information of the network domain because of scalability, management and commercial reasons, and it is very hard to compute an optimal path to the destination. According to today’s ICT environment change, in order to meet the new network requirements, the concept of software-defined networking (SDN has been developed as a technological alternative to overcome the limitations of the legacy network structure and to introduce innovative concepts. The purpose of this paper is to propose the application that calculates the optimal paths for general data transmission and real-time audio/video transmission, which consist of the major services of the National Research & Education Network (NREN in the SDN environment. The proposed SDN routing computation (SRC application is designed and applied in a multi-domain network for the efficient use of resources, selection of the optimal path between the multi-domains and optimal establishment of end-to-end connections.

  1. Validating User Flows to Protect Software Defined Network Environments

    Directory of Open Access Journals (Sweden)

    Ihsan H. Abdulqadder

    2018-01-01

    Full Text Available Software Defined Network is a promising network paradigm which has led to several security threats in SDN applications that involve user flows, switches, and controllers in the network. Threats as spoofing, tampering, information disclosure, Denial of Service, flow table overloading, and so on have been addressed by many researchers. In this paper, we present novel SDN design to solve three security threats: flow table overloading is solved by constructing a star topology-based architecture, unsupervised hashing method mitigates link spoofing attack, and fuzzy classifier combined with L1-ELM running on a neural network for isolating anomaly packets from normal packets. For effective flow migration Discrete-Time Finite-State Markov Chain model is applied. Extensive simulations using OMNeT++ demonstrate the performance of our proposed approach, which is better at preserving holding time than are other state-of-the-art works from the literature.

  2. A Comparative Study on Cooperative Learning in Multimedia and Network Environment Used by English Majors between China Mainland and Taiwan

    Science.gov (United States)

    Xue, Gong; Lingling, Liu

    2018-01-01

    This paper first based on the theory of cooperative learning research. It analyses the characteristics and advantages of cooperative learning under the multimedia network environment. And then take China Three Gorges University and Taiwan I-Shou University English major students for example, using questionnaires and interviews to investigate the…

  3. Source unreliability decreases but does not cancel the impact of social information on metacognitive evaluations.

    Science.gov (United States)

    Jacquot, Amélie; Eskenazi, Terry; Sales-Wuillemin, Edith; Montalan, Benoît; Proust, Joëlle; Grèzes, Julie; Conty, Laurence

    2015-01-01

    Through metacognitive evaluations, individuals assess their own cognitive operations with respect to their current goals. We have previously shown that non-verbal social cues spontaneously influence these evaluations, even when the cues are unreliable. Here, we explore whether a belief about the reliability of the source can modulate this form of social impact. Participants performed a two-alternative forced choice task that varied in difficulty. The task was followed by a video of a person who was presented as being either competent or incompetent at performing the task. That person provided random feedback to the participant through facial expressions indicating agreement, disagreement or uncertainty. Participants then provided a metacognitive evaluation by rating their confidence in their answer. Results revealed that participants' confidence was higher following agreements. Interestingly, this effect was merely reduced but not canceled for the incompetent individual, even though participants were able to perceive the individual's incompetence. Moreover, perceived agreement induced zygomaticus activity, but only when the feedback was provided for difficult trials by the competent individual. This last result strongly suggests that people implicitly appraise the relevance of social feedback with respect to their current goal. Together, our findings suggest that people always integrate social agreement into their metacognitive evaluations, even when epistemic vigilance mechanisms alert them to the risk of being misinformed.

  4. Vacation model for Markov machine repair problem with two heterogeneous unreliable servers and threshold recovery

    Science.gov (United States)

    Jain, Madhu; Meena, Rakesh Kumar

    2018-03-01

    Markov model of multi-component machining system comprising two unreliable heterogeneous servers and mixed type of standby support has been studied. The repair job of broken down machines is done on the basis of bi-level threshold policy for the activation of the servers. The server returns back to render repair job when the pre-specified workload of failed machines is build up. The first (second) repairman turns on only when the work load of N1 (N2) failed machines is accumulated in the system. The both servers may go for vacation in case when all the machines are in good condition and there are no pending repair jobs for the repairmen. Runge-Kutta method is implemented to solve the set of governing equations used to formulate the Markov model. Various system metrics including the mean queue length, machine availability, throughput, etc., are derived to determine the performance of the machining system. To provide the computational tractability of the present investigation, a numerical illustration is provided. A cost function is also constructed to determine the optimal repair rate of the server by minimizing the expected cost incurred on the system. The hybrid soft computing method is considered to develop the adaptive neuro-fuzzy inference system (ANFIS). The validation of the numerical results obtained by Runge-Kutta approach is also facilitated by computational results generated by ANFIS.

  5. Baroreflex dysfunction in sick newborns makes heart rate an unreliable surrogate for blood pressure changes.

    Science.gov (United States)

    Govindan, Rathinaswamy B; Al-Shargabi, Tareq; Massaro, An N; Metzler, Marina; Andescavage, Nickie N; Joshi, Radhika; Dave, Rhiya; du Plessis, Adre

    2016-06-01

    Cerebral pressure passivity (CPP) in sick newborns can be detected by evaluating coupling between mean arterial pressure (MAP) and cerebral blood flow measured by near infra-red spectroscopy hemoglobin difference (HbD). However, continuous MAP monitoring requires invasive catheterization with its inherent risks. We tested whether heart rate (HR) could serve as a reliable surrogate for MAP in the detection of CPP in sick newborns. Continuous measurements of MAP, HR, and HbD were made and partitioned into 10-min epochs. Spectral coherence (COH) was computed between MAP and HbD (COHMAP-HbD) to detect CPP, between HR and HbD (COHHR-HbD) for comparison, and between MAP and HR (COHMAP-HR) to quantify baroreflex function (BRF). The agreement between COHMAP-HbD and COHHR-HbD was assessed using ROC analysis. We found poor agreement between COHMAP-HbD and COHHR-HbD in left hemisphere (area under the ROC curve (AUC) 0.68) and right hemisphere (AUC 0.71). Baroreflex failure (COHMAP-HR not significant) was present in 79% of epochs. Confining comparison to epochs with intact BRF showed an AUC of 0.85 for both hemispheres. In these sick newborns, HR was an unreliable surrogate for MAP required for the detection of CPP. This is likely due to the prevalence of BRF failure in these infants.

  6. Proposed Network Intrusion Detection System ‎Based on Fuzzy c Mean Algorithm in Cloud ‎Computing Environment

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Nowadays cloud computing had become is an integral part of IT industry, cloud computing provides Working environment allow a user of environmental to share data and resources over the internet. Where cloud computing its virtual grouping of resources offered over the internet, this lead to different matters related to the security and privacy in cloud computing. And therefore, create intrusion detection very important to detect outsider and insider intruders of cloud computing with high detection rate and low false positive alarm in the cloud environment. This work proposed network intrusion detection module using fuzzy c mean algorithm. The kdd99 dataset used for experiments .the proposed system characterized by a high detection rate with low false positive alarm

  7. Network Management Services Based On The Openflow Environment

    Directory of Open Access Journals (Sweden)

    Paweł Wilk

    2014-01-01

    Full Text Available The subject of this article is network management through web service calls, which allows software applications to exert an influence on network traffic. In this manner, software can make independent decisions concerning the direction of requests so that they can be served as soon as possible. This is important because only proper cooperation including all architecture layers can ensure the best performance, especially when software that largely depends on computer networks and utilizes them heavily is involved. To demonstrate that the approach described above is feasible and can be useful at the same time, this article presents a switch-level load balancer developed using OpenFlow. Client software communicates with the balancer through REST web service calls, which are used to provide information on current machine load and its ability to serve incoming requests. The result is a cheap, highly customizable and extremely fast load balancer with considerable potential for further development.

  8. Research on a Denial of Service (DoS Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    Seoksoo Kim

    2010-11-01

    Full Text Available This research suggests a Denial of Service (DoS detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed.

  9. Embedded Efficiency: A Social Networks Approach to Popular Support and Dark Network Structure

    Science.gov (United States)

    2016-03-01

    Sean F. Everton, and Dan Cunningham. “Dark Network Resilience in a Hostile Environment: Optimizing Centralization and Density.” Criminology , Criminal...33 Sean F. Everton and Dan Cunningham, “Dark Network Resilience in a Hostile Environment: Optimizing Centralization and Density,” Criminology ...Centralization and Density” Criminology , Criminal Justice Law, & Society 16, no. 1 (2015): 1- 20. Gill, Paul, Jeongyoon Lee, Karl R. Rethemeyer, John

  10. Minimum curvilinearity to enhance topological prediction of protein interactions by network embedding

    KAUST Repository

    Cannistraci, Carlo

    2013-06-21

    Motivation: Most functions within the cell emerge thanks to protein-protein interactions (PPIs), yet experimental determination of PPIs is both expensive and time-consuming. PPI networks present significant levels of noise and incompleteness. Predicting interactions using only PPI-network topology (topological prediction) is difficult but essential when prior biological knowledge is absent or unreliable.Methods: Network embedding emphasizes the relations between network proteins embedded in a low-dimensional space, in which protein pairs that are closer to each other represent good candidate interactions. To achieve network denoising, which boosts prediction performance, we first applied minimum curvilinear embedding (MCE), and then adopted shortest path (SP) in the reduced space to assign likelihood scores to candidate interactions. Furthermore, we introduce (i) a new valid variation of MCE, named non-centred MCE (ncMCE); (ii) two automatic strategies for selecting the appropriate embedding dimension; and (iii) two new randomized procedures for evaluating predictions.Results: We compared our method against several unsupervised and supervisedly tuned embedding approaches and node neighbourhood techniques. Despite its computational simplicity, ncMCE-SP was the overall leader, outperforming the current methods in topological link prediction.Conclusion: Minimum curvilinearity is a valuable non-linear framework that we successfully applied to the embedding of protein networks for the unsupervised prediction of novel PPIs. The rationale for our approach is that biological and evolutionary information is imprinted in the non-linear patterns hidden behind the protein network topology, and can be exploited for predicting new protein links. The predicted PPIs represent good candidates for testing in high-throughput experiments or for exploitation in systems biology tools such as those used for network-based inference and prediction of disease-related functional modules. The

  11. Construction of high-dimensional neural network potentials using environment-dependent atom pairs.

    Science.gov (United States)

    Jose, K V Jovan; Artrith, Nongnuch; Behler, Jörg

    2012-05-21

    An accurate determination of the potential energy is the crucial step in computer simulations of chemical processes, but using electronic structure methods on-the-fly in molecular dynamics (MD) is computationally too demanding for many systems. Constructing more efficient interatomic potentials becomes intricate with increasing dimensionality of the potential-energy surface (PES), and for numerous systems the accuracy that can be achieved is still not satisfying and far from the reliability of first-principles calculations. Feed-forward neural networks (NNs) have a very flexible functional form, and in recent years they have been shown to be an accurate tool to construct efficient PESs. High-dimensional NN potentials based on environment-dependent atomic energy contributions have been presented for a number of materials. Still, these potentials may be improved by a more detailed structural description, e.g., in form of atom pairs, which directly reflect the atomic interactions and take the chemical environment into account. We present an implementation of an NN method based on atom pairs, and its accuracy and performance are compared to the atom-based NN approach using two very different systems, the methanol molecule and metallic copper. We find that both types of NN potentials provide an excellent description of both PESs, with the pair-based method yielding a slightly higher accuracy making it a competitive alternative for addressing complex systems in MD simulations.

  12. Analysis of Cisco Open Network Environment (ONE) OpenFlow Controller Implementation

    Science.gov (United States)

    2014-08-01

    Software - Defined Networking ( SDN ), when fully realized, offer many improvements over the current rigid and...functionalities like handshake, connection setup, switch management, and security. 15. SUBJECT TERMS OpenFlow, software - defined networking , Cisco ONE, SDN ...innovating packet-forwarding technologies. Network device roles are strictly defined with little or no flexibility. In Software - Defined Networks ( SDNs ),

  13. Networking of research information on global environment protection technologies; Chikyu kankyo taisaku gijutsu no kenkyu joho network jigyo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Networking is being executed with an objective of exchanging information on global environment technologies at an international level. In order to further promote the information exchange, and to make web sites user-friendly, fiscal 1998 has performed structuring a thesis renewal system. As a result of structuring the thesis renewal system, researchers can use the system as using a word processor by inputting data from a terminal in their laboratories. The data can also be made into a data base nearly semi-automatically. In addition to reducing time loss, delay and input errors because of re-entry, the researchers can make the data into a database on nearly a real time basis, and can provide their own theses to any part of the world through Internet. With regard to retaining Internet security, the security software having been introduced last year was renewed. In addition, detailed status such as daily access has become possible of identification as a result of introducing the net intellect. (NEDO)

  14. Digital Earth Watch And Picture Post Network: Measuring The Environment Through Digital Images

    Science.gov (United States)

    Schloss, A. L.; Beaudry, J.; Carrera, F.; Pickle, J.

    2010-12-01

    Digital Earth Watch (DEW) involves individuals, schools, organizations and communities in a systematic monitoring project of their local environment, especially vegetation health. The program offers people the means to join the Picture Post network and to study and analyze their own findings using DEW software. A Picture Post is an easy-to-use and inexpensive platform for repeatedly taking digital photographs as a standardized set of images of the entire 360 ° landscape, which then can be shared over the Internet on the Picture Post website. This simple concept has the potential to create a wealth of information and data on changing environmental conditions, which is important for a society grappling with the effects of environmental change. Picture Post participants study change over time in their local area, compare digital images with NASA satellite imagery and contribute towards improving their own communities. A key message in DEW is that although plants are dynamic and respond continuously to their environment, they do so either on a time-scale that most people don't notice or with a subtlety our senses can't detect. DEW has created simple tools for monitoring vegetation as a means towards understanding the connection between global climate change and local effects. Picture Posts may be added by anyone interested in monitoring a particular location. The value of a Picture Post is in the commitment of participants to take repeated photographs - monthly, weekly, or even daily - to build up a long-term record over many years. DEW is being developed by a collaborative effort led by the University of New Hampshire with the Federation of Earth Science Information Partners, the University of Southern Maine, and Worcester Polytechnic Institute. This poster will show examples of picture posts and data that can be collected and will describe our soon-to-be-released “ virtual ” picture post cell phone app. The Picture Post network is new and we invite individuals

  15. Unreliable patient identification warrants ABO typing at admission to check existing records before transfusion.

    Science.gov (United States)

    Ferrera-Tourenc, V; Lassale, B; Chiaroni, J; Dettori, I

    2015-06-01

    This study describes patient identification errors leading to transfusional near-misses in blood issued by the Alps Mediterranean French Blood Establishment (EFSAM) to Marseille Public Hospitals (APHM) over an 18-month period. The EFSAM consolidates 14 blood banks in southeast France. It supplies 149 hospitals and maintains a centralized database on ABO types used at all area hospitals. As an added precaution against incompatible transfusion, the APHM requires ABO testing at each admission regardless of whether the patient has an ABO record. The study goal was to determine if admission testing was warranted. Discrepancies between ABO type determined by admission testing and records in the centralized database were investigated. The root cause for each discrepancy was classified as specimen collection or patient admission error. Causes of patient admission events were further subclassified as namesake (name similarity) or impersonation (identity fraud). The incidence of ABO discrepancies was 1:2334 including a 1:3329 incidence of patient admission events. Impersonation was the main cause of identity events accounting for 90.3% of cases. The APHM's ABO control policy prevented 19 incompatible transfusions. In relation to the 48,593 packed red cell units transfused, this would have corresponded to a risk of 1:2526. Collecting and storing ABO typing results in a centralized database is an essential public health tool. It allows crosschecking of current test results with past records and avoids redundant testing. However, as patient identification remains unreliable, ABO typing at each admission is still warranted to prevent transfusion errors. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  16. National network of measurement of radioactivity in the environment - 2014 management report

    International Nuclear Information System (INIS)

    Couvez, Celine; Wyckaert, Laure; Picolo, Jean-Louis; Bicheron, Genevieve

    2015-10-01

    This report aims at presenting evolutions of the regulation of the French National network of measurement of radioactivity in the environment (the RNM), of its organisation, of the operation of its steering committee and various work groups. It also presents evolutions implemented in its information system and Internet web-site which gives public access to radioactivity measurements. After presentation of the RNM objectives and challenges, of the legal context, and a description of the RNM operation, the report presents the involved actors (ASN, IRSN, members of the RNM). The operation of the steering committee and work-groups is assessed. A chapter addresses the information system: description, data harmonisation and new information exchange protocol, technical support by the IRSN to data producers, interaction between the IRSN and system host, application management and third-party applications acceptance. Next parts propose an overview of laboratories certification, and activities related to communication and publications

  17. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  18. Deep Sea Shell Taphonomy: Interactive benthic experiments in hydrate environments of Barkley Canyon, Ocean Networks Canada.

    Science.gov (United States)

    Best, Mairi; Purser, Autun

    2015-04-01

    In order to quantify and track the rates and processes of modification of biogenic carbonate in gas hydrate environments, and their possible environmental/ecological correlates, ongoing observations of experimentally deployed specimens are being made using a remotely controlled crawler with camera and sensors. The crawler is connected to NEPTUNE Canada, an 800km, 5-node, regional cabled ocean network across the northern Juan de Fuca Plate, northeastern Pacific, part of Ocean Networks Canada. One of 15 study areas is an environment of exposed hydrate mounds along the wall of Barkley Canyon, at ˜865m water depth. This is the home of a benthic crawler developed by Jacobs University of Germany, who is affectionately known as Wally. Wally is equipped with a range of sensors including cameras, methane sensor, current meter, fluorometer, turbidity meter, CTD, and a sediment microprofiler with probes for oxygen, methane, sulphide, pH, temperature, and conductivity. In conjunction with this sensor suite, a series of experiments have been designed to assess the cycling of biogenic carbon and carbonate in this complex environment. The biota range from microbes, to molluscs, to large fish, and therefore the carbon inputs include both a range of organic carbon compounds as well as the complex materials that are "biogenic carbonate". Controlled experimental specimens were deployed of biogenic carbonate (Mytilus edulis fresh shells) and cellulose (pieces of untreated pine lumber) that had been previously well characterized (photographed, weighed, and numbered, matching valves and lumber kept as controls). Deployment at the sediment/water interface was in such a way to maximize natural burial exhumation cycles but to minimize specimen interaction. 10 replicate specimens of each material were deployed in two treatments: 1) adjacent to a natural life and death assemblage of chemosynthetic bivalves and exposed hydrate on a hydrate mound and 2) on the muddy seafloor at a distance

  19. Delay and Disruption Tolerant Networking MACHETE Model

    Science.gov (United States)

    Segui, John S.; Jennings, Esther H.; Gao, Jay L.

    2011-01-01

    To verify satisfaction of communication requirements imposed by unique missions, as early as 2000, the Communications Networking Group at the Jet Propulsion Laboratory (JPL) saw the need for an environment to support interplanetary communication protocol design, validation, and characterization. JPL's Multi-mission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in Simulator of Space Communication Networks (NPO-41373) NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various commercial, non-commercial, and in-house custom tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. As NASA is expanding its Space Communications and Navigation (SCaN) capabilities to support planned and future missions, building infrastructure to maintain services and developing enabling technologies, an important and broader role is seen for MACHETE in design-phase evaluation of future SCaN architectures. To support evaluation of the developing Delay Tolerant Networking (DTN) field and its applicability for space networks, JPL developed MACHETE models for DTN Bundle Protocol (BP) and Licklider/Long-haul Transmission Protocol (LTP). DTN is an Internet Research Task Force (IRTF) architecture providing communication in and/or through highly stressed networking environments such as space exploration and battlefield networks. Stressed networking environments include those with intermittent (predictable and unknown) connectivity, large and/or variable delays, and high bit error rates. To provide its services over existing domain specific protocols, the DTN protocols reside at the application layer of the TCP/IP stack, forming a store-and-forward overlay network. The key capabilities of the Bundle Protocol include custody-based reliability, the ability to cope with intermittent connectivity

  20. A review of the impact of the environment on aerogenerator materials

    Science.gov (United States)

    Mortimer, A. R.

    Factors which contribute to the unreliability of windpowered generators are examined, with specific regard to the availability of materials, durability, cost, ease of production, and ease of repair. The effects of wind loading and methods for testing salt air contaminants are discussed, along with the effect of moisture, of salt air on lubricants, of microbiological attack, of UV radiation, rain erosion, and icing. The probability of bird strikes is statistically defined, and consideration is given to electrostatic charging, lightning strikes, temperature changes, the corrosion of rubber by ozone, the effects of guano, and wet dry pollution. The visual, EM, and acoustic effects of wind turbines are explored, and production processes which may affect the integrity of the structure are outlined. Finally, failure mechanisms due to salt-air environments are detailed.

  1. Performative Environments

    DEFF Research Database (Denmark)

    Thomsen, Bo Stjerne

    2008-01-01

    The paper explores how performative architecture can act as a collective environment localizing urban flows and establishing public domains through the integration of pervasive computing and animation techniques. The NoRA project introduces the concept of ‘performative environments,' focusing on ...... of local interactions and network behaviour, building becomes social infrastructure and prompts an understanding of architectural structures as quasiobjects, which can retain both variation and recognisability in changing social constellations.......The paper explores how performative architecture can act as a collective environment localizing urban flows and establishing public domains through the integration of pervasive computing and animation techniques. The NoRA project introduces the concept of ‘performative environments,' focusing...

  2. DCE. Future IHEP's computing environment

    International Nuclear Information System (INIS)

    Zheng Guorui; Liu Xiaoling

    1995-01-01

    IHEP'S computing environment consists of several different computing environments established on IHEP computer networks. In which, the BES environment supported HEP computing is the main part of IHEP computing environment. Combining with the procedure of improvement and extension of BES environment, the authors describe development of computing environments in outline as viewed from high energy physics (HEP) environment establishment. The direction of developing to distributed computing of the IHEP computing environment based on the developing trend of present distributed computing is presented

  3. High Temperature Wireless Communication And Electronics For Harsh Environment Applications

    Science.gov (United States)

    Hunter, G. W.; Neudeck, P. G.; Beheim, G. M.; Ponchak, G. E.; Chen, L.-Y

    2007-01-01

    In order for future aerospace propulsion systems to meet the increasing requirements for decreased maintenance, improved capability, and increased safety, the inclusion of intelligence into the propulsion system design and operation becomes necessary. These propulsion systems will have to incorporate technology that will monitor propulsion component conditions, analyze the incoming data, and modify operating parameters to optimize propulsion system operations. This implies the development of sensors, actuators, and electronics, with associated packaging, that will be able to operate under the harsh environments present in an engine. However, given the harsh environments inherent in propulsion systems, the development of engine-compatible electronics and sensors is not straightforward. The ability of a sensor system to operate in a given environment often depends as much on the technologies supporting the sensor element as the element itself. If the supporting technology cannot handle the application, then no matter how good the sensor is itself, the sensor system will fail. An example is high temperature environments where supporting technologies are often not capable of operation in engine conditions. Further, for every sensor going into an engine environment, i.e., for every new piece of hardware that improves the in-situ intelligence of the components, communication wires almost always must follow. The communication wires may be within or between parts, or from the engine to the controller. As more hardware is added, more wires, weight, complexity, and potential for unreliability is also introduced. Thus, wireless communication combined with in-situ processing of data would significantly improve the ability to include sensors into high temperature systems and thus lead toward more intelligent engine systems. NASA Glenn Research Center (GRC) is presently leading the development of electronics, communication systems, and sensors capable of prolonged stable

  4. Performance in wireless networks and industrial wireless networks on control processes in real time under industrial environments

    Directory of Open Access Journals (Sweden)

    Juan F. Monsalve-Posada

    2015-01-01

    Full Text Available The growing use of Ethernet networks on the industrial automation pyramid has led many companies to develop new devices to operate in requirements of this level, nowadays it is called Industrial Ethernet network, on the market there are various sensors and actuators to industrial scale equipped with this technology, many of these devices are very expensive. In this paper, the performance of two wireless networks is evaluated, the first network has conventional Ethernet devices, and the second network has Industrial Ethernet devices. For the process we vary four parameters such as distance, number of bytes, the signal to noise ratio, and the packet error rate, and then we measure delays and compare with metric statistics results, Box Plot graphs were used for the analysis. Finally, we conclude that under the parameters and conditions tested, wireless networks can serve as a communication system in control applications with allowable delays of up to 50 ms, in addition, the results show a better performance of Industrial Ethernet networks over conventional networks, with differences in the RTT of milliseconds. Therefore, it is recommended to establish what risk is for the process to control these delays to determine if the equipment conventional applies, since under certain features like humidity and temperature can operate properly for a considerable time and at lower cost than devices to Industrial Ethernet.

  5. Directory Enabled Policy Based Networking; TOPICAL

    International Nuclear Information System (INIS)

    KELIIAA, CURTIS M.

    2001-01-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking

  6. In-Network Adaptation of Video Streams Using Network Processors

    Directory of Open Access Journals (Sweden)

    Mohammad Shorfuzzaman

    2009-01-01

    problem can be addressed, near the network edge, by applying dynamic, in-network adaptation (e.g., transcoding of video streams to meet available connection bandwidth, machine characteristics, and client preferences. In this paper, we extrapolate from earlier work of Shorfuzzaman et al. 2006 in which we implemented and assessed an MPEG-1 transcoding system on the Intel IXP1200 network processor to consider the feasibility of in-network transcoding for other video formats and network processor architectures. The use of “on-the-fly” video adaptation near the edge of the network offers the promise of simpler support for a wide range of end devices with different display, and so forth, characteristics that can be used in different types of environments.

  7. Environmental versatility promotes modularity in genome-scale metabolic networks.

    Science.gov (United States)

    Samal, Areejit; Wagner, Andreas; Martin, Olivier C

    2011-08-24

    The ubiquity of modules in biological networks may result from an evolutionary benefit of a modular organization. For instance, modularity may increase the rate of adaptive evolution, because modules can be easily combined into new arrangements that may benefit their carrier. Conversely, modularity may emerge as a by-product of some trait. We here ask whether this last scenario may play a role in genome-scale metabolic networks that need to sustain life in one or more chemical environments. For such networks, we define a network module as a maximal set of reactions that are fully coupled, i.e., whose fluxes can only vary in fixed proportions. This definition overcomes limitations of purely graph based analyses of metabolism by exploiting the functional links between reactions. We call a metabolic network viable in a given chemical environment if it can synthesize all of an organism's biomass compounds from nutrients in this environment. An organism's metabolism is highly versatile if it can sustain life in many different chemical environments. We here ask whether versatility affects the modularity of metabolic networks. Using recently developed techniques to randomly sample large numbers of viable metabolic networks from a vast space of metabolic networks, we use flux balance analysis to study in silico metabolic networks that differ in their versatility. We find that highly versatile networks are also highly modular. They contain more modules and more reactions that are organized into modules. Most or all reactions in a module are associated with the same biochemical pathways. Modules that arise in highly versatile networks generally involve reactions that process nutrients or closely related chemicals. We also observe that the metabolism of E. coli is significantly more modular than even our most versatile networks. Our work shows that modularity in metabolic networks can be a by-product of functional constraints, e.g., the need to sustain life in multiple

  8. Environmental versatility promotes modularity in genome-scale metabolic networks

    Directory of Open Access Journals (Sweden)

    Wagner Andreas

    2011-08-01

    Full Text Available Abstract Background The ubiquity of modules in biological networks may result from an evolutionary benefit of a modular organization. For instance, modularity may increase the rate of adaptive evolution, because modules can be easily combined into new arrangements that may benefit their carrier. Conversely, modularity may emerge as a by-product of some trait. We here ask whether this last scenario may play a role in genome-scale metabolic networks that need to sustain life in one or more chemical environments. For such networks, we define a network module as a maximal set of reactions that are fully coupled, i.e., whose fluxes can only vary in fixed proportions. This definition overcomes limitations of purely graph based analyses of metabolism by exploiting the functional links between reactions. We call a metabolic network viable in a given chemical environment if it can synthesize all of an organism's biomass compounds from nutrients in this environment. An organism's metabolism is highly versatile if it can sustain life in many different chemical environments. We here ask whether versatility affects the modularity of metabolic networks. Results Using recently developed techniques to randomly sample large numbers of viable metabolic networks from a vast space of metabolic networks, we use flux balance analysis to study in silico metabolic networks that differ in their versatility. We find that highly versatile networks are also highly modular. They contain more modules and more reactions that are organized into modules. Most or all reactions in a module are associated with the same biochemical pathways. Modules that arise in highly versatile networks generally involve reactions that process nutrients or closely related chemicals. We also observe that the metabolism of E. coli is significantly more modular than even our most versatile networks. Conclusions Our work shows that modularity in metabolic networks can be a by-product of functional

  9. Effective Loss Minimization and Allocation of Unbalanced Distribution Network

    Directory of Open Access Journals (Sweden)

    Manvir Kaur

    2017-11-01

    Full Text Available An efficient distribution network must be able to supply power with good voltage profile. The main objective of the proposed work is to allocate losses of the unbalanced distribution network by the firefly algorithm in regulated and deregulated environments before and after loss minimization. Reconfiguration is one of the methods for loss reduction of unbalanced distribution network. Further, optimal placement of distributed generation and capacitor in the reconfigured unbalanced distribution network can further reduce the loss. The results of reconfigured unbalanced distribution network in regulated environment have already been reported. In this paper reconfiguration of an unbalanced distribution network in a deregulated environment is also carried out using an established Fuzzy Firefly algorithm. Loss sensitivity factor of unbalanced distribution networks is used to get the appropriate location of distributed generation and capacitor to be placed in the unbalanced distribution network. Their ratings have been found out by using bacteria foraging optimization algorithm (BFOA. The suggested loss allocation method using Firefly algorithm is implemented at first on 13 node unbalanced distribution network to check the performance of the proposed loss allocation method when compared to other available method. Finally the proposed method has been implemented on 25 node unbalanced distribution network. Both of the implementations are carried out under MATLAB environment.

  10. Maximizing lifetime of wireless sensor networks using genetic approach

    DEFF Research Database (Denmark)

    Wagh, Sanjeev; Prasad, Ramjee

    2014-01-01

    The wireless sensor networks are designed to install the smart network applications or network for emergency solutions, where human interaction is not possible. The nodes in wireless sensor networks have to self organize as per the users requirements through monitoring environments. As the sensor......-objective parameters are considered to solve the problem using genetic algorithm of evolutionary approach.......The wireless sensor networks are designed to install the smart network applications or network for emergency solutions, where human interaction is not possible. The nodes in wireless sensor networks have to self organize as per the users requirements through monitoring environments. As the sensor...

  11. EDF's new environment-oriented method for planning the Extra High Voltage transmission network

    International Nuclear Information System (INIS)

    Trogneux, F.; Doquet, M.; Blondel, H.; Mallet, P.

    1996-01-01

    As EDF is experiencing increasing difficulties to develop its transmission network, the time may have come to reconsider the project selection method. In this paper, we point out that the currently used method essentially relies on a classical discounted balance criterion. We then present a new method taking into account the impact of a project on the environment by considering an environmental risk which may jeopardize the project's success. This method helps to evaluate the probability that each possible route of each project will be carried through. A simple probability computation then allows us to derive a global comparison of the eligible projects on the basis of an expected discounted balance criterion. Experiments now in progress will help to decide upon this method's efficiency in the context of an operational use. (author). 5 figs., 1 tab., 4 refs

  12. Challenges in coupling LTER with environmental assessments: An insight from potential and reality of the Chinese Ecological Research Network in servicing environment assessments.

    Science.gov (United States)

    Xia, Shaoxia; Liu, Yu; Yu, Xiubo; Fu, Bojie

    2018-08-15

    Environmental assessments estimate, evaluate and predict the consequences of natural processes and human activities on the environment. Long-term ecosystem observation and research networks (LTERs) are potentially valuable infrastructure to support environmental assessments. However, very few environmental assessments have successfully incorporated them. In this study, we try to reveal the current status of coupling LTERs with environmental assessments and look at the challenges involved in improving this coupling through exploring the role that Chinese Ecological Research Network (CERN), the LTER of China, currently plays in regional environment assessments. A review of official protocols and standards, regional assessments and CERN researches related to ecosystems and environment shows that there is great potential for coupling CERN with environment assessments. However in practice, CERN does not currently play the expected role. Remote sensing and irregular inventory data are still the main data sources currently used in regional assessments. Several causes led to the present situation: (1) insufficient cross-site research and failure to scale up site-level variables to the regional scale; (2) data barriers resulting from incompatible protocols and low data usability due to lack of data assimilation and scaling; and (3) absence of indicators relevant to human activities in existing monitoring protocols. For these reasons, enhancing cross-site monitoring and research, data assimilation and scaling up are critical steps required to improve coupling of LTER with environmental assessments. Site-focused long-term monitoring should be combined with wide-scale ground surveys and remote sensing to establish an effective connection between different environmental monitoring platforms for regional assessments. It is also necessary to revise the current monitoring protocols to include human activities and their impacts on the ecosystem, or change the LTERs into Long

  13. BioNessie - a grid enabled biochemical networks simulation environment

    OpenAIRE

    Liu, X.; Jiang, J.; Ajayi, O.; Gu, X.; Gilbert, D.; Sinnott, R.O.

    2008-01-01

    The simulation of biochemical networks provides insight and understanding about the underlying biochemical processes and pathways used by cells and organisms. BioNessie is a biochemical network simulator which has been developed at the University of Glasgow. This paper describes the simulator and focuses in particular on how it has been extended to benefit from a wide variety of high performance compute resources across the UK through Grid technologies to support larger scale simulations.

  14. Pattern recognition and data mining software based on artificial neural networks applied to proton transfer in aqueous environments

    International Nuclear Information System (INIS)

    Tahat Amani; Marti Jordi; Khwaldeh Ali; Tahat Kaher

    2014-01-01

    In computational physics proton transfer phenomena could be viewed as pattern classification problems based on a set of input features allowing classification of the proton motion into two categories: transfer ‘occurred’ and transfer ‘not occurred’. The goal of this paper is to evaluate the use of artificial neural networks in the classification of proton transfer events, based on the feed-forward back propagation neural network, used as a classifier to distinguish between the two transfer cases. In this paper, we use a new developed data mining and pattern recognition tool for automating, controlling, and drawing charts of the output data of an Empirical Valence Bond existing code. The study analyzes the need for pattern recognition in aqueous proton transfer processes and how the learning approach in error back propagation (multilayer perceptron algorithms) could be satisfactorily employed in the present case. We present a tool for pattern recognition and validate the code including a real physical case study. The results of applying the artificial neural networks methodology to crowd patterns based upon selected physical properties (e.g., temperature, density) show the abilities of the network to learn proton transfer patterns corresponding to properties of the aqueous environments, which is in turn proved to be fully compatible with previous proton transfer studies. (condensed matter: structural, mechanical, and thermal properties)

  15. Network Coded Cooperative Communication in a Real-Time Wireless Hospital Sensor Network.

    Science.gov (United States)

    Prakash, R; Balaji Ganesh, A; Sivabalan, Somu

    2017-05-01

    The paper presents a network coded cooperative communication (NC-CC) enabled wireless hospital sensor network architecture for monitoring health as well as postural activities of a patient. A wearable device, referred as a smartband is interfaced with pulse rate, body temperature sensors and an accelerometer along with wireless protocol services, such as Bluetooth and Radio-Frequency transceiver and Wi-Fi. The energy efficiency of wearable device is improved by embedding a linear acceleration based transmission duty cycling algorithm (NC-DRDC). The real-time demonstration is carried-out in a hospital environment to evaluate the performance characteristics, such as power spectral density, energy consumption, signal to noise ratio, packet delivery ratio and transmission offset. The resource sharing and energy efficiency features of network coding technique are improved by proposing an algorithm referred as network coding based dynamic retransmit/rebroadcast decision control (LA-TDC). From the experimental results, it is observed that the proposed LA-TDC algorithm reduces network traffic and end-to-end delay by an average of 27.8% and 21.6%, respectively than traditional network coded wireless transmission. The wireless architecture is deployed in a hospital environment and results are then successfully validated.

  16. Wireless Mid-Infrared Spectroscopy Sensor Network for Automatic Carbon Dioxide Fertilization in a Greenhouse Environment

    Directory of Open Access Journals (Sweden)

    Jianing Wang

    2016-11-01

    Full Text Available In this paper, a wireless mid-infrared spectroscopy sensor network was designed and implemented for carbon dioxide fertilization in a greenhouse environment. A mid-infrared carbon dioxide (CO2 sensor based on non-dispersive infrared (NDIR with the functionalities of wireless communication and anti-condensation prevention was realized as the sensor node. Smart transmission power regulation was applied in the wireless sensor network, according to the Received Signal Strength Indication (RSSI, to realize high communication stability and low-power consumption deployment. Besides real-time monitoring, this system also provides a CO2 control facility for manual and automatic control through a LabVIEW platform. According to simulations and field tests, the implemented sensor node has a satisfying anti-condensation ability and reliable measurement performance on CO2 concentrations ranging from 30 ppm to 5000 ppm. As an application, based on the Fuzzy proportional, integral, and derivative (PID algorithm realized on a LabVIEW platform, the CO2 concentration was regulated to some desired concentrations, such as 800 ppm and 1200 ppm, in 30 min with a controlled fluctuation of <±35 ppm in an acre of greenhouse.

  17. Scripted Mobile Network Routing in a Contested Environment

    National Research Council Canada - National Science Library

    Otto, Anthony R

    2008-01-01

    Mobile wireless network protocols currently run on optimistic routing algorithms, adjusting node connectivity only when the chosen connectivity metrics, such as signal strength, pass beyond minimum thresholds...

  18. Social Network Analysis in E-Learning Environments: A Preliminary Systematic Review

    Science.gov (United States)

    Cela, Karina L.; Sicilia, Miguel Ángel; Sánchez, Salvador

    2015-01-01

    E-learning occupies an increasingly prominent place in education. It provides the learner with a rich virtual network where he or she can exchange ideas and information and create synergies through interactions with other members of the network, whether fellow learners or teachers. Social network analysis (SNA) has proven extremely powerful at…

  19. Network Intrusion Detection System (NIDS in Cloud Environment based on Hidden Naïve Bayes Multiclass Classifier

    Directory of Open Access Journals (Sweden)

    Hafza A. Mahmood

    2018-04-01

    Full Text Available Cloud Environment is next generation internet based computing system that supplies customiza-ble services to the end user to work or access to the various cloud applications. In order to provide security and decrease the damage of information system, network and computer system it is im-portant to provide intrusion detection system (IDS. Now Cloud environment are under threads from network intrusions, as one of most prevalent and offensive means Denial of Service (DoS attacks that cause dangerous impact on cloud computing systems. This paper propose Hidden naïve Bayes (HNB Classifier to handle DoS attacks which is a data mining (DM model used to relaxes the conditional independence assumption of Naïve Bayes classifier (NB, proposed sys-tem used HNB Classifier supported with discretization and feature selection where select the best feature enhance the performance of the system and reduce consuming time. To evaluate the per-formance of proposal system, KDD 99 CUP and NSL KDD Datasets has been used. The experi-mental results show that the HNB classifier improves the performance of NIDS in terms of accu-racy and detecting DoS attacks, where the accuracy of detect DoS is 100% in three test KDD cup 99 dataset by used only 12 feature that selected by use gain ratio while in NSL KDD Dataset the accuracy of detect DoS attack is 90 % in three Experimental NSL KDD dataset by select 10 fea-ture only.

  20. Biological Networks Entropies: Examples in Neural Memory Networks, Genetic Regulation Networks and Social Epidemic Networks

    Directory of Open Access Journals (Sweden)

    Jacques Demongeot

    2018-01-01

    Full Text Available Networks used in biological applications at different scales (molecule, cell and population are of different types: neuronal, genetic, and social, but they share the same dynamical concepts, in their continuous differential versions (e.g., non-linear Wilson-Cowan system as well as in their discrete Boolean versions (e.g., non-linear Hopfield system; in both cases, the notion of interaction graph G(J associated to its Jacobian matrix J, and also the concepts of frustrated nodes, positive or negative circuits of G(J, kinetic energy, entropy, attractors, structural stability, etc., are relevant and useful for studying the dynamics and the robustness of these systems. We will give some general results available for both continuous and discrete biological networks, and then study some specific applications of three new notions of entropy: (i attractor entropy, (ii isochronal entropy and (iii entropy centrality; in three domains: a neural network involved in the memory evocation, a genetic network responsible of the iron control and a social network accounting for the obesity spread in high school environment.

  1. DISTRIBUTED SYSTEM FOR HUMAN MACHINE INTERACTION IN VIRTUAL ENVIRONMENTS

    Directory of Open Access Journals (Sweden)

    Abraham Obed Chan-Canche

    2017-07-01

    Full Text Available The communication networks built by multiple devices and sensors are becoming more frequent. These device networks allow human-machine interaction development which aims to improve the human performance generating an adaptive environment in response to the information provided by it. The problem of this work is the quick integration of a device network that allows the development of a flexible immersive environment for different uses.

  2. Animal transportation networks

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-01-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. PMID:25165598

  3. From Personal to Social: Learning Environments that Work

    Science.gov (United States)

    Camacho, Mar; Guilana, Sonia

    2011-01-01

    VLE (Virtual Learning Environments) are rapidly falling short to meet the demands of a networked society. Web 2.0 and social networks are proving to offer a more personalized, open environment for students to learn formally as they are already doing informally. With the irruption of social media into society, and therefore, education, many voices…

  4. Exploiting Deep Neural Networks and Head Movements for Robust Binaural Localization of Multiple Sources in Reverberant Environments

    DEFF Research Database (Denmark)

    Ma, Ning; May, Tobias; Brown, Guy J.

    2017-01-01

    This paper presents a novel machine-hearing system that exploits deep neural networks (DNNs) and head movements for robust binaural localization of multiple sources in reverberant environments. DNNs are used to learn the relationship between the source azimuth and binaural cues, consisting...... of the complete cross-correlation function (CCF) and interaural level differences (ILDs). In contrast to many previous binaural hearing systems, the proposed approach is not restricted to localization of sound sources in the frontal hemifield. Due to the similarity of binaural cues in the frontal and rear...

  5. Generalized Cartographic and Simultaneous Representation of Utility Networks for Decision-Support Systems and Crisis Management in Urban Environments

    Science.gov (United States)

    Becker, T.; König, G.

    2015-10-01

    Cartographic visualizations of crises are used to create a Common Operational Picture (COP) and enforce Situational Awareness by presenting relevant information to the involved actors. As nearly all crises affect geospatial entities, geo-data representations have to support location-specific analysis throughout the decision-making process. Meaningful cartographic presentation is needed for coordinating the activities of crisis manager in a highly dynamic situation, since operators' attention span and their spatial memories are limiting factors during the perception and interpretation process. Situational Awareness of operators in conjunction with a COP are key aspects in decision-making process and essential for making well thought-out and appropriate decisions. Considering utility networks as one of the most complex and particularly frequent required systems in urban environment, meaningful cartographic presentation of multiple utility networks with respect to disaster management do not exist. Therefore, an optimized visualization of utility infrastructure for emergency response procedures is proposed. The article will describe a conceptual approach on how to simplify, aggregate, and visualize multiple utility networks and their components to meet the requirements of the decision-making process and to support Situational Awareness.

  6. Performance of asynchronous transfer mode (ATM) local area and wide area networks for medical imaging transmission in clinical environment.

    Science.gov (United States)

    Huang, H K; Wong, A W; Zhu, X

    1997-01-01

    Asynchronous transfer mode (ATM) technology emerges as a leading candidate for medical image transmission in both local area network (LAN) and wide area network (WAN) applications. This paper describes the performance of an ATM LAN and WAN network at the University of California, San Francisco. The measurements were obtained using an intensive care unit (ICU) server connecting to four image workstations (WS) at four different locations of a hospital-integrated picture archiving and communication system (HI-PACS) in a daily regular clinical environment. Four types of performance were evaluated: magnetic disk-to-disk, disk-to-redundant array of inexpensive disks (RAID), RAID-to-memory, and memory-to-memory. Results demonstrate that the transmission rate between two workstations can reach 5-6 Mbytes/s from RAID-to-memory, and 8-10 Mbytes/s from memory-to-memory. When the server has to send images to all four workstations simultaneously, the transmission rate to each WS is about 4 Mbytes/s. Both situations are adequate for radiologic image communications for picture archiving and communication systems (PACS) and teleradiology applications.

  7. Mechanisms for Prolonging Network Lifetime in Wireless Sensor Networks

    Science.gov (United States)

    Yang, Yinying

    2010-01-01

    Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…

  8. Development of steering system in network environment

    International Nuclear Information System (INIS)

    Kanagawa, Fumihiro; Noguchi, So; Yamashita, Hideo

    2002-01-01

    We have been developing the steering system, which can successively observe the-data obtained during the numerical computation and change the parameters in the analysis. Moreover, this system is also extended to link the network. By using this system, a user can easily detect errors immediately and achieve the rapid and accurate analysis with lower computation cost. (Author)

  9. Digital Learning Network Education Events of NASA's Extreme Environments Mission Operations

    Science.gov (United States)

    Paul, Heather; Guillory, Erika

    2007-01-01

    NASA's Digital Learning Network (DLN) reaches out to thousands of students each year through video conferencing and web casting. The DLN has created a series of live education videoconferences connecting NASA s Extreme Environment Missions Operations (NEEMO) team to students across the United States. The programs are also extended to students around the world live web casting. The primary focus of the events is the vision for space exploration. During the programs, NEEMO Crewmembers including NASA astronauts, engineers and scientists inform and inspire students about the importance of exploration and share the impact of the project as it correlates with plans to return to the moon and explore the planet Mars. These events highlight interactivity. Students talk live with the aquanauts in Aquarius, the National Oceanic and Atmospheric Administration s underwater laboratory. With this program, NASA continues the Agency s tradition of investing in the nation's education programs. It is directly tied to the Agency's major education goal of attracting and retaining students in science, technology, and engineering disciplines. Before connecting with the aquanauts, the students conduct experiments of their own designed to coincide with mission objectives. This paper describes the events that took place in September 2006.

  10. ING: INDOOR ROUTING PROTOCOL FOR GREEN HOME NETWORKS

    OpenAIRE

    Kaouthar Sethom; Nozha Al- Ibrahimi; Guy Pujolle

    2011-01-01

    Because of all the innovations in computer communications and digital consumer device technologies,people have had great interest in researching home networking systems. The home is evolving rapidlyinto a smart Mesh networked environment.Moreover, the energy consumption of wireless devices and networks gradually increases to represent asignificant portion of the operational cost, naturally also causing increased equivalent carbonemissions to the environment. Therefore, reducing the energy con...

  11. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  12. MetNet - In situ observational Network and Orbital platform to investigate the Martian environment

    Science.gov (United States)

    Harri, Ari-Matti; Leinonen, Jussi; Merikallio, Sini; Paton, Mark; Haukka, Harri; Polkko, Jouni

    2007-09-01

    MetNet Mars Mission is an in situ observational network and orbital platform mission to investigate the Martian environment and it has been proposed to European Space Agency in response to Call for proposals for the first planning cycle of Cosmic Vision 2015-2025 D/SCI/DJS/SV/val/21851. The MetNet Mars Mission is to be implemented in collaboration with ESA, FMI, LA, IKI and the payload providing science teams. The scope of the MetNet Mission is to deploy 16 MetNet Landers (MNLs) on the Martian surface by using inflatable descent system structures accompanied by an atmospheric sounder and data relay onboard the MetNet Orbiter (MNO), which is based on ESA Mars Express satellite platform. The MNLs are attached on the three sides of the satellite and most of the MNLs are deployed to Mars separately a few weeks prior to the arrival to Mars. The MetNet Orbiter will perform continuous atmospheric soundings thus complementing the accurate in situ observations at the Martian ground produced by the MetNet observation network, as well as the orbiter will serve as the primary data relay between the MetNet Landers and the Earth. The MNLs are equipped with a versatile science payload focused on the atmospheric science of Mars. Detailed characterisation of the Martian atmospheric circulation patterns, boundary layer phenomena, and climatological cycles, as well as interior investigations, require simultaneous in situ meteorological, seismic and magnetic measurements from networks of stations on the Martian surface. MetNet Mars Mission will also provide a crucial support for the safety of large landing missions in general and manned Mars missions in particular. Accurate knowledge of atmospheric conditions and weather data is essential to guarantee safe landings of the forthcoming Mars mission elements.

  13. Radiation monitoring network of the Czech Republic

    International Nuclear Information System (INIS)

    Kuca, P.; Novak, L.; Rulik, P.; Tecl, J.

    2003-01-01

    The Radiation Monitoring Network (RMN) of the Czech Republic was established after the Chernobyl accident in 1986 and it is developed all the time. It is co-ordinated by the State Office for Nuclear Safety in co-operation with the National Radiation Protection Institute. Czech RMN consists of the several sub-networks, which include selected or all permanent parts of RMN. The sub-networks are following: the Early Warning Network (EWN), the TLD Territorial Network, the Network of the Measuring Sites of Air Contamination, the Network of Laboratories Equipped with Gamma-spectrometric and Radiochemical Analytical Instrumentation, the Ground and Airborne Mobile Groups. The Laboratory of Monitoring of Internal Contamination and the information system (IS) are a significant part of RMN, too. The data of RMN resulting from monitoring are transferred to the central database of CRMN, processed by the information system (IS). They are used in normal and emergency situations for an evaluation of radiation situation and for preparation of recommendations for protection of the public and the environment. In 2002 any extraordinary radioactivity in the environment was not detected and also none of the measuring points recorded any exceeding of established investigation levels. In components of environment and also in human beings a very low activity of 137 Cs was still measurable, that had been released into environment after the Chernobyl accident and by the nuclear weapon tests in sixties of the last century. (authors)

  14. Brokerage in SME networks

    NARCIS (Netherlands)

    Kirkels, Y.E.M.; Duysters, G.M.

    2010-01-01

    This study focuses on SME networks of design and high-tech companies in Southeast Netherlands. By highlighting the personal networks of members across design and high-tech industries, the study attempts to identify the main brokers in this dynamic environment. In addition, we investigate whether

  15. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  16. Interaction Networks: Generating High Level Hints Based on Network Community Clustering

    Science.gov (United States)

    Eagle, Michael; Johnson, Matthew; Barnes, Tiffany

    2012-01-01

    We introduce a novel data structure, the Interaction Network, for representing interaction-data from open problem solving environment tutors. We show how using network community detecting techniques are used to identify sub-goals in problems in a logic tutor. We then use those community structures to generate high level hints between sub-goals.…

  17. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  18. Design of a Networked Learning Master Environment for Professionals

    DEFF Research Database (Denmark)

    Dirckinck-Holmfeld, Lone

    2010-01-01

    The paper is presenting the overall learning design of MIL (Master in ICT and Learning). The learning design is integrating a number of principles: 1. Principles of problem and project based learning 2. Networked learning / learning in communities of practice. The paper will discuss how these pri......The paper is presenting the overall learning design of MIL (Master in ICT and Learning). The learning design is integrating a number of principles: 1. Principles of problem and project based learning 2. Networked learning / learning in communities of practice. The paper will discuss how...

  19. Design and implementation of dynamic hybrid Honeypot network

    Science.gov (United States)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  20. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-03-01

    This project is implemented to survey the current statuses and future trends of the Asian district environment-related information networks, for the (research cooperation project for development of environmental condition measuring laser radar systems), being promoted by NEDO. First, current statuses of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, major domestic nodes and internationally connected conditions are surveyed mainly for internet-connected networks, for surveying the current statuses and future trends of the research networks in Asian countries. Second, current statuses in Indonesia of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, domestic node sites and managing organizations, charge systems and institutions, types/reliability/ stability of the circuits, and conditions of restriction of use, if any, for surveying the current statuses and future trends in Indonesia. Third, conditions of and needs for network utilization by researchers for Asian district environments. (NEDO)

  1. Overview of hybrid fiber-coaxial network deployment in the deregulated UK environment

    Science.gov (United States)

    Cox, Alan L.

    1995-11-01

    Cable operators in the U.K. enjoy unprecedented license to construct networks and operate cable TV and telecommunications services within their franchise areas. In general, operators have built hybrid-fiber-coax (HFC) networks for cable TV in parallel with fiber-copper-pair networks for telephony. The commonly used network architectures are reviewed, together with their present and future capacities. Despite this dual-technology approach, there is considerable interest in the integration of telephony services onto the HFC network and the development of new interactive services for which HFC may be more suitable than copper pairs. Certain technological and commercial developments may have considerable significance for HFC networks and their operators. These include the digitalization of TV distribution and the rising demand for high-rate digital access lines. Possible scenarios are discussed.

  2. Generalized Load Sharing for Homogeneous Networks of Distributed Environment

    Directory of Open Access Journals (Sweden)

    A. Satheesh

    2008-01-01

    Full Text Available We propose a method for job migration policies by considering effective usage of global memory in addition to CPU load sharing in distributed systems. When a node is identified for lacking sufficient memory space to serve jobs, one or more jobs of the node will be migrated to remote nodes with low memory allocations. If the memory space is sufficiently large, the jobs will be scheduled by a CPU-based load sharing policy. Following the principle of sharing both CPU and memory resources, we present several load sharing alternatives. Our objective is to reduce the number of page faults caused by unbalanced memory allocations for jobs among distributed nodes, so that overall performance of a distributed system can be significantly improved. We have conducted trace-driven simulations to compare CPU-based load sharing policies with our policies. We show that our load sharing policies not only improve performance of memory bound jobs, but also maintain the same load sharing quality as the CPU-based policies for CPU-bound jobs. Regarding remote execution and preemptive migration strategies, our experiments indicate that a strategy selection in load sharing is dependent on the amount of memory demand of jobs, remote execution is more effective for memory-bound jobs, and preemptive migration is more effective for CPU-bound jobs. Our CPU-memory-based policy using either high performance or high throughput approach and using the remote execution strategy performs the best for both CPU-bound and memory-bound job in homogeneous networks of distributed environment.

  3. Generating realistic environments for cyber operations development, testing, and training

    Science.gov (United States)

    Berk, Vincent H.; Gregorio-de Souza, Ian; Murphy, John P.

    2012-06-01

    Training eective cyber operatives requires realistic network environments that incorporate the structural and social complexities representative of the real world. Network trac generators facilitate repeatable experiments for the development, training and testing of cyber operations. However, current network trac generators, ranging from simple load testers to complex frameworks, fail to capture the realism inherent in actual environments. In order to improve the realism of network trac generated by these systems, it is necessary to quantitatively measure the level of realism in generated trac with respect to the environment being mimicked. We categorize realism measures into statistical, content, and behavioral measurements, and propose various metrics that can be applied at each level to indicate how eectively the generated trac mimics the real world.

  4. Lossy Data Aggregation with Network Coding in Stand-Alone Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Madsen, Tatiana Kozlova

    2011-01-01

    in chemical plants, etc. Given resource constrained operation of a sensor network where the nodes are battery powered and buffer sizes are limited, efficient methods for in-network data storage abd it subsequent fast and reliable transmission to a gateway is desirable. To save scarse resources and to prolong......This work focuses on a special type of wireless sensor networks (WSNs) that we refer to as a stand alone network. These netwoks operate in harsh and extreme environments where data collection is done only occasionally. Typical examples include habitat monitoring systems, monitoring systems...

  5. An operating environment for control systems on transputer networks

    NARCIS (Netherlands)

    Tillema, H.G.; Schoute, Albert L.; Wijbrans, K.C.J.; Wijbrans, K.C.J.

    1991-01-01

    The article describes an operating environment for control systems. The environment contains the basic layers of a distributed operating system. The design of this operating environment is based on the requirements demanded by controllers which can be found in complex control systems. Due to the

  6. Assessment of the radiological status of the French environment in 2008: synthesis of the results of the IRSN's watch networks

    International Nuclear Information System (INIS)

    2009-01-01

    This report presents the data obtained in 2008 within the frame of the follow-up by the IRSN of the levels of radioactivity on the French national territory. After having recalled the objectives of this radiological watch of the environment and its organization, the report describes the methodology adopted for the choice of the watch stations, the choice of the environmental matrices, the analysis plans, the sample preparation and packing. It presents the various radionuclides which are naturally or artificially present in the French environment. Then, it presents the results obtained by the different station networks by watching the atmosphere, rivers and soils, or coasts. The report recalls and comments the different radiological events which occurred in 2008, i.e. the detection of different radionuclides in different environments: nuclear plants, nuclear research centres, nuclear sites, nuclear industries, nuclear waste storage sites, nuclear marine bases, rivers

  7. Network connectivity value.

    Science.gov (United States)

    Dragicevic, Arnaud; Boulanger, Vincent; Bruciamacchie, Max; Chauchard, Sandrine; Dupouey, Jean-Luc; Stenger, Anne

    2017-04-21

    In order to unveil the value of network connectivity, we formalize the construction of ecological networks in forest environments as an optimal control dynamic graph-theoretic problem. The network is based on a set of bioreserves and patches linked by ecological corridors. The node dynamics, built upon the consensus protocol, form a time evolutive Mahalanobis distance weighted by the opportunity costs of timber production. We consider a case of complete graph, where the ecological network is fully connected, and a case of incomplete graph, where the ecological network is partially connected. The results show that the network equilibrium depends on the size of the reception zone, while the network connectivity depends on the environmental compatibility between the ecological areas. Through shadow prices, we find that securing connectivity in partially connected networks is more expensive than in fully connected networks, but should be undertaken when the opportunity costs are significant. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    Directory of Open Access Journals (Sweden)

    Qaisar Ayub

    Full Text Available Delay Tolerant Network (DTN multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  9. Priority Queue Based Reactive Buffer Management Policy for Delay Tolerant Network under City Based Environments.

    Science.gov (United States)

    Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan

    2018-01-01

    Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.

  10. Cytoscape: a software environment for integrated models of biomolecular interaction networks.

    Science.gov (United States)

    Shannon, Paul; Markiel, Andrew; Ozier, Owen; Baliga, Nitin S; Wang, Jonathan T; Ramage, Daniel; Amin, Nada; Schwikowski, Benno; Ideker, Trey

    2003-11-01

    Cytoscape is an open source software project for integrating biomolecular interaction networks with high-throughput expression data and other molecular states into a unified conceptual framework. Although applicable to any system of molecular components and interactions, Cytoscape is most powerful when used in conjunction with large databases of protein-protein, protein-DNA, and genetic interactions that are increasingly available for humans and model organisms. Cytoscape's software Core provides basic functionality to layout and query the network; to visually integrate the network with expression profiles, phenotypes, and other molecular states; and to link the network to databases of functional annotations. The Core is extensible through a straightforward plug-in architecture, allowing rapid development of additional computational analyses and features. Several case studies of Cytoscape plug-ins are surveyed, including a search for interaction pathways correlating with changes in gene expression, a study of protein complexes involved in cellular recovery to DNA damage, inference of a combined physical/functional interaction network for Halobacterium, and an interface to detailed stochastic/kinetic gene regulatory models.

  11. Network Based Educational Environment How Libraries and Librarians Become Organizers of Knowledge Access and Resources

    CERN Document Server

    Pettenati, M C; Pettenati, Corrado

    2000-01-01

    In this paper we will highlight some important issues which will influence the redefinition of roles and duties of libraries and librarians in a networked based educational environment. Although librarians will also keep their traditional roles of faculty support services as well as reference service and research assistance, we identify the participation in the instructional design process, the support in the evaluation, development and use of a proper authoring system and the customization of information access, as being the domains where libraries and librarians should mainly involve themselves in the next future and make profit of their expertise in information and knowledge organization in order to properly and effectively support the institutions in the use of Information Technology in education.

  12. ROS-IGTL-Bridge: an open network interface for image-guided therapy using the ROS environment.

    Science.gov (United States)

    Frank, Tobias; Krieger, Axel; Leonard, Simon; Patel, Niravkumar A; Tokuda, Junichi

    2017-08-01

    With the growing interest in advanced image-guidance for surgical robot systems, rapid integration and testing of robotic devices and medical image computing software are becoming essential in the research and development. Maximizing the use of existing engineering resources built on widely accepted platforms in different fields, such as robot operating system (ROS) in robotics and 3D Slicer in medical image computing could simplify these tasks. We propose a new open network bridge interface integrated in ROS to ensure seamless cross-platform data sharing. A ROS node named ROS-IGTL-Bridge was implemented. It establishes a TCP/IP network connection between the ROS environment and external medical image computing software using the OpenIGTLink protocol. The node exports ROS messages to the external software over the network and vice versa simultaneously, allowing seamless and transparent data sharing between the ROS-based devices and the medical image computing platforms. Performance tests demonstrated that the bridge could stream transforms, strings, points, and images at 30 fps in both directions successfully. The data transfer latency was bridge could achieve 900 fps for transforms. Additionally, the bridge was demonstrated in two representative systems: a mock image-guided surgical robot setup consisting of 3D slicer, and Lego Mindstorms with ROS as a prototyping and educational platform for IGT research; and the smart tissue autonomous robot surgical setup with 3D Slicer. The study demonstrated that the bridge enabled cross-platform data sharing between ROS and medical image computing software. This will allow rapid and seamless integration of advanced image-based planning/navigation offered by the medical image computing software such as 3D Slicer into ROS-based surgical robot systems.

  13. Learning Analytics for Networked Learning Models

    Science.gov (United States)

    Joksimovic, Srecko; Hatala, Marek; Gaševic, Dragan

    2014-01-01

    Teaching and learning in networked settings has attracted significant attention recently. The central topic of networked learning research is human-human and human-information interactions occurring within a networked learning environment. The nature of these interactions is highly complex and usually requires a multi-dimensional approach to…

  14. Self-Awareness in Computer Networks

    Directory of Open Access Journals (Sweden)

    Ariane Keller

    2014-01-01

    Full Text Available The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.

  15. Multi-Tenant Isolation via Reconfigurable Networks

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R. [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L. [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in reconfigurable network enclaving through Software Defined Networking (SDN) and Network Function Virtualization (NFV) and their applicability to secure enclaves in HPC environments. SDN and NFV methods are based on a solid foundation of system wide virtualization. The purpose of which is very straight forward, the system administrator can deploy networks that are more amenable to customer needs, and at the same time achieve increased scalability making it easier to increase overall capacity as needed without negatively affecting functionality. The network administration of both the server system and the virtual sub-systems is simplified allowing control of the infrastructure through well-defined APIs (Application Programming Interface). While SDN and NFV technologies offer significant promise in meeting these goals, they also provide the ability to address a significant component of the multi-tenant challenge in HPC environments, namely resource isolation. Traditional HPC systems are built upon scalable high-performance networking technologies designed to meet specific application requirements. Dynamic isolation of resources within these environments has remained difficult to achieve. SDN and NFV methodology

  16. Development of a platform to combine sensor networks and home robots to improve fall detection in the home environment.

    Science.gov (United States)

    Della Toffola, Luca; Patel, Shyamal; Chen, Bor-rong; Ozsecen, Yalgin M; Puiatti, Alessandro; Bonato, Paolo

    2011-01-01

    Over the last decade, significant progress has been made in the development of wearable sensor systems for continuous health monitoring in the home and community settings. One of the main areas of application for these wearable sensor systems is in detecting emergency events such as falls. Wearable sensors like accelerometers are increasingly being used to monitor daily activities of individuals at a risk of falls, detect emergency events and send alerts to caregivers. However, such systems tend to have a high rate of false alarms, which leads to low compliance levels. Home robots can enable caregivers with the ability to quickly make an assessment and intervene if an emergency event is detected. This can provide an additional layer for detecting false positives, which can lead to improve compliance. In this paper, we present preliminary work on the development of a fall detection system based on a combination sensor networks and home robots. The sensor network architecture comprises of body worn sensors and ambient sensors distributed in the environment. We present the software architecture and conceptual design home robotic platform. We also perform preliminary characterization of the sensor network in terms of latencies and battery lifetime.

  17. Towards a Scalable and Adaptive Application Support Platform for Large-Scale Distributed E-Sciences in High-Performance Network Environments

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Chase Qishi [New Jersey Inst. of Technology, Newark, NJ (United States); Univ. of Memphis, TN (United States); Zhu, Michelle Mengxia [Southern Illinois Univ., Carbondale, IL (United States)

    2016-06-06

    The advent of large-scale collaborative scientific applications has demonstrated the potential for broad scientific communities to pool globally distributed resources to produce unprecedented data acquisition, movement, and analysis. System resources including supercomputers, data repositories, computing facilities, network infrastructures, storage systems, and display devices have been increasingly deployed at national laboratories and academic institutes. These resources are typically shared by large communities of users over Internet or dedicated networks and hence exhibit an inherent dynamic nature in their availability, accessibility, capacity, and stability. Scientific applications using either experimental facilities or computation-based simulations with various physical, chemical, climatic, and biological models feature diverse scientific workflows as simple as linear pipelines or as complex as a directed acyclic graphs, which must be executed and supported over wide-area networks with massively distributed resources. Application users oftentimes need to manually configure their computing tasks over networks in an ad hoc manner, hence significantly limiting the productivity of scientists and constraining the utilization of resources. The success of these large-scale distributed applications requires a highly adaptive and massively scalable workflow platform that provides automated and optimized computing and networking services. This project is to design and develop a generic Scientific Workflow Automation and Management Platform (SWAMP), which contains a web-based user interface specially tailored for a target application, a set of user libraries, and several easy-to-use computing and networking toolkits for application scientists to conveniently assemble, execute, monitor, and control complex computing workflows in heterogeneous high-performance network environments. SWAMP will enable the automation and management of the entire process of scientific

  18. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    Science.gov (United States)

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.

  19. A Cloud Theory-Based Trust Computing Model in Social Networks

    Directory of Open Access Journals (Sweden)

    Fengming Liu

    2016-12-01

    Full Text Available How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.

  20. Shape-Shifting Droplet Networks.

    Science.gov (United States)

    Zhang, T; Wan, Duanduan; Schwarz, J M; Bowick, M J

    2016-03-11

    We consider a three-dimensional network of aqueous droplets joined by single lipid bilayers to form a cohesive, tissuelike material. The droplets in these networks can be programed to have distinct osmolarities so that osmotic gradients generate internal stresses via local fluid flows to cause the network to change shape. We discover, using molecular dynamics simulations, a reversible folding-unfolding process by adding an osmotic interaction with the surrounding environment which necessarily evolves dynamically as the shape of the network changes. This discovery is the next important step towards osmotic robotics in this system. We also explore analytically and numerically how the networks become faceted via buckling and how quasi-one-dimensional networks become three dimensional.

  1. System architecture for ubiquitous live video streaming in university network environment

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-09-01

    Full Text Available an architecture which supports ubiquitous live streaming for university or campus networks using a modified bluetooth inquiry mechanism with extended ID, integrated end-user device usage and adaptation to heterogeneous networks. Riding on that architecture...

  2. Cross Deployment Networking and Systematic Performance Analysis of Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengxian Wei

    2017-07-01

    Full Text Available Underwater wireless sensor networks (UWSNs have become a new hot research area. However, due to the work dynamics and harsh ocean environment, how to obtain an UWSN with the best systematic performance while deploying as few sensor nodes as possible and setting up self-adaptive networking is an urgent problem that needs to be solved. Consequently, sensor deployment, networking, and performance calculation of UWSNs are challenging issues, hence the study in this paper centers on this topic and three relevant methods and models are put forward. Firstly, the normal body-centered cubic lattice to cross body-centered cubic lattice (CBCL has been improved, and a deployment process and topology generation method are built. Then most importantly, a cross deployment networking method (CDNM for UWSNs suitable for the underwater environment is proposed. Furthermore, a systematic quar-performance calculation model (SQPCM is proposed from an integrated perspective, in which the systematic performance of a UWSN includes coverage, connectivity, durability and rapid-reactivity. Besides, measurement models are established based on the relationship between systematic performance and influencing parameters. Finally, the influencing parameters are divided into three types, namely, constraint parameters, device performance and networking parameters. Based on these, a networking parameters adjustment method (NPAM for optimized systematic performance of UWSNs has been presented. The simulation results demonstrate that the approach proposed in this paper is feasible and efficient in networking and performance calculation of UWSNs.

  3. Resource Discovery in Activity-Based Sensor Networks

    DEFF Research Database (Denmark)

    Bucur, Doina; Bardram, Jakob

    This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networ....... ABSN enhances the generic Extended Zone Routing Protocol with logical sensor grouping and greatly lowers network overhead during the process of discovery, while keeping discovery latency close to optimal.......This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networks...... (ABSNs) knowledge about their usage even at the network layer. ABSN redesigns classical network-level service discovery protocols to include and use this logical structuring of the network for a more practically applicable service discovery scheme. Noting that in practical settings activity-based sensor...

  4. Making sense of information in noisy networks: human communication, gossip, and distortion.

    Science.gov (United States)

    Laidre, Mark E; Lamb, Alex; Shultz, Susanne; Olsen, Megan

    2013-01-21

    Information from others can be unreliable. Humans nevertheless act on such information, including gossip, to make various social calculations, thus raising the question of whether individuals can sort through social information to identify what is, in fact, true. Inspired by empirical literature on people's decision-making when considering gossip, we built an agent-based simulation model to examine how well simple decision rules could make sense of information as it propagated through a network. Our simulations revealed that a minimalistic decision-rule 'Bit-wise mode' - which compared information from multiple sources and then sought a consensus majority for each component bit within the message - was consistently the most successful at converging upon the truth. This decision rule attained high relative fitness even in maximally noisy networks, composed entirely of nodes that distorted the message. The rule was also superior to other decision rules regardless of its frequency in the population. Simulations carried out with variable agent memory constraints, different numbers of observers who initiated information propagation, and a variety of network types suggested that the single most important factor in making sense of information was the number of independent sources that agents could consult. Broadly, our model suggests that despite the distortion information is subject to in the real world, it is nevertheless possible to make sense of it based on simple Darwinian computations that integrate multiple sources. Copyright © 2012 Elsevier Ltd. All rights reserved.

  5. Human recognition in a video network

    Science.gov (United States)

    Bhanu, Bir

    2009-10-01

    Video networks is an emerging interdisciplinary field with significant and exciting scientific and technological challenges. It has great promise in solving many real-world problems and enabling a broad range of applications, including smart homes, video surveillance, environment and traffic monitoring, elderly care, intelligent environments, and entertainment in public and private spaces. This paper provides an overview of the design of a wireless video network as an experimental environment, camera selection, hand-off and control, anomaly detection. It addresses challenging questions for individual identification using gait and face at a distance and present new techniques and their comparison for robust identification.

  6. Epidemics on interconnected networks

    Science.gov (United States)

    Dickison, Mark; Havlin, S.; Stanley, H. E.

    2012-06-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties but will also interact with individuals in other networks. We study the susceptible-infected-recovered process on interconnected network systems and find two distinct regimes. In strongly coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength βc, below which the disease does not spread. In contrast, in weakly coupled network systems, a mixed phase exists below βc of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  7. Hyper Hospital on the satellite multi-media network.

    Science.gov (United States)

    Yamaguchi, T

    1997-01-01

    We have been developing the Hyper Hospital, a network based VR mediated medical care system. The Hyper Hospital is composed of two seamlessly integrated environments, that is, the virtual and the real worlds. Of them, its virtual environment expands the conventional medical care system using the virtual reality technology as a principal human interface and a collaboration tool, in the present study, an attempt to extend the Hyper Hospital system to various modalities of communication network is reported. A satellite communication based multi-media network using Internet protocols with the WWW interface is used. Data transmission rate and other performances were measured under various conditions and the satellite network was shown to be suitable to the Hyper Hospital network.

  8. Mesh Networking in the Tactical Environment Using White Space Technolog

    Science.gov (United States)

    2015-12-01

    facilitate the establishment of a point to multi-point network topology . The base station node handles the compilation of data necessary to determine a...the client nodes from the base station node, the number of client nodes, and the network topology . The metrics chosen for evaluation were picked as a...model, are commonly utilized to simulate quadratic path loss across free space [22]. This model uses the following formula to calculate path loss: L

  9. 'BioNessie(G) - a grid enabled biochemical networks simulation environment

    OpenAIRE

    Liu, X; Jiang, J; Ajayi, O; Gu, X; Gilbert, D; Sinnott, R

    2008-01-01

    The simulation of biochemical networks provides insight and understanding about the underlying biochemical processes and pathways used by cells and organisms. BioNessie is a biochemical network simulator which has been developed at the University of Glasgow. This paper describes the simulator and focuses in particular on how it has been extended to benefit from a wide variety of high performance compute resources across the UK through Grid technologies to support larger scal...

  10. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  11. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  12. Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

    Directory of Open Access Journals (Sweden)

    DongHo Kang

    2014-01-01

    Full Text Available Internet of Things (IoT consists of several tiny devices connected together to form a collaborative computing environment. Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments. But SCADA sensor networks are becoming more and more vulnerable to cyber-attacks due to increased connectivity. To safely adopt IoT technologies in the SCADA environments, it is important to improve the security of SCADA sensor networks. In this paper we propose a multiple filtering technique based on whitelists to detect illegitimate packets. Our proposed system detects the traffic of network and application protocol attacks with a set of whitelists collected from normal traffic.

  13. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  14. Digital journalism in the Network Society: innovating in a competitive environment

    Directory of Open Access Journals (Sweden)

    José-Alberto García-Avilés

    2017-01-01

    Full Text Available Internet’s rise as a dominant medium has transformed the ecosystem of the Network Society, bringing about deep changes in the economy, politics, culture, leisure and the public sphere (Castells, 1997. As a result, millions of communicators are connected to a Network increasingly intertwined, reaching global dimensions. Network communication pushes the limits and breaks frontiers: any isolated incident might originate international consequences, such as we have seen with Fidel Castro’s death, the victory of Donald Trump in the U.S. presidential elections, the referendum about the peace process in Colombia or the “Brexit” in the United Kingdom.

  15. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  16. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    In the simulation of mobile ad-hoc networks (MANETs), the probability distribution governing the movement of nodes typically varies over time and converges to a steady state distribution, known as the stationary distribution. This paper presents and evaluates the stationary distribution for location, speed and pause time of a ...

  17. Ninth International Conference on Wireless Communication and Sensor Networks

    CERN Document Server

    Tiwari, Murlidhar; Arora, Anish

    2014-01-01

    Wireless communication and sensor networks would form the backbone to create pervasive and ubiquitous environments that would have profound influence on the society and thus are important to the society. The wireless communication technologies and wireless sensor networks would encompass a wide range of domains such as HW devices such as motes, sensors and associated instrumentation, actuators, transmitters, receivers, antennas, etc., sensor network aspects such as topologies, routing algorithms, integration of heterogeneous network elements and topologies, designing RF devices and systems for energy efficiency and reliability etc. These sensor networks would provide opportunity to continuously and in a distributed manner monitor the environment and generate the necessary warnings and actions. However most of the developments have been demonstrated only in controlled and laboratory environments. So we are yet to see those powerful, ubiquitous applications for the benefit of the society. The conference and con...

  18. A spectral theory approach for extreme value analysis in a tandem of fluid queues

    NARCIS (Netherlands)

    J.W. Bosman (Joost); R. Núñez Queija (Rudesindo)

    2014-01-01

    htmlabstractWe consider a model to evaluate performance of streaming media over an unreliable network. Our model consists of a tandem of two fluid queues. The first fluid queue is a Markov modulated fluid queue that models the network congestion, and the second queue represents the play-out buffer.

  19. Wireless Sensor Networks TestBed: ASNTbed

    CSIR Research Space (South Africa)

    Dludla, AG

    2013-05-01

    Full Text Available Wireless sensor networks (WSNs) have been used in different types of applications and deployed within various environments. Simulation tools are essential for studying WSNs, especially for exploring large-scale networks. However, WSN testbeds...

  20. Digital Identity Formation: Socially Being Real and Present on Digital Networks

    Science.gov (United States)

    Bozkurt, Aras; Tu, Chih-Hsiung

    2016-01-01

    Social networks have become popular communication and interaction environments recently. As digital environments, so as ecosystems, they have potential in terms of networked learning as they fulfill some roles such as mediating an environment for digital identity formation and providing social and emotional presence. Based on this phenomenon, the…

  1. Changing Conditions for Networked Learning?

    DEFF Research Database (Denmark)

    Ryberg, Thomas

    2011-01-01

    in describing the novel pedagogical potentials of these new technologies and practices (e.g. in debates around virtual learning environments versus personal learning environment). Likewise, I shall briefly discuss the notions of ‘digital natives’ or ‘the net generation’ from a critical perspective...... of social technologies. I argue that we are seeing the emergence of new architectures and scales of participation, collaboration and networking e.g. through interesting formations of learning networks at different levels of scale, for different purposes and often bridging boundaries such as formal...

  2. Network-based stochastic competitive learning approach to disambiguation in collaborative networks

    Science.gov (United States)

    Christiano Silva, Thiago; Raphael Amancio, Diego

    2013-03-01

    Many patterns have been uncovered in complex systems through the application of concepts and methodologies of complex networks. Unfortunately, the validity and accuracy of the unveiled patterns are strongly dependent on the amount of unavoidable noise pervading the data, such as the presence of homonymous individuals in social networks. In the current paper, we investigate the problem of name disambiguation in collaborative networks, a task that plays a fundamental role on a myriad of scientific contexts. In special, we use an unsupervised technique which relies on a particle competition mechanism in a networked environment to detect the clusters. It has been shown that, in this kind of environment, the learning process can be improved because the network representation of data can capture topological features of the input data set. Specifically, in the proposed disambiguating model, a set of particles is randomly spawned into the nodes constituting the network. As time progresses, the particles employ a movement strategy composed of a probabilistic convex mixture of random and preferential walking policies. In the former, the walking rule exclusively depends on the topology of the network and is responsible for the exploratory behavior of the particles. In the latter, the walking rule depends both on the topology and the domination levels that the particles impose on the neighboring nodes. This type of behavior compels the particles to perform a defensive strategy, because it will force them to revisit nodes that are already dominated by them, rather than exploring rival territories. Computer simulations conducted on the networks extracted from the arXiv repository of preprint papers and also from other databases reveal the effectiveness of the model, which turned out to be more accurate than traditional clustering methods.

  3. Embedded Active Fiber Optic Sensing Network for Structural Health Monitoring in Harsh Environments

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Anbo [Virginia Polytechnic Inst. and State Univ. (Virginia Tech), Blacksburg, VA (United States)

    2016-09-30

    This report summarizes technical progress on the program “Embedded Active Fiber Optic Sensing Network for Structural Health Monitoring in Harsh Environments” funded by the National Energy Technology Laboratory of the U.S. Department of Energy, and performed by the Center for Photonics Technology at Virginia Tech. The objective of this project is to develop a first-of-a-kind technology for remote fiber optic generation and detection of acoustic waves for structural health monitoring in harsh environments. During the project period, which is from April 1, 2013 to Septemeber 30, 2016, three different acoustic generation mechanisms were studied in detail for their applications in building a fiber optic acoustic generation unit (AGU), including laser induced plasma breakdown (LIP), Erbium-doped fiber laser absorption, and metal laser absorption. By comparing the performance of the AGUs designed based on these three mechanisms and analyzing the experimental results with simulations, the metal laser absorption method was selected to build a complete fiber optic structure health monitoring (FO-SHM) system for the proposed high temperature multi-parameter structure health monitoring application. Based on the simulation of elastic wave propagation and fiber Bragg grating acoustic pulse detection, an FO-SHM element together with a completed interrogation system were designed and built. This system was first tested on an aluminum piece in the low-temperature range and successfully demonstrated its capability of multi-parameter monitoring and multi-point sensing. In the later stages of the project, the research was focused on improving the surface attachment design and preparing the FO-SHM element for high temperature environment tests. After several upgrades to the surface attachment methods, the FO-SHM element was able to work reliably up to 600oC when attached to P91 pipes, which are the target material of this project. In the final stage of this project, this FO

  4. Orchestration in work environment policy programs

    DEFF Research Database (Denmark)

    Hasle, Peter; Limborg, Hans Jørgen; Grøn, Sisse

    2017-01-01

    In spite of many years’ efforts, it is difficult to prove substantial improvements of the work environment and policymakers are continuously searching for new efficient strategies. This paper examines the concept of orchestration of work environment programs, based on an empirical analysis...... of recent Danish policy. Orchestration is a strategy where different stakeholders and activities are integrated into a unified program aimed at a specific target group. The analysis includes three policy cases, supplemented with two company case studies. The research shows a move toward a more governance...... type of regulation, which is not only emerging in network but also includes more explicitly orchestrated policy programs. The stakeholders participate in the network with different interests and the orchestration of work environment policies is therefore built on a platform of regulation...

  5. Design and implementation about the campus wireless network

    International Nuclear Information System (INIS)

    Qi Fazhi; An Dehai; Wang Yanming; Cui Tao; Chen Gang; Liu Baoxu

    2007-01-01

    With the development of network applications, flexibility and wieldy is becoming more and more important for network users. Based on the analysis of the needs of campus wireless network. This article design and analysis the deployment mechanism, register system and protection system of wireless network. Built a wireless network system base on IHEP network environment, realization the 'always and everywhere' access the network in the IHEP campus area. (authors)

  6. A study on haptic collaborative game in shared virtual environment

    Science.gov (United States)

    Lu, Keke; Liu, Guanyang; Liu, Lingzhi

    2013-03-01

    A study on collaborative game in shared virtual environment with haptic feedback over computer networks is introduced in this paper. A collaborative task was used where the players located at remote sites and played the game together. The player can feel visual and haptic feedback in virtual environment compared to traditional networked multiplayer games. The experiment was desired in two conditions: visual feedback only and visual-haptic feedback. The goal of the experiment is to assess the impact of force feedback on collaborative task performance. Results indicate that haptic feedback is beneficial for performance enhancement for collaborative game in shared virtual environment. The outcomes of this research can have a powerful impact on the networked computer games.

  7. [Integration of sex/gender into environmental health research. Results of the interdisciplinary research network Sex/Gender-Environment-Health (GeUmGe-NET)].

    Science.gov (United States)

    Bolte, Gabriele; David, Madlen; Dębiak, Małgorzata; Fiedel, Lotta; Hornberg, Claudia; Kolossa-Gehring, Marike; Kraus, Ute; Lätzsch, Rebecca; Paeck, Tatjana; Palm, Kerstin; Schneider, Alexandra

    2018-06-01

    The comprehensive consideration of sex/gender in health research is essential to increase relevance and validity of research results. Contrary to other areas of health research, there is no systematic summary of the current state of research on the significance of sex/gender in environmental health. Within the interdisciplinary research network Sex/Gender-Environment-Health (GeUmGe-NET) the current state of integration of sex/gender aspects or, respectively, gender theoretical concepts into research was systematically assessed within selected topics of the research areas environmental toxicology, environmental medicine, environmental epidemiology and public health research on environment and health. Knowledge gaps and research needs were identified in all research areas. Furthermore, the potential for methodological advancements by using gender theoretical concepts was depicted. A dialogue between biomedical research, public health research, and gender studies was started with the research network GeUmGe-NET. This dialogue has to be continued particularly regarding a common testing of methodological innovations in data collection and data analysis. Insights of this interdisciplinary research are relevant for practice areas such as environmental health protection, health promotion, environmental justice, and environmental health monitoring.

  8. A Unified Network Security Architecture for Large, Distributed Networks, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — In typical, multi-organizational networking environments, it is difficult to define and maintain a uniform authentication scheme that provides users with easy access...

  9. Ideomotor feedback control in a recurrent neural network.

    Science.gov (United States)

    Galtier, Mathieu

    2015-06-01

    The architecture of a neural network controlling an unknown environment is presented. It is based on a randomly connected recurrent neural network from which both perception and action are simultaneously read and fed back. There are two concurrent learning rules implementing a sort of ideomotor control: (i) perception is learned along the principle that the network should predict reliably its incoming stimuli; (ii) action is learned along the principle that the prediction of the network should match a target time series. The coherent behavior of the neural network in its environment is a consequence of the interaction between the two principles. Numerical simulations show a promising performance of the approach, which can be turned into a local and better "biologically plausible" algorithm.

  10. Design of RFID Cloud Services in a Low Bandwidth Network Environment

    Directory of Open Access Journals (Sweden)

    John P.T. Mo

    2011-02-01

    Full Text Available The use of Information and Communication Technologies has significantly improved the efficiency of modern supply chains. Existing IT architecture is too rigid to allow new technologies such as RFID technologies to be implemented. With the aid of virtualisation and integrated with cloud services, infrastructure hardware and network devices can be consolidated into a physical device, reducing the cost of ownership. However, for such cloud services model to work correctly, a high speed network is required between each site and the cloud service provider. This poses huge challenges for real‐time system such as RFID‐enabled supply chains. Since modern supply chains operate on a global platform, it is almost impossible to assure availability of high speed networks across the global supply chain. This paper proposes two solutions to supplement the virtualisation and cloud services model. A sub‐cloud services solution, where each service is distributed across multiple hosts across different countries and regions is proposed to enhance accessibility to higher bandwidth networks. The second solution is the Queued Burst Device Compression system incorporates a compression service that compresses RFID data sets into much smaller packages. This solution is proved to work by a multiple‐in‐single‐out queuing model and is suitable for low bandwidth networks such as GPRS and 3G wireless environmenst.

  11. Bayesian network learning for natural hazard assessments

    Science.gov (United States)

    Vogel, Kristin

    2016-04-01

    and incomplete observations. Further studies rise the challenge of relying on very small data sets. Since parameter estimates for complex models based on few observations are unreliable, it is necessary to focus on simplified, yet still meaningful models. A so called Markov Blanket approach is developed to identify the most relevant model components and to construct a simple Bayesian network based on those findings. Since the proceeding is completely data driven, it can easily be transferred to various applications in natural hazard domains. This study is funded by the Deutsche Forschungsgemeinschaft (DFG) within the research training programme GRK 2043/1 "NatRiskChange - Natural hazards and risks in a changing world" at Potsdam University.

  12. A SVM-based quantitative fMRI method for resting-state functional network detection.

    Science.gov (United States)

    Song, Xiaomu; Chen, Nan-kuei

    2014-09-01

    Resting-state functional magnetic resonance imaging (fMRI) aims to measure baseline neuronal connectivity independent of specific functional tasks and to capture changes in the connectivity due to neurological diseases. Most existing network detection methods rely on a fixed threshold to identify functionally connected voxels under the resting state. Due to fMRI non-stationarity, the threshold cannot adapt to variation of data characteristics across sessions and subjects, and generates unreliable mapping results. In this study, a new method is presented for resting-state fMRI data analysis. Specifically, the resting-state network mapping is formulated as an outlier detection process that is implemented using one-class support vector machine (SVM). The results are refined by using a spatial-feature domain prototype selection method and two-class SVM reclassification. The final decision on each voxel is made by comparing its probabilities of functionally connected and unconnected instead of a threshold. Multiple features for resting-state analysis were extracted and examined using an SVM-based feature selection method, and the most representative features were identified. The proposed method was evaluated using synthetic and experimental fMRI data. A comparison study was also performed with independent component analysis (ICA) and correlation analysis. The experimental results show that the proposed method can provide comparable or better network detection performance than ICA and correlation analysis. The method is potentially applicable to various resting-state quantitative fMRI studies. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  14. Next Generation Reliable Transport Networks

    DEFF Research Database (Denmark)

    Zhang, Jiang

    the wavelength and fiber assignment problem is proposed and implemented for avionic optical transport networks. Simulation results give out resource consumptions and prove the efficiency of the proposed mechanisms. Finally, a Home Environment Service Knowledge Management system is proposed. Through ontology...... technologies, a knowledge base is constructed to represent the whole information of a home environment. By applying the reasoner tool, the proposed system manages to keep the consistency in a home environment and helps all software configure and update procedures across multiple vendors....... of criticality and security, there are certain physical or logical segregation requirements between the avionic systems. Such segregations can be implemented on the proposed avionic networks with different hierarchies. In order to fulfill the segregation requirements, a tailored heuristic approach for solving...

  15. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  16. Distributed autonomous mapping of indoor environments

    Science.gov (United States)

    Rogers, J.; Paluri, M.; Cunningham, A.; Christensen, H. I.; Michael, N.; Kumar, V.; Ma, J.; Matthies, L.

    2011-06-01

    This paper describes the results of a Joint Experiment performed on behalf of the MAST CTA. The system developed for the Joint Experiment makes use of three robots which work together to explore and map an unknown environment. Each of the robots used in this experiment is equipped with a laser scanner for measuring walls and a camera for locating doorways. Information from both of these types of structures is concurrently incorporated into each robot's local map using a graph based SLAM technique. A Distributed-Data-Fusion algorithm is used to efficiently combine local maps from each robot into a shared global map. Each robot computes a compressed local feature map and transmits it to neighboring robots, which allows each robot to merge its map with the maps of its neighbors. Each robot caches the compressed maps from its neighbors, allowing it to maintain a coherent map with a common frame of reference. The robots utilize an exploration strategy to efficiently cover the unknown environment which allows collaboration on an unreliable communications channel. As each new branching point is discovered by a robot, it broadcasts the information about where this point is along with the robot's path from a known landmark to the other robots. When the next robot reaches a dead-end, new branching points are allocated by auction. In the event of communication interruption, the robot which observed the branching point will eventually explore it; therefore, the exploration is complete in the face of communication failure.

  17. Neural Networks in Mobile Robot Motion

    Directory of Open Access Journals (Sweden)

    Danica Janglová

    2004-03-01

    Full Text Available This paper deals with a path planning and intelligent control of an autonomous robot which should move safely in partially structured environment. This environment may involve any number of obstacles of arbitrary shape and size; some of them are allowed to move. We describe our approach to solving the motion-planning problem in mobile robot control using neural networks-based technique. Our method of the construction of a collision-free path for moving robot among obstacles is based on two neural networks. The first neural network is used to determine the “free” space using ultrasound range finder data. The second neural network “finds” a safe direction for the next robot section of the path in the workspace while avoiding the nearest obstacles. Simulation examples of generated path with proposed techniques will be presented.

  18. Remote Monitoring of Post-eruption Volcano Environment Based-On Wireless Sensor Network (WSN): The Mount Sinabung Case

    Science.gov (United States)

    Soeharwinto; Sinulingga, Emerson; Siregar, Baihaqi

    2017-01-01

    An accurate information can be useful for authorities to make good policies for preventive and mitigation after volcano eruption disaster. Monitoring of environmental parameters of post-eruption volcano provides an important information for authorities. Such monitoring system can be develop using the Wireless Network Sensor technology. Many application has been developed using the Wireless Sensor Network technology, such as floods early warning system, sun radiation mapping, and watershed monitoring. This paper describes the implementation of a remote environment monitoring system of mount Sinabung post-eruption. The system monitor three environmental parameters: soil condition, water quality and air quality (outdoor). Motes equipped with proper sensors, as components of the monitoring system placed in sample locations. The measured value from the sensors periodically sends to data server using 3G/GPRS communication module. The data can be downloaded by the user for further analysis.The measurement and data analysis results generally indicate that the environmental parameters in the range of normal/standard condition. The sample locations are safe for living and suitable for cultivation, but awareness is strictly required due to the uncertainty of Sinabung status.

  19. Network motif frequency vectors reveal evolving metabolic network organisation.

    Science.gov (United States)

    Pearcy, Nicole; Crofts, Jonathan J; Chuzhanova, Nadia

    2015-01-01

    At the systems level many organisms of interest may be described by their patterns of interaction, and as such, are perhaps best characterised via network or graph models. Metabolic networks, in particular, are fundamental to the proper functioning of many important biological processes, and thus, have been widely studied over the past decade or so. Such investigations have revealed a number of shared topological features, such as a short characteristic path-length, large clustering coefficient and hierarchical modular structure. However, the extent to which evolutionary and functional properties of metabolism manifest via this underlying network architecture remains unclear. In this paper, we employ a novel graph embedding technique, based upon low-order network motifs, to compare metabolic network structure for 383 bacterial species categorised according to a number of biological features. In particular, we introduce a new global significance score which enables us to quantify important evolutionary relationships that exist between organisms and their physical environments. Using this new approach, we demonstrate a number of significant correlations between environmental factors, such as growth conditions and habitat variability, and network motif structure, providing evidence that organism adaptability leads to increased complexities in the resultant metabolic networks.

  20. Networking: You Can't Do It Alone, But....

    Science.gov (United States)

    Fley, JoAnn

    1986-01-01

    Discusses how networking provides an effective means of learning about one's environment and of gaining help and support in improving it. The process of networking is examined through case studies. The difference between networking and organizing is also discussed. (CT)