WorldWideScience

Sample records for network illegal file-sharing

  1. Controlling P2P File-Sharing Networks Traffic

    OpenAIRE

    García Pineda, Miguel; HAMMOUMI, MOHAMMED; Canovas Solbes, Alejandro; Lloret, Jaime

    2011-01-01

    Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many Internet users have chosen this technology to share and search programs, videos, music, documents, etc. The total number of P2P file-sharing users has been increasing and decreasing in the last decade depending on the creation or end of some well known P2P file-sharing systems. P2P file-sharing networks traffic is currently overloading some data networks and it is a major headache for netw...

  2. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  3. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  4. Characteristics of file sharing and peer to peer networking | Opara ...

    African Journals Online (AJOL)

    Characteristics of file sharing and peer to peer networking. ... distributing or providing access to digitally stored information, such as computer programs, ... including in multicast systems, anonymous communications systems, and web caches.

  5. Reliable file sharing in distributed operating system using web RTC

    Science.gov (United States)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  6. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  7. Kwaabana: File sharing for rural networks

    CSIR Research Space (South Africa)

    Johnson, DL

    2013-12-01

    Full Text Available , Zambia. The results show that our localized file sharing service facilitates reliable sharing amongst rural users. Importantly, it also removes the cost barrier present for similar Internet-based services. We outline the process used by Kwaabana...

  8. Competitive Status Signaling in Peer-to-Peer File-Sharing Networks

    Directory of Open Access Journals (Sweden)

    Henry F. Lyle

    2007-04-01

    Full Text Available Internet peer-to-peer file sharing is a contemporary example of asymmetrical sharing in which “altruists” (file uploaders share unconditionally with non-reciprocating “free riders” (file downloaders. Those who upload digital media files over the Internet risk prosecution for copyright infringement, and are more vulnerable to computer hackers and viruses. In an analysis of file-sharing behavior among university undergraduates (N=331, we found that significantly more males than females engaged in risky file uploading. Contrary to expectations, uploaders were not concerned about their reputation online and file sharers were not interested in identifying or chatting with uploaders while online. Among uploaders, males were more likely than females to be identified as uploaders by friends, to discuss uploading and to upload in the presence of peers. We interpret these results using costly-signaling theory, and argue that uploading is a costly signal in which males engage in avoidable risk taking as a means to compete for status among peers in social contexts other than the Internet.

  9. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems

    Directory of Open Access Journals (Sweden)

    Mo Zhou

    2007-01-01

    Full Text Available The architecture of P2P file-sharing applications has been developing to meet the needs of large scale demands. The structured overlay network, also known as DHT, has been used in these applications to improve the scalability, and robustness of the system, and to make it free from single-point failure. We believe that the measurement study of the overlay network used in the real file-sharing P2P systems can provide guidance for the designing of such systems, and improve the performance of the system. In this paper, we perform the measurement in two different aspects. First, a modified client is designed to provide view to the overlay network from a single-user vision. Second, the instances of crawler programs deployed in many nodes managed to crawl the user information of the overlay network as much as possible. We also find a vulnerability in the overlay network, combined with the character of the DNS service, a more serious DDoS attack can be launched.

  10. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  11. Folksonomical P2P File Sharing Networks Using Vectorized KANSEI Information as Search Tags

    Science.gov (United States)

    Ohnishi, Kei; Yoshida, Kaori; Oie, Yuji

    We present the concept of folksonomical peer-to-peer (P2P) file sharing networks that allow participants (peers) to freely assign structured search tags to files. These networks are similar to folksonomies in the present Web from the point of view that users assign search tags to information distributed over a network. As a concrete example, we consider an unstructured P2P network using vectorized Kansei (human sensitivity) information as structured search tags for file search. Vectorized Kansei information as search tags indicates what participants feel about their files and is assigned by the participant to each of their files. A search query also has the same form of search tags and indicates what participants want to feel about files that they will eventually obtain. A method that enables file search using vectorized Kansei information is the Kansei query-forwarding method, which probabilistically propagates a search query to peers that are likely to hold more files having search tags that are similar to the query. The similarity between the search query and the search tags is measured in terms of their dot product. The simulation experiments examine if the Kansei query-forwarding method can provide equal search performance for all peers in a network in which only the Kansei information and the tendency with respect to file collection are different among all of the peers. The simulation results show that the Kansei query forwarding method and a random-walk-based query forwarding method, for comparison, work effectively in different situations and are complementary. Furthermore, the Kansei query forwarding method is shown, through simulations, to be superior to or equal to the random-walk based one in terms of search speed.

  12. Online file sharing innovations in media consumption

    CERN Document Server

    Andersson Schwarz, Jonas

    2013-01-01

    It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, ""piracy,"" and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality th

  13. OK, Computer: File Sharing, the Music Industry, and Why We Need the Pirate Party

    Directory of Open Access Journals (Sweden)

    Adrian Cosstick

    2009-03-01

    Full Text Available The Pirate Party believes the state and big business are in the process of protecting stale and inefficient models of business for their own monetary benefit by limiting our right to share information. The Pirate Party suggests that they are achieving this goal through the amendment of intellectual property legislation. In the dawn of the digital era, the Pirate Party advocates that governments and multinational corporations are using intellectual property to: crack down on file sharing which limits the ability to share knowledge and information; increase the terms and length of copyright to raise profits; and build code into music files which limits their ability to be shared (Pirate Party, 2009. There are a number of ‘copyright industries’ that are affected by these issues, none more so than the music industry. Its relationship with file sharing is topical and makes an excellent case study to address the impact big business has had on intellectual property and the need for the Pirate Party’s legislative input. The essay will then examine the central issues raised by illegal file sharing. In particular, the future for record companies in an environment that increasingly demands flexibility, and whether the Pirate Party’s proposal is a viable solution to the music industry’s problems

  14. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  15. Evolutionary Game Theory-Based Evaluation of P2P File-Sharing Systems in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Yusuke Matsuda

    2010-01-01

    Full Text Available Peer-to-Peer (P2P file sharing is one of key technologies for achieving attractive P2P multimedia social networking. In P2P file-sharing systems, file availability is improved by cooperative users who cache and share files. Note that file caching carries costs such as storage consumption and processing load. In addition, users have different degrees of cooperativity in file caching and they are in different surrounding environments arising from the topological structure of P2P networks. With evolutionary game theory, this paper evaluates the performance of P2P file sharing systems in such heterogeneous environments. Using micro-macro dynamics, we analyze the impact of the heterogeneity of user selfishness on the file availability and system stability. Further, through simulation experiments with agent-based dynamics, we reveal how other aspects, for example, synchronization among nodes and topological structure, affect the system performance. Both analytical and simulation results show that the environmental heterogeneity contributes to the file availability and system stability.

  16. Peer-to-Peer Content Distribution and Over-The-Top TV: An Analysis of Value Networks

    Science.gov (United States)

    de Boever, Jorn; de Grooff, Dirk

    The convergence of Internet and TV, i.e., the Over-The-Top TV (OTT TV) paradigm, created opportunities for P2P content distribution as these systems reduce bandwidth expenses for media companies. This resulted in the arrival of legal, commercial P2P systems which increases the importance of studying economic aspects of these business operations. This chapter examines the value networks of three cases (Kontiki, Zattoo and bittorrent) in order to compare how different actors position and distinguish themselves from competitors by creating value in different ways. The value networks of legal systems have different compositions depending on their market orientation - Business-to-Business (B2B) and/or Businessto- Consumer (B2C). In addition, legal systems differ from illegal systems as legal companies are not inclined to grant control to users, whereas users havemost control in value networks of illegal, self-organizing file sharing communities. In conclusion, the OTT TV paradigm made P2P technology a partner for the media industry rather than an enemy. However, we argue that the lack of control granted to users will remain a seed-bed for the success of illegal P2P file sharing communities.

  17. Illegal trade of tortoises (Testudinata) in Colombia: A network analysis approach

    International Nuclear Information System (INIS)

    Arroyave Bermudez, Felber Jair; Romero Goyeneche, Oscar Yandy; Bonilla Gomez, Maria Argenis; Hurtado Heredia, Rafael German

    2014-01-01

    The use of wildlife is important for supporting the economic and demographic growth in emerging countries. Nevertheless, the products of wildlife usually come from illegal trade to supply fur, wild meat and pet markets. Illegal trade puts great pressure over wild populations and threats some endangered species. In Colombia, the trade of wildlife is important because of the volumes traded and the cultural and economic connotation of some products. We describe the spatial structure of illegal trade of wildlife at departmental level for the five most traded genera of Colombian tortoises (Trachemys, Chelonoidis, Kinosternon, Podocnemis and Rhinoclemmys). This study is based on the reports of seizures between 2005 and 2009 compiled by the Ministerio de Medio Ambiente y Desarrollo of Colombia. We apply network analysis to study and evidence that the illegal trade network of tortoises includes international markets and supplies the Andean region. The Caribbean, Pacific and Orinoquia regions are the principal suppliers. Quindio, Santander, Antioquia and Putumayo are the biggest jobbers and consumers of wild tortoises. We propose sociocultural and cohercitive actions to fragment the trade network and their illegal market as well as promoting the conservation and sustainable use of tortoises.

  18. Benchmarking and monitoring framework for interconnected file synchronization and sharing services

    DEFF Research Database (Denmark)

    Mrówczyński, Piotr; Mościcki, Jakub T.; Lamanna, Massimo

    2018-01-01

    computing and storage infrastructure in the research labs. In this work we present a benchmarking and monitoring framework for file synchronization and sharing services. It allows service providers to monitor the operational status of their services, understand the service behavior under different load...... types and with different network locations of the synchronization clients. The framework is designed as a monitoring and benchmarking tool to provide performance and robustness metrics for interconnected file synchronization and sharing services such as Open Cloud Mesh....

  19. Implementing Journaling in a Linux Shared Disk File System

    Science.gov (United States)

    Preslan, Kenneth W.; Barry, Andrew; Brassow, Jonathan; Cattelan, Russell; Manthei, Adam; Nygaard, Erling; VanOort, Seth; Teigland, David; Tilstra, Mike; O'Keefe, Matthew; hide

    2000-01-01

    In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channel and Gigabit Ethernet provide the scaffolding from which higher performance computer systems implementations may be constructed, but new thinking is required about how machines interact with network-enabled storage devices. In this paper we describe how we implemented journaling in the Global File System (GFS), a shared-disk, cluster file system for Linux. Our previous three papers on GFS at the Mass Storage Symposium discussed our first three GFS implementations, their performance, and the lessons learned. Our fourth paper describes, appropriately enough, the evolution of GFS version 3 to version 4, which supports journaling and recovery from client failures. In addition, GFS scalability tests extending to 8 machines accessing 8 4-disk enclosures were conducted: these tests showed good scaling. We describe the GFS cluster infrastructure, which is necessary for proper recovery from machine and disk failures in a collection of machines sharing disks using GFS. Finally, we discuss the suitability of Linux for handling the big data requirements of supercomputing centers.

  20. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  1. Do Illegal Copies of Movies Reduce the Revenue of Legal Products? The case of TV animation in Japan (Japanese)

    OpenAIRE

    TANAKA Tatsuo

    2011-01-01

    Whether or not illegal copies circulating on the internet reduce the sales of legal products has been a hot issue in the entertainment industries. Though much empirical research has been conducted on the music industry, research on the movie industry has been very limited. This paper examines the effects of the movie sharing site Youtube and file sharing program Winny on DVD sales and rentals of Japanese TV animation programs. Estimated equations of 105 anime episodes show that (1) Youtube vi...

  2. Risks, prices, and positions: A social network analysis of illegal drug trafficking in the world-economy.

    Science.gov (United States)

    Boivin, Rémi

    2014-03-01

    Illegal drug prices are extremely high, compared to similar goods. There is, however, considerable variation in value depending on place, market level and type of drugs. A prominent framework for the study of illegal drugs is the "risks and prices" model (Reuter & Kleiman, 1986). Enforcement is seen as a "tax" added to the regular price. In this paper, it is argued that such economic models are not sufficient to explain price variations at country-level. Drug markets are analysed as global trade networks in which a country's position has an impact on various features, including illegal drug prices. This paper uses social network analysis (SNA) to explain price markups between pairs of countries involved in the trafficking of illegal drugs between 1998 and 2007. It aims to explore a simple question: why do prices increase between two countries? Using relational data from various international organizations, separate trade networks were built for cocaine, heroin and cannabis. Wholesale price markups are predicted with measures of supply, demand, risks of seizures, geographic distance and global positioning within the networks. Reported prices (in $US) and purchasing power parity-adjusted values are analysed. Drug prices increase more sharply when drugs are headed to countries where law enforcement imposes higher costs on traffickers. The position and role of a country in global drug markets are also closely associated with the value of drugs. Price markups are lower if the destination country is a transit to large potential markets. Furthermore, price markups for cocaine and heroin are more pronounced when drugs are exported to countries that are better positioned in the legitimate world-economy, suggesting that relations in legal and illegal markets are directed in opposite directions. Consistent with the world-system perspective, evidence is found of coherent world drug markets driven by both local realities and international relations. Copyright © 2013 Elsevier B

  3. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  4. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    Science.gov (United States)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  5. Zebra: A striped network file system

    Science.gov (United States)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  6. Automatic creation of LabVIEW network shared variables

    International Nuclear Information System (INIS)

    Kluge, T.; Schroeder, H.

    2012-01-01

    We are in the process of preparing the LabVIEW controlled system components of our Solid State Direct Drive experiments for the integration into a Supervisory Control And Data Acquisition (SCADA) or distributed control system. The predetermined route to this is the generation of LabVIEW network shared variables that can easily be exported by LabVIEW to the SCADA system using OLE for Process Control (OPC) or other means. Many repetitive tasks are associated with the creation of the shared variables and the required code. We are introducing an efficient and inexpensive procedure that automatically creates shared variable libraries and sets default values for the shared variables. Furthermore, LabVIEW controls are created that are used for managing the connection to the shared variable inside the LabVIEW code operating on the shared variables. The procedure takes as input an XML spread-sheet defining the required input. The procedure utilizes XSLT and LabVIEW scripting. In a later state of the project the code generation can be expanded to also create code and configuration files that will become necessary in order to access the shared variables from the SCADA system of choice. (authors)

  7. The Global File System

    Science.gov (United States)

    Soltis, Steven R.; Ruwart, Thomas M.; OKeefe, Matthew T.

    1996-01-01

    The global file system (GFS) is a prototype design for a distributed file system in which cluster nodes physically share storage devices connected via a network-like fiber channel. Networks and network-attached storage devices have advanced to a level of performance and extensibility so that the previous disadvantages of shared disk architectures are no longer valid. This shared storage architecture attempts to exploit the sophistication of storage device technologies whereas a server architecture diminishes a device's role to that of a simple component. GFS distributes the file system responsibilities across processing nodes, storage across the devices, and file system resources across the entire storage pool. GFS caches data on the storage devices instead of the main memories of the machines. Consistency is established by using a locking mechanism maintained by the storage devices to facilitate atomic read-modify-write operations. The locking mechanism is being prototyped in the Silicon Graphics IRIX operating system and is accessed using standard Unix commands and modules.

  8. Efficient File Sharing by Multicast - P2P Protocol Using Network Coding and Rank Based Peer Selection

    Science.gov (United States)

    Stoenescu, Tudor M.; Woo, Simon S.

    2009-01-01

    In this work, we consider information dissemination and sharing in a distributed peer-to-peer (P2P highly dynamic communication network. In particular, we explore a network coding technique for transmission and a rank based peer selection method for network formation. The combined approach has been shown to improve information sharing and delivery to all users when considering the challenges imposed by the space network environments.

  9. The Jade File System. Ph.D. Thesis

    Science.gov (United States)

    Rao, Herman Chung-Hwa

    1991-01-01

    File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems, such as Unix, support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. Four characteristics of scalability were recognized: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. The Jade File System, which provides a uniform way to name and access files in the internet environment, is presented. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: (1) it allows multiple file systems to be mounted under one direction; and (2) it permits one logical name space to mount other logical name spaces. A prototype of Jade was implemented to examine and validate its

  10. Digital music and subculture: Sharing files, sharing styles (originally published in February 2004)

    OpenAIRE

    Ebare, Sean

    2005-01-01

    Digital music and subculture: Sharing files, sharing styles by Sean Ebare In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around iss...

  11. Ethics and the Challenge of ICT: Advisory Note for Users and IT ...

    African Journals Online (AJOL)

    and web traffic), is it still acceptable? The implications of file-sharing media (often illegal anyway) and internet ... Having a good relationship with your client is a big .... [ 3] Osuagwu O.E. (2005) Data communications and network engineering ...

  12. SHARAF: The Canadian Shared Authority File Project.

    Science.gov (United States)

    MacIntosh, Helen

    1982-01-01

    Describes history, operating procedures, and current activities of group of users of the University of Toronto Library Automation System (UTLAS) who cooperated with each other, the bibliographic utility, and the National Library of Canada to produce an automated authority control system, termed Shared Authority File (SHARAF). Five references are…

  13. Elvis is returning to the building: understanding a decline in unauthorized file sharing

    NARCIS (Netherlands)

    Poort, J.; Weda, J.

    2015-01-01

    A set of representative consumer surveys shows that in the Netherlands unauthorized file sharing of music has declined substantially between 2008 and 2012. It decreased slightly for games, but almost doubled for films and TV series. Overall, file sharing dropped from 38% to 27% of the population.

  14. Author's rights in the digital age: how Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs

    Directory of Open Access Journals (Sweden)

    Milijana Micunovic

    2016-01-01

    Full Text Available Author's rights and copyright law have gone through quite a few changes in the 'post-print' culture of binary systems, digital formations and techno-practices. Technological development supports new concept of author's rights by promoting free internet and digital market, as well as new contemporary experience of culture that is being rooted in digital technology, mass communication and the world of multimedia and virtuality. Though computer and digital technology have served both authors and users in various ways, they have also served as a very fertile ground for sharing copyrighted content thus leading to numerous copyright infringements and conflicts with the copyright law. The aim of this paper is to identify and analyze the ways in which computer and digital technology have given rise to new trends in the production (e.g. remix culture and consumption (e.g. peer-to-peer file sharing technology of culture, but also to determine how new forms of distribution, use and sharing of digital content changed and shaped the perception of authorship in the 21st century. In order to analyze the dynamic, nature and structure by which new digital and networking technologies are affecting the concept of authorship and author's rights and to test the consistency of previously established hypotheses, we conducted a survey amongst general public. Altogether 535 questionnaires were completed. Data was analyzed using SPSS tool and quantitative method of analysis. In the analysis special attention was given to both, the concept of authorship in the digital environment and the concept of peer-to-peer file sharing technology as not so new, but still very popular networked architecture for distributing, using and sharing digital content. Results have shown that most of the respondents use peer-to-peer file sharing technology to access, consume and/or share different cultural content (e.g. movies, music, books, etc. while violating the rights of copyright holders

  15. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    NARCIS (Netherlands)

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  16. Legal, economic and cultural aspects of file sharing

    NARCIS (Netherlands)

    van Eijk, N.; Poort, J.P.; Rutten, P.

    2010-01-01

    This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the

  17. Illegal markets: Estimates of global proceeds

    Directory of Open Access Journals (Sweden)

    Marinković Darko M.

    2015-01-01

    Full Text Available Illegal markets represent a phenomenon of considerable economic, political and social significance whose annual income exceeds the value of a thousand billion USD. Illegal market participants are beyond the reach of government institutions and rule of law while social connections and personal acquaintances play an important role of functional substitute. In the last decade there was a significant increase of illegal trafficking of narcotics, people, fire arms, counterfeit products and natural resources. Both selling and purchase of these as well as other kinds of products and services at illegal markets are generally characterized by high level of organization and presence of strong criminal groups and networks. Although these activities existed in the past their present scope and geographic distribution are without precedent. Measuring unlawful financial flows at illegal markets represents quite a complex task. Various estimates are the result of inexistence of uniform and generally accepted methodology. In addition to this, the special problem is also the consensus of market actors, because of which the phenomenon of illegal markets and distribution of products and services at these markets is rather hidden. The paper defines and analyzes the key features of illegal markets, the role of organized crime at illegal markets, as well as the estimates of the values of financial flows at the markets of counterfeit products, narcotics, and people as goods, or human organs and sexual services, weapons, tobacco products and dirty money.

  18. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  19. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  20. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  1. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  2. The national drug abuse treatment clinical trials network data share project: website design, usage, challenges, and future directions.

    Science.gov (United States)

    Shmueli-Blumberg, Dikla; Hu, Lian; Allen, Colleen; Frasketi, Michael; Wu, Li-Tzy; Vanveldhuisen, Paul

    2013-01-01

    There are many benefits of data sharing, including the promotion of new research from effective use of existing data, replication of findings through re-analysis of pooled data files, meta-analysis using individual patient data, and reinforcement of open scientific inquiry. A randomized controlled trial is considered as the 'gold standard' for establishing treatment effectiveness, but clinical trial research is very costly, and sharing data is an opportunity to expand the investment of the clinical trial beyond its original goals at minimal costs. We describe the goals, developments, and usage of the Data Share website (http://www.ctndatashare.org) for the National Drug Abuse Treatment Clinical Trials Network (CTN) in the United States, including lessons learned, limitations, and major revisions, and considerations for future directions to improve data sharing. Data management and programming procedures were conducted to produce uniform and Health Insurance Portability and Accountability Act (HIPAA)-compliant de-identified research data files from the completed trials of the CTN for archiving, managing, and sharing on the Data Share website. Since its inception in 2006 and through October 2012, nearly 1700 downloads from 27 clinical trials have been accessed from the Data Share website, with the use increasing over the years. Individuals from 31 countries have downloaded data from the website, and there have been at least 13 publications derived from analyzing data through the public Data Share website. Minimal control over data requests and usage has resulted in little information and lack of control regarding how the data from the website are used. Lack of uniformity in data elements collected across CTN trials has limited cross-study analyses. The Data Share website offers researchers easy access to de-identified data files with the goal to promote additional research and identify new findings from completed CTN studies. To maximize the utility of the website

  3. 47 CFR 27.1305 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  4. 47 CFR 90.1405 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  5. Ethical considerations of using information obtained from online file sharing sites: The case of the piratebay

    NARCIS (Netherlands)

    van Wynsberghe, Amy Louise; van der Ham, Jeroen

    2015-01-01

    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the

  6. Ethical considerations of using information obtained from online file sharing sites : The case of the piratebay

    NARCIS (Netherlands)

    van Wynsberghe, A.; van der Ham, J.

    2015-01-01

    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the

  7. COMBINE archive and OMEX format: one file to share all information to reproduce a modeling project.

    Science.gov (United States)

    Bergmann, Frank T; Adams, Richard; Moodie, Stuart; Cooper, Jonathan; Glont, Mihai; Golebiewski, Martin; Hucka, Michael; Laibe, Camille; Miller, Andrew K; Nickerson, David P; Olivier, Brett G; Rodriguez, Nicolas; Sauro, Herbert M; Scharm, Martin; Soiland-Reyes, Stian; Waltemath, Dagmar; Yvon, Florent; Le Novère, Nicolas

    2014-12-14

    With the ever increasing use of computational models in the biosciences, the need to share models and reproduce the results of published studies efficiently and easily is becoming more important. To this end, various standards have been proposed that can be used to describe models, simulations, data or other essential information in a consistent fashion. These constitute various separate components required to reproduce a given published scientific result. We describe the Open Modeling EXchange format (OMEX). Together with the use of other standard formats from the Computational Modeling in Biology Network (COMBINE), OMEX is the basis of the COMBINE Archive, a single file that supports the exchange of all the information necessary for a modeling and simulation experiment in biology. An OMEX file is a ZIP container that includes a manifest file, listing the content of the archive, an optional metadata file adding information about the archive and its content, and the files describing the model. The content of a COMBINE Archive consists of files encoded in COMBINE standards whenever possible, but may include additional files defined by an Internet Media Type. Several tools that support the COMBINE Archive are available, either as independent libraries or embedded in modeling software. The COMBINE Archive facilitates the reproduction of modeling and simulation experiments in biology by embedding all the relevant information in one file. Having all the information stored and exchanged at once also helps in building activity logs and audit trails. We anticipate that the COMBINE Archive will become a significant help for modellers, as the domain moves to larger, more complex experiments such as multi-scale models of organs, digital organisms, and bioengineering.

  8. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  9. Cooperative storage of shared files in a parallel computing system with dynamic block size

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-11-10

    Improved techniques are provided for parallel writing of data to a shared object in a parallel computing system. A method is provided for storing data generated by a plurality of parallel processes to a shared object in a parallel computing system. The method is performed by at least one of the processes and comprises: dynamically determining a block size for storing the data; exchanging a determined amount of the data with at least one additional process to achieve a block of the data having the dynamically determined block size; and writing the block of the data having the dynamically determined block size to a file system. The determined block size comprises, e.g., a total amount of the data to be stored divided by the number of parallel processes. The file system comprises, for example, a log structured virtual parallel file system, such as a Parallel Log-Structured File System (PLFS).

  10. Social Networking Adapted for Distributed Scientific Collaboration

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    Share is a social networking site with novel, specially designed feature sets to enable simultaneous remote collaboration and sharing of large data sets among scientists. The site will include not only the standard features found on popular consumer-oriented social networking sites such as Facebook and Myspace, but also a number of powerful tools to extend its functionality to a science collaboration site. A Virtual Observatory is a promising technology for making data accessible from various missions and instruments through a Web browser. Sci-Share augments services provided by Virtual Observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase science returns from NASA missions. Sci-Share also enables better utilization of NASA s high-performance computing resources by providing an easy and central mechanism to access and share large files on users space or those saved on mass storage. The most common means of remote scientific collaboration today remains the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. Each of these tools has well-known limitations. Sci-Share transforms the social networking paradigm into a scientific collaboration environment by offering powerful tools for cooperative discourse and digital content sharing. Sci-Share differentiates itself by serving as an online repository for users digital content with the following unique features: a) Sharing of any file type, any size, from anywhere; b) Creation of projects and groups for controlled sharing; c) Module for sharing files on HPC (High Performance Computing) sites; d) Universal accessibility of staged files as embedded links on other sites (e.g. Facebook) and tools (e.g. e-mail); e) Drag-and-drop transfer of large files, replacing awkward e-mail attachments (and file size limitations); f) Enterprise-level data and

  11. The Use of Violence in Illegal Markets: Evidence from Mahogany Trade in the Brazilian Amazon

    OpenAIRE

    Chimeli, Ariaster B.; Soares, Rodrigo R.

    2011-01-01

    Agents operating in illegal markets cannot resort to the justice system to guarantee property rights, to enforce contracts, or to seek protection from competitors' improper behaviors. In these contexts, violence is used to enforce previous agreements and to fight for market share. This relationship plays a major role in the debate on the pernicious effects of the illegality of drug trade. This paper explores a singular episode of transition of a market from legal to illegal to provide a first...

  12. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  13. DYNAMICS OF THE ROMANIAN ILLEGAL DRUG MARKETS

    Directory of Open Access Journals (Sweden)

    Irina Caunic

    2011-06-01

    Full Text Available Globalization has led to an increase in commercial activities running on the illegal markets, its dynamics being largely determined by the balance between profitability and the major risks involved. Revenuesare significant, one example being those obtained from drug industry. In recent years, illicit drug trafficking has seen in Romania an unprecedented escalation, as a result of market liberalization and the movement of per sons and because of the extending the phenomenon both among producers and consumers. This article examines the size of the Romanian illegal drug markets, the countries of origin and drugtransit routes, as well as the profits made by the drug trafficking networks.

  14. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  15. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  16. Forestry, illegibility and illegality in Omkoi, Northwest Thailand

    Directory of Open Access Journals (Sweden)

    Bobby Anderson

    2007-11-01

    Full Text Available Opium poppy cultivation in Thailand fell from 12,112 hectares in 1961 to 281 ha in 2015. One outlier exists: Chiang Mai province’s remote southwestern district, Omkoi. 90% of the district is a national forest reserve where human habitation is illegal. However, an ethnic Karen population has lived there since long before the law that outlawed them was created, unconnected to the state by road, with limited or no access to health, education and other services: they cultivate the majority of Thailand’s known opium poppy, because they have little other choice. They increasingly rely on cash-based markets, their lack of citizenship precludes them from land tenure which might incentivize them to grow alternate crops, and their statelessness precludes them from services and protections. Nor is the Thai state the singular Leviathan that states are often assumed to be; it is a collection of networks with divergent interests, of whom one of the most powerful, the Royal Forestry Department, has purposely made Omkoi’s population illegible to the state, and has consistently blocked the attempts of other state actors to complexify this state space beyond the simplicity of its forest. These factors make short-term, high-yield, high value, imperishable opium the most logical economic choice for poor Karen farmers residing in this “non-state” space.

  17. International movements, post-apartheid dispensations and illegal immigration into South Africa

    Directory of Open Access Journals (Sweden)

    Kambidima Wotela

    2015-12-01

    Full Text Available Arising from the supposed negative impact of illegal immigration, including security threats as well as recent xenophobic violence, the South African Government would like to counter illegal immigration. To do this, it needs to understand the root causes of illegal immigration into the country. This article, therefore, seeks to explain and interpret why illegal immigrants make South Africa their ideal choice of destination. To provide a context, the article begins with a discussion on the research setting, that is, the South African international boundaries. Thereafter, the article discusses the concept of illegal immigration from the South African context before reviewing literature on the number of illegal immigrants in South Africa and the supposed impact. The article then explores literature on international movements and discusses established migration frameworks that explain and interpret these movements. Lastly, to confirm some facts arising from the review, we interviewed officials that manage illegal immigration as well as detained immigrants. We establish that four migration streams that have created a blended society in Southern Africa sparked illegal immigration into South Africa. The article conclude that the problem of illegal immigration into South Africa is perpetuated by deep-rooted migration networks. Therefore, if the South African Government wants to avert illegal immigration, its policy-makers should examine these roots and take them into account to arrive at a solution that is in sync with the root causes of the problem.

  18. Distributed metadata servers for cluster file systems using shared low latency persistent key-value metadata store

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Pedone, Jr., James M.; Tzelnic, Percy; Ting, Dennis P. J.; Ionkov, Latchesar A.; Grider, Gary

    2017-12-26

    A cluster file system is provided having a plurality of distributed metadata servers with shared access to one or more shared low latency persistent key-value metadata stores. A metadata server comprises an abstract storage interface comprising a software interface module that communicates with at least one shared persistent key-value metadata store providing a key-value interface for persistent storage of key-value metadata. The software interface module provides the key-value metadata to the at least one shared persistent key-value metadata store in a key-value format. The shared persistent key-value metadata store is accessed by a plurality of metadata servers. A metadata request can be processed by a given metadata server independently of other metadata servers in the cluster file system. A distributed metadata storage environment is also disclosed that comprises a plurality of metadata servers having an abstract storage interface to at least one shared persistent key-value metadata store.

  19. File Detection On Network Traffic Using Approximate Matching

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial.Within this paper we present a new technique for network trac analysis based on approximate matching (a.k.a fuzzy hashing which is very common in digital forensics to correlate similar files. This paper demonstrates how to optimize and apply them on single network packets. Our contribution is a straightforward concept which does not need a comprehensive conguration: hash the file and store the digest in the database. Within our experiments we obtained false positive rates between 10-4 and 10-5 and an algorithm throughput of over 650 Mbit/s.

  20. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  1. DAMPAK LARANGAN ILLEGAL LOGGING DAN ILLEGAL MINING TERHADAP PENDAPATAN MASYARAKAT DAERAH PEMEKARAN

    Directory of Open Access Journals (Sweden)

    Suwarno Suwarno

    2012-09-01

    Full Text Available The aim of this research is for knowing the economic impacts of the policy of illegal logging and Illegal Mining ban to the economic society. The method chosen for exploring this study is qualitative method. The research was conducted from January up to August in 2009. The subject is the community of expansion area, Tumbang Samba. Based on this research, it can be concluded that the impact of issuing a policy of illegal logging and Illegal Mining ban is that a decline of income levels occurs, a lot of sawyers become unemployed, furniture and sawmill companies go bankrupt, the society has no longer become illegal gold miners, the ilegal gold mining companies are closed and there are not any immigrants who want to find gold. Tujuan yang hendak dicapai mengetahui dampak ekonomi kebijakan larangan illegal logging dan Illegal Mining terhadap ekonomi masyarakat. Metode yang dipilih untuk menjawab rumusan masalah tersebut adalah kualitatif. Penelitian dilaku¬kan pada bulan Januari-Agustus 2009. Subyek penelitian adalah masyarakat daerah pemekaran Tumbang Samba. Berdasarkan hasil penelitian dapat ditarik kesimpulan sebagai berikut. Pertama, dam¬pak kebijakan larangan illegal logging dan Illegal Mining terhadap ekonomi masyarakat yaitu menurun¬nya tingkat pendapatan masyarakat. Kedua, banyak sekali tenaga penggergaji menjadi menganggur, perusahaan pengergajian tutup, pekerja industri mebelair tutup, masyarakat tidak lagi menjadi buruh tambang emas ilegal, perusahaan tambang emas ilegal tutup dan tidak ada lagi masyarakat pendatang yang ingin mencari emas.

  2. Illegality of international population movements in Poland.

    Science.gov (United States)

    Okolski, M

    2000-01-01

    Until the beginning of the 1990s Poland did not receive foreign migrants. Thereafter, the situation changed dramatically. A large part of the inflow proved to be illegal migrants, many of whom were in transit to Western Europe. Although these movements gradually declined in the second half of the decade, some became increasingly identified with relatively sophisticated smuggling of people. Foreigners smuggled from the South to the West, together with the international criminal networks assisting them, became typical of the migratory movements of people in Central and Eastern Europe during the 1990s. This article seeks to describe illegal migration from the perspective of Poland, a country often perceived as a major transit area in the smuggling of persons to Western Europe. The conclusions draw on the findings of several surveys recently carried out in Poland. Basic concepts related to illegal migration are defined and juxtaposed, and various myths and stereotypes concerning it that most often stem from the paucity of empirical evidence are examined. Finally, the trends observed in Poland are interpreted within the larger context of contemporary European migration.

  3. Becoming less illegal: deservingness frames and undocumented migrant incorporation

    NARCIS (Netherlands)

    Chauvin, S.; Garcés-Mascareñas, B.

    2014-01-01

    Over the last two decades, research on unauthorized migration has departed from the equation of migrant illegality with absolute exclusion, emphasizing that formal exclusion typically results in subordinate inclusion. Irregular migrants integrate through informal support networks, the underground

  4. Fluid limits for Bandwidth-Sharing Networks with Impatience.

    NARCIS (Netherlands)

    Remerova, M.; Reed, J.; Zwart, A.P.

    2014-01-01

    Bandwidth-sharing networks as introduced by Roberts and Massoulié [Roberts JW, Massoulié L (1998) Bandwidth sharing and admission control for elastic traffic. Proc. ITC Specialist Seminar, Yokohama, Japan], Massoulié and Roberts [Massoulié L, Roberts JW (1999) Bandwidth sharing: Objectives and

  5. Tuning chaos in network sharing common nonlinearity

    Science.gov (United States)

    Paul Asir, M.; Jeevarekha, A.; Philominathan, P.

    2016-06-01

    In this paper, a novel type of network called network sharing common nonlinearity comprising both autonomous and non-autonomous oscillators have been investigated. We propose that these networks are robust for operating at desired modes i.e., chaotic or periodic by altering the v-i characteristics of common nonlinear element alone. The dynamics of these networks were examined through numerical, analytical, experimental and Multisim simulations.

  6. Piracy and Music Sales : The Effects of An Anti-Piracy Law

    OpenAIRE

    Adermon, Adrian; Liang, Che-Yuan

    2014-01-01

    The implementation of a copyright protection reform in Sweden in April 2009 suddenly increased the risk of being caught and punished for illegal file sharing. This paper investigates the impact of the reform on illegal file sharing and music sales using a difference-in-differences approach with Norway and Finland as control groups. We find that the reform decreased Internet traffic by 16% and increased music sales by 36% during the first six months. Pirated music therefore seems to be a stron...

  7. Students' Acceptance of File Sharing Systems as a Tool for Sharing Course Materials: The Case of Google Drive

    Science.gov (United States)

    Sadik, Alaa

    2017-01-01

    Students' perceptions about both ease of use and usefulness are fundamental factors in determining their acceptance and successful use of technology in higher education. File sharing systems are one of these technologies and can be used to manage and deliver course materials and coordinate virtual teams. The aim of this study is to explore how…

  8. Summarizing the evidence on the international trade in illegal wildlife.

    Science.gov (United States)

    Rosen, Gail Emilia; Smith, Katherine F

    2010-08-01

    The global trade in illegal wildlife is a multi-billion dollar industry that threatens biodiversity and acts as a potential avenue for invasive species and disease spread. Despite the broad-sweeping implications of illegal wildlife sales, scientists have yet to describe the scope and scale of the trade. Here, we provide the most thorough and current description of the illegal wildlife trade using 12 years of seizure records compiled by TRAFFIC, the wildlife trade monitoring network. These records comprise 967 seizures including massive quantities of ivory, tiger skins, live reptiles, and other endangered wildlife and wildlife products. Most seizures originate in Southeast Asia, a recently identified hotspot for future emerging infectious diseases. To date, regulation and enforcement have been insufficient to effectively control the global trade in illegal wildlife at national and international scales. Effective control will require a multi-pronged approach including community-scale education and empowering local people to value wildlife, coordinated international regulation, and a greater allocation of national resources to on-the-ground enforcement.

  9. Sagnac secret sharing over telecom fiber networks.

    Science.gov (United States)

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  10. KaZaA and similar Peer-to-Peer (P2P) file-sharing applications

    CERN Multimedia

    2003-01-01

    Personal use of Peer-to-Peer (P2P) file sharing applications is NOT permitted at CERN. A non-exhaustive list of such applications, popular for exchanging music, videos, software etc, is: KaZaA, Napster, Gnutella, Edonkey2000, Napigator, Limewire, Bearshare, WinMX, Aimster, Morpheus, BitTorrent, ... You are reminded that use of CERN's Computing Facilities is governed by CERN's Computing Rules (Operational Circular No 5). They require that all users of CERN's Computing Facilities respect copyright, license and confidentiality agreements for data of any form (software, music, videos, etc). Sanctions are applicable in case of non-respect of the Computing Rules. Further details on restrictions for P2P applications are at: http://cern.ch/security/file-sharing CERN's Computing Rules are at: http://cern.ch/ComputingRules Denise Heagerty, CERN Computer Security Officer, Computer.Security@cern.ch

  11. The role of network sharing in transforming the operator business: Impact on profitability and competition

    OpenAIRE

    Mölleryd, Bengt G.; Markendahl, Jan

    2013-01-01

    This paper focuses on network sharing on mobile networks and examines the impact on profitability and competition. Network sharing refers to that operators collaborates with its competitors on part of the production of mobile services, and it could vary from passive sharing, like sharing of sites or basic facilities, to active sharing, like radio access networks or even entire networks. The paper takes a global scope on examining the extent of network sharing. The emergence of a sector with d...

  12. Sharing is caring, but not error free: transparency of granular controls for sharing personal health information in social networks.

    Science.gov (United States)

    Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda

    2011-01-01

    When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.

  13. Fluid Limits for Bandwidth-Sharing Networks in Overload.

    NARCIS (Netherlands)

    Borst, S.; Egorova, R.; Zwart, A.P.

    2014-01-01

    Bandwidth-sharing networks as considered by Roberts and Massoulié [28] (Roberts JW, Massoulié L (1998) Bandwidth sharing and admission control for elastic traffic. Proc. ITC Specialist Seminar, Yokohama, Japan) provide a natural modeling framework for describing the dynamic flow-level interaction

  14. Fluid limits for bandwidth-sharing networks in overload

    NARCIS (Netherlands)

    Borst, S.C.; Egorova, R.R.; Zwart, B.

    2014-01-01

    Bandwidth-sharing networks as considered by Roberts and Massoulié [28] (Roberts JW, Massoulié L (1998) Bandwidth sharing and admission control for elastic traffic. Proc. ITC Specialist Seminar, Yokohama, Japan) provide a natural modeling framework for describing the dynamic flow-level interaction

  15. ILLEGAL FISHING SEBAGAI KEJAHATAN KORPORASI SUATU TEROBOSAN HUKUM PIDANA MENGADILI KEJAHATAN ILLEGAL FISHING

    Directory of Open Access Journals (Sweden)

    Moch. Iqbal

    2012-11-01

    Full Text Available Cakupan, pengertian dan pemahaman illegal fishing yang dipahami dan dianut dalam hukum positif Indonesia adalah pencurian ikan yang berdampak dan berpengaruh besar terhadap perekonomian negara. Oleh karenanya esensi regulasi dan penindakan terhadap illegal fishing di Indonesia seharusnya dipahami pada penindakan pencurian ikan yang berskala besar, yang pada umumnya dilakukan oleh armada-armada asing, kapal-kapal asing yang illegal, yang telah pula berakibat merugikan perekonomian negara (Indonesia triliunan rupiah tiap tahunnya. Dengan model dan jenis pencurian yang berskala besar dan membahayakan perekonomian nasional tersebut, penanganan regulasinya patut diarahkan pada atau untuk mengatasi kejahatan-kejahatan berskala besar dan rumit (sophisticated, yang tergolong dalam jenis kejahatan white collar crime atau kejahatan korporasi. Mengenal dan memahami seluk beluk serta keberadaan kejahatan korporasi, bagi para penegak hukum adalah sebuah keharusan di era modern ini, oleh karenanya tulisan ini memfokuskan pada dua kata kunci (key word illegal fishing dan corporate crime. Mengetahui dan memahami konsep dan regulasi seputar illegal fishing serta kejahatan korporasi menjadi kontribusi penting dalam proses penegakan hukum. Dengan pemahaman atas illegal fishing dan kejahatan korporasi akan menjadi landasan yang kuat bagi setiap praktisi hukum, khususnya penegak hukum dalam berproses acara maupun menentukan jenis dan klasifikasi pertanggungjawaban pidana yang tepat dan benar bagi penegak hukum khususnya para hakim agar berani dan tidak ragu dalam menjatuhkan sanksi pada setiap pelaku illegal fishing atau pelaku kejahatan korporasi. Dengan hukuman yang tegas dan jelas serta pasti, para penegak hukum tidak saja menegakkan hukum dan keadilan melainkan juga telah menyelamatkan perekonomian negara, dengan mencegah potensi kehilangan kekayaan nasional, sebagai pelaksanaan dari fungsi hukum sebagai alat rekayasa sosial.   Coverage, insight, and

  16. Parallel checksumming of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-09-06

    Checksum values are generated and used to verify the data integrity. A client executing in a parallel computing system stores a data chunk to a shared data object on a storage node in the parallel computing system. The client determines a checksum value for the data chunk; and provides the checksum value with the data chunk to the storage node that stores the shared object. The data chunk can be stored on the storage node with the corresponding checksum value as part of the shared object. The storage node may be part of a Parallel Log-Structured File System (PLFS), and the client may comprise, for example, a Log-Structured File System client on a compute node or burst buffer. The checksum value can be evaluated when the data chunk is read from the storage node to verify the integrity of the data that is read.

  17. A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client

    Directory of Open Access Journals (Sweden)

    Algimantas Venčkauskas

    2016-05-01

    Full Text Available The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We proposed a methodology to locate the artifacts that indicate the BitTorrent client activity performed. Additionally, we designed and implemented a tool that searches for the evidence left by the BitTorrent client application in a local computer running Windows. The tool looks for the four files holding the evidence. The files are as follows: *.torrent, dht.dat, resume.dat, and settings.dat. The tool decodes the files, extracts important information for the forensic investigator and converts it into XML format. The results are combined into a single result file.

  18. Early warning of illegal development for protected areas by integrating cellular automata with neural networks.

    Science.gov (United States)

    Li, Xia; Lao, Chunhua; Liu, Yilun; Liu, Xiaoping; Chen, Yimin; Li, Shaoying; Ai, Bing; He, Zijian

    2013-11-30

    Ecological security has become a major issue under fast urbanization in China. As the first two cities in this country, Shenzhen and Dongguan issued the ordinance of Eco-designated Line of Control (ELC) to "wire" ecologically important areas for strict protection in 2005 and 2009 respectively. Early warning systems (EWS) are a useful tool for assisting the implementation ELC. In this study, a multi-model approach is proposed for the early warning of illegal development by integrating cellular automata (CA) and artificial neural networks (ANN). The objective is to prevent the ecological risks or catastrophe caused by such development at an early stage. The integrated model is calibrated by using the empirical information from both remote sensing and handheld GPS (global positioning systems). The MAR indicator which is the ratio of missing alarms to all the warnings is proposed for better assessment of the model performance. It is found that the fast urban development has caused significant threats to natural-area protection in the study area. The integration of CA, ANN and GPS provides a powerful tool for describing and predicting illegal development which is in highly non-linear and fragmented forms. The comparison shows that this multi-model approach has much better performances than the single-model approach for the early warning. Compared with the single models of CA and ANN, this integrated multi-model can improve the value of MAR by 65.48% and 5.17% respectively. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Illegal use of natural resources in federal protected areas of the Brazilian Amazon.

    Science.gov (United States)

    Kauano, Érico E; Silva, Jose M C; Michalski, Fernanda

    2017-01-01

    The Brazilian Amazon is the world's largest rainforest regions and plays a key role in biodiversity conservation as well as climate adaptation and mitigation. The government has created a network of protected areas (PAs) to ensure long-term conservation of the region. However, despite the importance of and positive advances in the establishment of PAs, natural resource depletion in the Brazilian Amazon is pervasive. We evaluated a total of 4,243 official law enforcement records generated between 2010 and 2015 to understand the geographical distribution of the illegal use of resources in federal PAs in the Brazilian Amazon. We classified illegal activities into ten categories and used generalized additive models (GAMs) to evaluate the relationship between illegal use of natural resources inside PAs with management type, age of PAs, population density, and accessibility. We found 27 types of illegal use of natural resources that were grouped into 10 categories of illegal activities. Most infractions were related to suppression and degradation of vegetation (37.40%), followed by illegal fishing (27.30%) and hunting activities (18.20%). The explanatory power of the GAMs was low for all categories of illegal activity, with a maximum explained variation of 41.2% for illegal activities as a whole, and a minimum of 14.6% for hunting activities. These findings demonstrate that even though PAs are fundamental for nature conservation in the Brazilian Amazon, the pressures and threats posed by human activities include a broad range of illegal uses of natural resources. Population density up to 50 km from a PA is a key variable, influencing illegal activities. These threats endanger long-term conservation and many efforts are still needed to maintain PAs that are large enough and sufficiently intact to maintain ecosystem functions and protect biodiversity.

  20. Shared Leadership and Team Creativity: A Social Network Analysis in Engineering Design Teams

    Directory of Open Access Journals (Sweden)

    Qiong Wu

    2016-06-01

    Full Text Available This research explores the relationship between shared leadership and creativity in engineering design teams. To do this, a social network perspective was adopted using four measures to assess key elements of shared leadership networks. These are (a network density, (b centralization, (c efficiency and (d strength. Data was collected from a sample of 22 engineering design teams who adopt a shared leadership approach. Our results support previous findings that the density of a shared leadership network is positively related to team creativity. In contrast, we learned that centralization exerts a negative influence on it. Moreover, while we found that there is no evidence to support a positive correlation between efficiency and team creativity, we demonstrate an inverted U-shaped relationship between strength and team creativity in a shared leadership network. These findings are important because they add to the academic debate in the shared leadership area and provide valuable insights for managers.

  1. Code 672 observational science branch computer networks

    Science.gov (United States)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  2. Distributed Data Mining in Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — Peer-to-peer (P2P) networks are gaining popularity in many applications such as file sharing, e-commerce, and social networking, many of which deal with rich,...

  3. Illegal trade in Barbary macaques

    NARCIS (Netherlands)

    van Uhm, Daan|info:eu-repo/dai/nl/380477025

    2014-01-01

    While Morocco is well known as the main port between Africa and the EU for the illegal drugs trade and migration, the illegal trade in wildlife is flourishing as well. Next to the illegal large-scale trafficking of tortoises and birds, it is estimated that as few as 5,000 Barbary macaques remain in

  4. Peer-to-Peer Networking -RE-SONANCE

    Indian Academy of Sciences (India)

    networking, operating systems and embedded systems. Peer-to-Peer (P2P) networking in recent times has been touted as .... Gnutella (General file sharing) P2P service at the same time. 2. .... The data processing does not occur in 'real time' ...

  5. General-purpose computer networks and resource sharing in ERDA. Volume 3. Remote resource-sharing experience and findings

    Energy Technology Data Exchange (ETDEWEB)

    1977-07-15

    The investigation focused on heterogeneous networks in which a variety of dissimilar computers and operating systems were interconnected nationwide. Homogeneous networks, such as MFE net and SACNET, were not considered since they could not be used for general purpose resource sharing. Issues of privacy and security are of concern in any network activity. However, consideration of privacy and security of sensitive data arise to a much lesser degree in unclassified scientific research than in areas involving personal or proprietary information. Therefore, the existing mechanisms at individual sites for protecting sensitive data were relied on, and no new protection mechanisms to prevent infringement of privacy and security were attempted. Further development of ERDA networking will need to incorporate additional mechanisms to prevent infringement of privacy. The investigation itself furnishes an excellent example of computational resource sharing through a heterogeneous network. More than twenty persons, representing seven ERDA computing sites, made extensive use of both ERDA and non-ERDA computers in coordinating, compiling, and formatting the data which constitute the bulk of this report. Volume 3 analyzes the benefits and barriers encountered in actual resource sharing experience, and provides case histories of typical applications.

  6. The impacts of network competence, knowledge sharing on service innovation performance: Moderating role of relationship quality

    Directory of Open Access Journals (Sweden)

    Zaoquan Jian

    2013-03-01

    Full Text Available Purpose: To examine how network competence, knowledge sharing and relationship quality affect service innovation performanceDesign/methodology/approach: Empirical ResearchFindings: 1 Both enterprise’s network competence and knowledge sharing have distinct positive impact on SIP; (2 Knowledge sharing partially mediates the effect of network competence on SIP. (3 Relationship quality positively moderates the effect of network competence on knowledge sharing, and the effect of knowledge sharing on SIP. (4 Relationship quality does not positively moderate the effect of network competence on SIP.Originality/value: This study has enriched current understanding of the relationship among network competence, knowledge sharing, relationship quality and service innovation performance.

  7. Illegal Drug Use in Orthodox Jewish Adolescents.

    Science.gov (United States)

    Fogel, Joshua

    2004-01-01

    Orthodox Jewish adolescents are increasingly seeking stimulation with illegal drugs. Eleven Orthodox Jewish adolescents were surveyed with semi-structured interviews on the Orthodox Jewish cultural aspects of their illegal drug use. Adolescents had mixed beliefs about religious teachings affecting their illegal drug use. No consistent pattern existed for particular ethnic aspects of Orthodox Jewish religious practice as a risk factor for illegal drug use. Language used to describe illegal drug use in this population is described. Unlike illegal drug use in secular and non-Jewish adolescents, these adolescents reported very little family discord or poor relationships with their parents.

  8. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.; Sorour, Sameh; Aboutorab, Neda; Sadeghi, Parastoo; Al-Naffouri, Tareq Y.

    2015-01-01

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  9. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.

    2015-12-06

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients\\' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  10. Digital Surveillance: A Novel Approach to Monitoring the Illegal Wildlife Trade

    Science.gov (United States)

    Joly, Damien; Mekaru, Sumiko; Brownstein, John S.

    2012-01-01

    A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%), the United States (n = 143, 15.3%), South Africa (n = 75, 8.0%), China (n = 41, 4.4%), and Vietnam (n = 37, 4.0%). Species reported as traded or poached included elephants (n = 107, 12.5%), rhinoceros (n = 103, 12.0%), tigers (n = 68, 7.9%), leopards (n = 54, 6.3%), and pangolins (n = 45, 5.2%). The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide. PMID:23236444

  11. Digital surveillance: a novel approach to monitoring the illegal wildlife trade.

    Science.gov (United States)

    Sonricker Hansen, Amy L; Li, Annie; Joly, Damien; Mekaru, Sumiko; Brownstein, John S

    2012-01-01

    A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%), the United States (n = 143, 15.3%), South Africa (n = 75, 8.0%), China (n = 41, 4.4%), and Vietnam (n = 37, 4.0%). Species reported as traded or poached included elephants (n = 107, 12.5%), rhinoceros (n = 103, 12.0%), tigers (n = 68, 7.9%), leopards (n = 54, 6.3%), and pangolins (n = 45, 5.2%). The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide.

  12. Digital surveillance: a novel approach to monitoring the illegal wildlife trade.

    Directory of Open Access Journals (Sweden)

    Amy L Sonricker Hansen

    Full Text Available A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%, the United States (n = 143, 15.3%, South Africa (n = 75, 8.0%, China (n = 41, 4.4%, and Vietnam (n = 37, 4.0%. Species reported as traded or poached included elephants (n = 107, 12.5%, rhinoceros (n = 103, 12.0%, tigers (n = 68, 7.9%, leopards (n = 54, 6.3%, and pangolins (n = 45, 5.2%. The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide.

  13. 78 FR 3447 - Information Collection: Southern Alaska Sharing Network and Subsistence Study; Submitted for OMB...

    Science.gov (United States)

    2013-01-16

    ... local sharing networks that structure contemporary subsistence-cash economies using research methods... Collection: Southern Alaska Sharing Network and Subsistence Study; Submitted for OMB Review; Comment Request... conducting a survey on subsistence and sharing networks in coastal Alaska. This notice provides the public a...

  14. DEVELOPMENT OF A WEB-BASED PROXIMITY BASED MEDIA SHARING APPLICATION

    OpenAIRE

    Erol Ozan

    2016-01-01

    This article reports the development of Vissou, which is a location based web application that enables media recording and sharing among users who are in close proximity to each other. The application facilitates the automated hand-over of the recorded media files from one user to another. There are many social networking applications and web sites that provide digital media sharing and editing functionalities. What differentiates Vissou from other similar applications is the functions and us...

  15. Social Networks Impacts on Knowledge Sharing Among Public ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Keywords- Social networks, Social media, Facebook, Twitter, and. Linkedin, Knowledge ... of knowledge sharing among public education students which the researcher see as .... frankness with teaching sphere. The American ...

  16. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  17. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  18. Illegal Drugs and Heart Disease

    Science.gov (United States)

    ... Venous Thromboembolism Aortic Aneurysm More Illegal Drugs and Heart Disease Updated:May 3,2018 Most illegal drugs can ... www.dea.gov/druginfo/factsheets.shtml Alcohol and Heart Disease Caffeine and Heart Disease Tobacco and Heart Disease ...

  19. Group Clustering Mechanism for P2P Large Scale Data Sharing Collaboration

    Institute of Scientific and Technical Information of China (English)

    DENGQianni; LUXinda; CHENLi

    2005-01-01

    Research shows that P2P scientific collaboration network will exhibit small-world topology, as do a large number of social networks for which the same pattern has been documented. In this paper we propose a topology building protocol to benefit from the small world feature. We find that the idea of Freenet resembles the dynamic pattern of social interactions in scientific data sharing and the small world characteristic of Freenet is propitious to improve the file locating performance in scientificdata sharing. But the LRU (Least recently used) datas-tore cache replacement scheme of Freenet is not suitableto be used in scientific data sharing network. Based onthe group locality of scientific collaboration, we proposean enhanced group clustering cache replacement scheme.Simulation shows that this scheme improves the request hitratio dramatically while keeping the small average hops per successful request comparable to LRU.

  20. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  1. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    . Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...... flexible sharing of cached files among unauthenticated users, i.e. unlike most distributed file systems CryptoCache does not require a global authentication framework.Files are encrypted when they are transferred over the network and while stored on untrusted servers. The system uses public key......Small mobile computers are now sufficiently powerful to run many applications, but storage capacity remains limited so working files cannot be cached or stored locally. Even if files can be stored locally, the mobile device is not powerful enough to act as server in collaborations with other users...

  2. Allegheny County Illegal Dump Sites

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — The Illegal Dump Site dataset includes information on illegal dump sites, their type of trash, and the estimate tons of trash at each site. The information was...

  3. The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    Directory of Open Access Journals (Sweden)

    Y. B. Li

    2012-09-01

    Full Text Available The competitive price game model is used to analyze the spectrum sharing problem in the cognitive radio networks, and the spectrum sharing problem with the constraints of available spectrum resource from primary users is further discussed in this paper. The Rockafeller multiplier method is applied to deal with the constraints of available licensed spectrum resource, and the improved profits function is achieved, which can be used to measure the impact of shared spectrum price strategies on the system profit. However, in the competitive spectrum sharing problem of practical cognitive radio network, primary users have to determine price of the shared spectrum without the acknowledgement of the other primary user’s price strategies. Thus a fast gradient iterative calculation method of equilibrium price is proposed, only with acknowledgement of the price strategies of shared spectrum during last cycle. Through the adaptive iteration at the direction with largest gradient of improved profit function, the equilibrium price strategies can be achieved rapidly. It can also avoid the predefinition of adjustment factor according to the parameters of communication system in conventional linear iteration method. Simulation results show that the proposed competitive price spectrum sharing model can be applied in the cognitive radio networks with constraints of available licensed spectrum, and it has better convergence performance.

  4. What happens when organisations embrace social networking? Knowledge sharing at a multinational business solutions corporation

    Directory of Open Access Journals (Sweden)

    C. Stafford

    2009-04-01

    Full Text Available Amid widespread resistance to online social networking tools, their effectiveness in promoting knowledge sharing in a knowledge-driven organisation was demonstrated in the study. Usage patterns, user attitudes and perceptions regarding online social networking technologies as a professional application for knowledge sharing within the workplace were investigated. Self-administered questionnaires were administered to a sample of IBM Global Business Services employees in South Africa. Upon completion of the questionnaire analysis an interview was conducted with the knowledge manager for verification and clarification purposes. The results revealed the respondents' positive attitudes regarding the use of social networking tools for knowledge sharing. The culture of knowledge sharing at IBM and the contribution that social networking tools makes within the company were uncovered. Findings disclosed that the online social networking tools were effective and that management at IBM encourages employees to make more and more use of the tools for knowledge sharing and knowledge creation. The results of this study demonstrate the effectiveness of online social networking tools and serve as encouragement to hesitant organisations to adopt social networking in their business practices.

  5. mEducator: A Best Practice Network for Repurposing and Sharing Medical Educational Multi-type Content

    Science.gov (United States)

    Bamidis, Panagiotis D.; Kaldoudi, Eleni; Pattichis, Costas

    Although there is an abundance of medical educational content available in individual EU academic institutions, this is not widely available or easy to discover and retrieve, due to lack of standardized content sharing mechanisms. The mEducator EU project will face this lack by implementing and experimenting between two different sharing mechanisms, namely, one based one mashup technologies, and one based on semantic web services. In addition, the mEducator best practice network will critically evaluate existing standards and reference models in the field of e-learning in order to enable specialized state-of-the-art medical educational content to be discovered, retrieved, shared, repurposed and re-used across European higher academic institutions. Educational content included in mEducator covers and represents the whole range of medical educational content, from traditional instructional teaching to active learning and experiential teaching/studying approaches. It spans the whole range of types, from text to exam sheets, algorithms, teaching files, computer programs (simulators or games) and interactive objects (like virtual patients and electronically traced anatomies), while it covers a variety of topics. In this paper, apart from introducing the relevant project concepts and strategies, emphasis is also placed on the notion of (dynamic) user-generated content, its advantages and peculiarities, as well as, gaps in current research and technology practice upon its embedding into existing standards.

  6. Social Network Perspective: Model of Student Knowledge Sharing On Social Network Media

    OpenAIRE

    Bentar Priyopradono; Danny Manongga; Wiranto H. Utomo

    2012-01-01

    Recently, the role and development of information technology especially the internet, gives impact and influence in social relationship especially for social network site services users. The impact and influence the use of Internet which is related to exchange information and knowledge sharing still become one of the interesting topics to be researched. Now, the use of social media network by students are the best way to them to increase their knowledge as communication media such as, exchang...

  7. Parallel compression of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-10-25

    Techniques are provided for parallel compression of data chunks being written to a shared object. A client executing on a compute node or a burst buffer node in a parallel computing system stores a data chunk generated by the parallel computing system to a shared data object on a storage node by compressing the data chunk; and providing the data compressed data chunk to the storage node that stores the shared object. The client and storage node may employ Log-Structured File techniques. The compressed data chunk can be de-compressed by the client when the data chunk is read. A storage node stores a data chunk as part of a shared object by receiving a compressed version of the data chunk from a compute node; and storing the compressed version of the data chunk to the shared data object on the storage node.

  8. Strategies for Sharing Seismic Data Among Multiple Computer Platforms

    Science.gov (United States)

    Baker, L. M.; Fletcher, J. B.

    2001-12-01

    Seismic waveform data is readily available from a variety of sources, but it often comes in a distinct, instrument-specific data format. For example, data may be from portable seismographs, such as those made by Refraction Technology or Kinemetrics, from permanent seismograph arrays, such as the USGS Parkfield Dense Array, from public data centers, such as the IRIS Data Center, or from personal communication with other researchers through e-mail or ftp. A computer must be selected to import the data - usually whichever is the most suitable for reading the originating format. However, the computer best suited for a specific analysis may not be the same. When copies of the data are then made for analysis, a proliferation of copies of the same data results, in possibly incompatible, computer-specific formats. In addition, if an error is detected and corrected in one copy, or some other change is made, all the other copies must be updated to preserve their validity. Keeping track of what data is available, where it is located, and which copy is authoritative requires an effort that is easy to neglect. We solve this problem by importing waveform data to a shared network file server that is accessible to all our computers on our campus LAN. We use a Network Appliance file server running Sun's Network File System (NFS) software. Using an NFS client software package on each analysis computer, waveform data can then be read by our MatLab or Fortran applications without first copying the data. Since there is a single copy of the waveform data in a single location, the NFS file system hierarchy provides an implicit complete waveform data catalog and the single copy is inherently authoritative. Another part of our solution is to convert the original data into a blocked-binary format (known historically as USGS DR100 or VFBB format) that is interpreted by MatLab or Fortran library routines available on each computer so that the idiosyncrasies of each machine are not visible to

  9. Not an 'iron pipeline', but many capillaries: regulating passive transactions in Los Angeles' secondary, illegal gun market.

    Science.gov (United States)

    Chesnut, Kelsie Y; Barragan, Melissa; Gravel, Jason; Pifer, Natalie A; Reiter, Keramet; Sherman, Nicole; Tita, George E

    2017-08-01

    California has strict firearm-related laws and is exceptional in its regulation of firearms retailers. Though evidence suggests that these laws can reduce illegal access to guns, high levels of gun violence persist in Los Angeles (LA), California. This research seeks to describe the sources of guns accessed by active offenders in LA, California and reports offenders' motivations for obtaining guns. Los Angeles County Jail (LACJ) system (four facilities). Random sampling from a screened pool of eligible participants was used to conduct qualitative semistructured interviews with 140 incarcerated gun offenders in one of four (LACJ) facilities. Researchers collected data on firearm acquisition, experiences related to gun violence, and other topics, using a validated survey instrument. Grounded theory guided the collection and analysis of data. Respondents reported possession of 77 specific guns (79.2% handguns) collectively. Social networks facilitate access to illegal guns; the majority of interviewees acquired their illegal guns through a social connection (85.7%) versus an outside broker/unregulated retailer (8.5%). Most guns were obtained through illegal purchase (n=51) or gift (n=15). A quarter of gun purchasers report engaging in a passive transaction, or one initiated by another party. Passive gun buyers were motivated by concerns for personal safety and/or economic opportunity. In LA's illegal gun market, where existing social relationships facilitate access to guns across a diffuse network, individuals, influenced by both fear and economic opportunity, have frequent opportunities to illegally possess firearms through passive transactions. Gun policies should better target and minimise these transactions. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  10. Fixed-Point Approximations of Bandwidth-Sharing Networks with Rate Constraints

    NARCIS (Netherlands)

    M. Frolkova (Masha); J. Reed (Josh); A.P. Zwart (Bert)

    2011-01-01

    htmlabstractBandwidth-sharing networks are important flow level models of communication networks. We focus on the fact that it takes a signicant number of users to saturate a link, necessitating the inclusion of individual rate constraints. In particular we extend work of Reed & Zwart on fluid

  11. Multi-Resolution Playback of Network Trace Files

    Science.gov (United States)

    2015-06-01

    insertion, populateDB organizes the packet data by Open Systems Interconnec- tion model ( OSI ) layer, links each packet with those in the same flow to create...well as replay based on a statistical model of a network trace file. This thesis attempts to create such a system and to fulfil the requirements set...Lastly, the statistical model generated from characteristics of the original trace proved to accurately model the original capture and provide for a user

  12. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  13. The Knotted Sign: Poetics of Illegibility

    Directory of Open Access Journals (Sweden)

    Elvira Blanco Santini

    2017-05-01

    Full Text Available One might argue that legibility precedes any concern about poetics, because: What are the poetics of something we cannot understand? However, our interaction with digital technology constantly exposes us to the illegibility intrinsic to its operations. The aim of this essay is to reflect on illegibility from three perspectives: the definition of readability as a Eurocentric cultural regime, the exploration of the poetics of the machine-readable as opposed to the human-readable, and the proposition that we are facing an increasingly ubiquitous regime of illegibility that is not limited to writing. After this vaguely chronological review of the modern history of illegibility, I will attempt to answer: What can the unreadable mean as an expressive resource?

  14. Illegal Immigration and Agrarian Labour Market

    Directory of Open Access Journals (Sweden)

    Venancio Salcines

    2003-03-01

    Full Text Available In this work we analyse the relation which exists between a landowner and the immigrant workers contracted illegally by this person. For this reason, a theoretical model is developed based on the interconnection between the illegal and legal labour market. The big landowner analysed exercises a monopolistic power in the contracting of illegal manual labour. The application of a tariff in two parts permits this big landowner to obtain a greater surplus from the worker.

  15. G-ROME : semantic-driven capacity sharing among P2P networks

    NARCIS (Netherlands)

    Exarchakos, G.; Antonopoulos, N.; Salter, J.

    2007-01-01

    Purpose – The purpose of this paper is to propose a model for sharing network capacity on demand among different underloaded and overloaded P2P ROME-enabled networks. The paper aims to target networks of nodes with highly dynamic workload fluctuations that may experience a burst of traffic and/or

  16. Attitudes towards Social Networking and Sharing Behaviors among Consumers of Direct-to-Consumer Personal Genomics.

    Science.gov (United States)

    Lee, Sandra Soo-Jin; Vernez, Simone L; Ormond, K E; Granovetter, Mark

    2013-10-14

    Little is known about how consumers of direct-to-consumer personal genetic services share personal genetic risk information. In an age of ubiquitous online networking and rapid development of social networking tools, understanding how consumers share personal genetic risk assessments is critical in the development of appropriate and effective policies. This exploratory study investigates how consumers share personal genetic information and attitudes towards social networking behaviors. Adult participants aged 23 to 72 years old who purchased direct-to-consumer genetic testing from a personal genomics company were administered a web-based survey regarding their sharing activities and social networking behaviors related to their personal genetic test results. 80 participants completed the survey; of those, 45% shared results on Facebook and 50.9% reported meeting or reconnecting with more than 10 other individuals through the sharing of their personal genetic information. For help interpreting test results, 70.4% turned to Internet websites and online sources, compared to 22.7% who consulted their healthcare providers. Amongst participants, 51.8% reported that they believe the privacy of their personal genetic information would be breached in the future. Consumers actively utilize online social networking tools to help them share and interpret their personal genetic information. These findings suggest a need for careful consideration of policy recommendations in light of the current ambiguity of regulation and oversight of consumer initiated sharing activities.

  17. Online network of subspecialty aortic disease experts: Impact of "cloud" technology on management of acute aortic emergencies.

    Science.gov (United States)

    Schoenhagen, Paul; Roselli, Eric E; Harris, C Martin; Eagleton, Matthew; Menon, Venu

    2016-07-01

    For the management of acute aortic syndromes, regional treatment networks have been established to coordinate diagnosis and treatment between local emergency rooms and central specialized centers. Triage of acute aortic syndromes requires definitive imaging, resulting in complex data files. Modern information technology network structures, specifically "cloud" technology, coupled with mobile communication, increasingly support sharing of these data in a network of experts using mobile, online access and communication. Although this network is technically complex, the potential benefit of online sharing of data files between professionals at multiple locations within a treatment network appear obvious; however, clinical experience is limited, and further evaluation is needed. Copyright © 2016 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  18. Advancing Collaboration through Hydrologic Data and Model Sharing

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.

    2015-12-01

    HydroShare is an online, collaborative system for open sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined primarily by standardized metadata, content data models for each resource type, and an overarching resource data model based on the Open Archives Initiative's Object Reuse and Exchange (OAI-ORE) standard and a hierarchical file packaging system called "BagIt". HydroShare expands the data sharing capability of the CUAHSI Hydrologic Information System by broadening the classes of data accommodated to include geospatial and multidimensional space-time datasets commonly used in hydrology. HydroShare also includes new capability for sharing models, model components, and analytical tools and will take advantage of emerging social media functionality to enhance information about and collaboration around hydrologic data and models. It also supports web services and server/cloud based computation operating on resources for the execution of hydrologic models and analysis and visualization of hydrologic data. HydroShare uses iRODS as a network file system for underlying storage of datasets and models. Collaboration is enabled by casting datasets and models as "social objects". Social functions include both private and public sharing, formation of collaborative groups of users, and value-added annotation of shared datasets and models. The HydroShare web interface and social media functions were developed using the Django web application framework coupled to iRODS. Data visualization and analysis is supported through the Tethys Platform web GIS software stack. Links to external systems are supported by RESTful web service interfaces to HydroShare's content. This presentation will introduce the HydroShare functionality developed to date and describe ongoing development of functionality to support collaboration and integration of data and models.

  19. Labour Market Interactions Between Legal and Illegal Immigrants

    OpenAIRE

    Epstein, Gil S

    2000-01-01

    This paper looks at the situation of legal immigrants who employ illegal immigrants to provide them with various services. This enables the legal immigrants to allocate more time to other work, thereby increasing their earnings. Illegal immigrants employed by legal immigrants may specialize in certain professions and may themselves employ other illegal immigrants. An economy is evolving whose sole purpose is the provision of services by illegal immigrants for legal immigrants.

  20. Labor Market Interactions Between Legal and Illegal Immigrants

    OpenAIRE

    Epstein, Gil S.

    2000-01-01

    This paper looks at the situation of legal immigrants who employ illegal immigrants to provide them with various services. This enables the legal immigrants to allocate more time to other work, thereby increasing their earnings. Illegal immigrants employed by legal immigrants may specialize in certain professions and may themselves employ other illegal immigrants. An economy is evolving whose sole purpose is the provision of services by illegal immigrants for legal immigrants.

  1. Sharing of Alcohol-Related Content on Social Networking Sites: Frequency, Content, and Correlates.

    Science.gov (United States)

    Erevik, Eilin K; Torsheim, Torbjørn; Vedaa, Øystein; Andreassen, Cecilie S; Pallesen, Ståle

    2017-05-01

    The present study aimed to explore students' reports of their sharing of alcohol-related content on different social networking sites (i.e., frequency of sharing and connotations of alcohol-related posts), and to identify indicators of such posting. Students at the four largest institutions for higher education in Bergen, Norway, were invited to participate in an Internet-based survey. The sample size was 11,236 (a 39.4% response rate). The survey included questions about disclosure of alcohol-related content on social networking sites, alcohol use (using the Alcohol Use Disorders Identification Test), personality factors (using the Mini-IPIP), and demographic characteristics. Binary logistic regressions were used to analyze indicators of frequent sharing of alcohol-related content depicting positive and negative aspects of alcohol use. A majority of the students had posted alcohol-related content (71.0%), although few reported having done so frequently. Positive aspects of alcohol use (e.g., enjoyment or social community) were most frequently shared. Young, single, and extroverted students with high alcohol consumption were more likely to report frequent sharing of alcohol-related content. Positive attitudes toward posting alcohol-related content and reports of exposure to such content particularly increased the likelihood of one's own posting of alcohol-related content. Positive aspects of alcohol use seem to be emphasized on social networking sites. Sharing of alcohol-related content is associated with heightened alcohol use, which implies that such sites can be relevant for prevention agents. Social influence from social networking sites, such as exposure to others' alcohol-related content, is associated with one's own sharing of similar content.

  2. Attitudes towards Social Networking and Sharing Behaviors among Consumers of Direct-to-Consumer Personal Genomics

    Directory of Open Access Journals (Sweden)

    Mark Granovetter

    2013-10-01

    Full Text Available Little is known about how consumers of direct-to-consumer personal genetic services share personal genetic risk information. In an age of ubiquitous online networking and rapid development of social networking tools, understanding how consumers share personal genetic risk assessments is critical in the development of appropriate and effective policies. This exploratory study investigates how consumers share personal genetic information and attitudes towards social networking behaviors. Methods: Adult participants aged 23 to 72 years old who purchased direct-to-consumer genetic testing from a personal genomics company were administered a web-based survey regarding their sharing activities and social networking behaviors related to their personal genetic test results. Results: 80 participants completed the survey; of those, 45% shared results on Facebook and 50.9% reported meeting or reconnecting with more than 10 other individuals through the sharing of their personal genetic information. For help interpreting test results, 70.4% turned to Internet websites and online sources, compared to 22.7% who consulted their healthcare providers. Amongst participants, 51.8% reported that they believe the privacy of their personal genetic information would be breached in the future. Conclusion: Consumers actively utilize online social networking tools to help them share and interpret their personal genetic information. These findings suggest a need for careful consideration of policy recommendations in light of the current ambiguity of regulation and oversight of consumer initiated sharing activities.

  3. China's Rare Earth Supply Chain: Illegal Production, and Response to new Cerium Demand

    Science.gov (United States)

    Nguyen, Ruby Thuy; Imholte, D. Devin

    2016-07-01

    As the demand for personal electronic devices, wind turbines, and electric vehicles increases, the world becomes more dependent on rare earth elements. Given the volatile, Chinese-concentrated supply chain, global attempts have been made to diversify supply of these materials. However, the overall effect of supply diversification on the entire supply chain, including increasing low-value rare earth demand, is not fully understood. This paper is the first attempt to shed some light on China's supply chain from both demand and supply perspectives, taking into account different Chinese policies such as mining quotas, separation quotas, export quotas, and resource taxes. We constructed a simulation model using Powersim Studio that analyzes production (both legal and illegal), production costs, Chinese and rest-of-world demand, and market dynamics. We also simulated new demand of an automotive aluminum-cerium alloy in the US market starting from 2018. Results showed that market share of the illegal sector has grown since 2007-2015, ranging between 22% and 25% of China's rare earth supply, translating into 59-65% illegal heavy rare earths and 14-16% illegal light rare earths. There will be a shortage in certain light and heavy rare earths given three production quota scenarios and constant demand growth rate from 2015 to 2030. The new simulated Ce demand would require supply beyond that produced in China. Finally, we illustrate revenue streams for different ore compositions in China in 2015.

  4. Data sharing system for lithography APC

    Science.gov (United States)

    Kawamura, Eiichi; Teranishi, Yoshiharu; Shimabara, Masanori

    2007-03-01

    We have developed a simple and cost-effective data sharing system between fabs for lithography advanced process control (APC). Lithography APC requires process flow, inter-layer information, history information, mask information and so on. So, inter-APC data sharing system has become necessary when lots are to be processed in multiple fabs (usually two fabs). The development cost and maintenance cost also have to be taken into account. The system handles minimum information necessary to make trend prediction for the lots. Three types of data have to be shared for precise trend prediction. First one is device information of the lots, e.g., process flow of the device and inter-layer information. Second one is mask information from mask suppliers, e.g., pattern characteristics and pattern widths. Last one is history data of the lots. Device information is electronic file and easy to handle. The electronic file is common between APCs and uploaded into the database. As for mask information sharing, mask information described in common format is obtained via Wide Area Network (WAN) from mask-vender will be stored in the mask-information data server. This information is periodically transferred to one specific lithography-APC server and compiled into the database. This lithography-APC server periodically delivers the mask-information to every other lithography-APC server. Process-history data sharing system mainly consists of function of delivering process-history data. In shipping production lots to another fab, the product-related process-history data is delivered by the lithography-APC server from the shipping site. We have confirmed the function and effectiveness of data sharing systems.

  5. The Value Added Tax Implications of Illegal Transactions

    Directory of Open Access Journals (Sweden)

    SP van Zyl

    2011-01-01

    Full Text Available In the case of MP Finance Group CC (In Liquidation v CSARS the High Court of Appeal ruled that income "received by" a taxpayer from illegal gains will be taxable in the hands of the taxpayer. This article explores whether or not the decision in the MP Finance-case (and preceding cases on the taxation of illegal receipts can be applied to determine if illegal transactions are subject to VAT and moreover if a trader in illegal goods and services should register as a VAT vendor. Although strictly speaking no analogy can be drawn between the charging provisions for income tax and VAT, it is clear that in the determination of the taxability of illegal income, the courts applied the principle of tax neutrality. In terms of the principle of tax neutrality, taxes are not concerned with the legality or illegality of a transaction, but rather with whether the transaction complies with the requirements for it to be taxed or not. That said, the European Court of Justice has a different approach in applying this principle. According to the European Court of Justice where the intrinsic nature of the goods excludes it from the commercial arena (like narcotic drugs it should not be subject to VAT, but where the goods compete with a legal market it must be subject to VAT. Charging VAT on illegal transactions might give the impression that government benefits from criminal activities. However, if illegal transactions are not subject to VAT the trader in illegal goods will benefit as his products will be 14% cheaper than his rival’s. Is this necessarily a moral dilemma? In conclusion three arguments can be deduced on the question if illegal transactions should be subject to VAT:1. Illegal transactions should not be taxed at all. Illegal goods or services fall outside the sphere of the application of the charging provision in section 7(1 of the VAT Act. Moreover, taxing illegal transactions lends a quasi-validity to the contract and gives the impression that

  6. Changes in Illegal Behavior During Emerging Adulthood

    Directory of Open Access Journals (Sweden)

    Badiah Haffejee

    2013-01-01

    Full Text Available Emerging adulthood marks a critical developmental juncture during which some individuals disengage from the illegal behavior of their adolescence while others continue to use substances and commit crimes. While risk factors for delinquency during adolescence are well studied, factors that influence persisting or desisting from illegal activities during emerging adulthood have not been fully explored. This mixed methods study utilizes a sample of college students aged 18-25 (N=74 and examines factors differentiating those who abstained from illegal behaviors, desisted from illegal behaviors, and persisted in illegal behaviors. Multinomial logistic regression models indicated peers offending and hours spent studying predicted desisting and peers offending predicted persisting (compared to the abstaining group. Three qualitative themes: family and peer bonds, morals and values, and fear of consequences further explained factors influencing emerging adults’ persisting and desisting choices. Implications for social work practice are explored.

  7. The global unified parallel file system (GUPFS) project: FY 2003 activities and results

    Energy Technology Data Exchange (ETDEWEB)

    Butler, Gregory F.; Baird William P.; Lee, Rei C.; Tull, Craig E.; Welcome, Michael L.; Whitney Cary L.

    2004-04-30

    The Global Unified Parallel File System (GUPFS) project is a multiple-phase project at the National Energy Research Scientific Computing (NERSC) Center whose goal is to provide a scalable, high-performance, high-bandwidth, shared file system for all of the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make the scientific users more productive as they conduct advanced scientific research at NERSC by simplifying the scientists' data management tasks and maximizing storage and data availability. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is accessible by all the NERSC production computing and support systems. In order to successfully deploy a scalable high-performance shared file system with consolidated disk storage, three major emerging technologies must be brought together: (1) shared/cluster file systems software, (2) cost-effective, high-performance storage area network (SAN) fabrics, and (3) high-performance storage devices. Although they are evolving rapidly, these emerging technologies individually are not targeted towards the needs of scientific high-performance computing (HPC). The GUPFS project is in the process of assessing these emerging technologies to determine the best combination of solutions for a center-wide shared file system, to encourage the development of these technologies in directions needed for HPC, particularly at NERSC, and to then put them into service. With the development of an evaluation methodology and benchmark suites, and with the updating of the GUPFS testbed system, the project did a substantial number of investigations and evaluations during FY 2003. The investigations and evaluations involved many vendors and products. From our evaluation of these products, we have found that most vendors and many of the products are more focused on the commercial market. Most vendors

  8. ANALISIS TRANSFER RATE PENAMBAHAN NODE PADA INFRASTRUKTUR MOBILE ADHOC NETWORK (MANET UNTUK FILE SERVER

    Directory of Open Access Journals (Sweden)

    Rudi Kurniawan

    2017-05-01

    Full Text Available Teknologi Wireless Network sudah lama ditemukan dan seiring waktu juga mengalami perkembangan, Namun sifat teknologi ini menggantungkan diri pada infrastruktur jaringan yang ada. Hal ini bias menjadi kelemahan tersendiri saat kondisi infrastruktur jaringan sedang mengalami gangguan, karena setiap komunikasi yang melewati infrastruktur jaringan tersebut tidak akan sampai pada tujuan. Teknologi jaringan Mobile Ad-hoc Network (MANET diciptakan sebagai antisipasi jika infrastruktur jaringan sedang mengalami gangguan. Dengan jaringan MANET sistem komunikasi yang dilakukan tidak membutuhkan infrastruktur jaringan karena tiap node pada jaringan tersebut bersifat mobile. Untuk menguji kemampuan MANET, pada penelitian ini akan menerapkan File Transfer Protocol (FTP sebagai media untuk melakukan komunikasi data file transfer yang diimplementasi pada jaringan MANET. Dari pengujian yang telah dilakukan diperoleh hasil bahwa File Transfer dapat berfungsi dengan baik saat diterapkan pada jaringan MANET.

  9. Dynamic segment shared protection for multicast traffic in meshed wavelength-division-multiplexing optical networks

    Science.gov (United States)

    Liao, Luhua; Li, Lemin; Wang, Sheng

    2006-12-01

    We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.

  10. Guest editorial - Networked collaboration, sharing and response

    Directory of Open Access Journals (Sweden)

    Olav Skundberg

    2008-11-01

    Full Text Available  This issue of Seminar.net contains three articles that were written in connection with a Norwegian e-learning conference titled “Networked collaboration, sharing and response”. The conference was held in Mars 2008 in Trondheim, and the presentations from the conference is available (in norwegian language at http://www.nvu.no. Networked collaboration was chosen as a theme because collaboration is important to achieve learning, according to the social-constructivistic pedagogy that has a strong standing in Norway, but how should this occur on the net? Sharing of content, as in digital learning resources, is a phenomenon with increasing popularity as described in the OECD-report “Giving Knowledge for Free”. But to achieve reuse of content, not only publishing it, it is important with a networked community where the plethora of information can be sorted with relevance to specific topics. Response is about guiding, coaching and tutoring. In what ways may resources and tools be used to move in the direction of solving Bloom’s two sigma problem/challenge? The first article, by Morten Flate Paulsen, shows how cooperative learning can be implemented successfully so that students have optimal individual freedom within online learning communities. The second article, by Carl F. Dons, shows how student teachers can be prepared to deal with pupils who have a wide range of experiences of the digital world. The third and last article, by Kristin Dale, is sharing experiences with multiple choice-tests to give midterm responses to students. In addition, this issue has a commentary article by Rune Krumsvik discussing the need to develop new practices for teachers and students on the background of the digital developments. The conference and articles covers three big themes. It may be difficult to find more important issues, apart from finding money and time to support its development. Olav Skundberg, guest editorAssociate professor

  11. Understanding illegality and corruption in forest governance.

    Science.gov (United States)

    Sundström, Aksel

    2016-10-01

    This review synthesizes the literature studying illegality and government corruption in forest management. After discussing the theoretical connections between different types of corruption and illegal forest-related activities it describes the major trends in previous studies, examining cross-national patterns as well as local in-depth studies. Both theory and available empirical findings provide a straightforward suggestion: Bribery is indeed a "door opener" for illegal activities to take place in forest management. It then discusses the implications for conservation, focusing first on international protection schemes such as the REDD+ and second on efforts to reduce illegality and bribery in forest management. Key aspects to consider in the discussion on how to design monitoring institutions of forest regulations is how to involve actors without the incentive to engage in bribery and how to make use of new technologies that may publicize illegal behavior in distant localities. The review concludes by discussing avenues for future research. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Private Sharing of User Location over Online Social Networks

    OpenAIRE

    Freudiger, Julien; Neu, Raoul; Hubaux, Jean-Pierre

    2010-01-01

    Online social networks increasingly allow mobile users to share their location with their friends. Much to the detriment of users’ privacy, this also means that social network operators collect users’ lo- cation. Similarly, third parties can learn users’ location from localization and location visualization services. Ideally, third-parties should not be given complete access to users’ location. To protect location privacy, we design and implement a platform-independent solution for users to s...

  13. Clandestine abortions are not necessarily illegal.

    Science.gov (United States)

    Cook, R J

    1991-01-01

    It is common to find the term illegal abortion misused. Often times this misuse is perpetrated by antiabortion advocates who wish to reinforce negative stereotypes and thus apply pressure on doctors to refrain from performing abortions. Until a practitioner is prosecuted and convicted of performing an abortion contrary to the law, the procedure should not be referred to as illegal. Instead the legally neutral term, abortion, should be used instead. This would better serve the interests of women's reproductive health. There is no legal system that makes abortion illegal in all circumstances. For example, abortion is often legal if the life of the mother in danger. This includes a perception on behalf of the practitioner that the women may be suicidal or attempt to terminate the pregnancy by herself. A practitioner performing an abortion in such circumstances is not doing so illegally. The use of the term illegal abortion ignores the fact that in criminal law one is presumed innocent until proven guilty. A prosecutor must prove 1st that an intervention was performed and 2nd that a criminal intent accompanied the intervention. It is this 2nd criterion that is often the hardest to prove, since the practitioner must only testify that the intervention was indicated by legally allowed circumstances to be innocent. The prosecutor must show bad faith in order to gain a justified conviction. Even abortion by unqualified practitioners may not be illegal if doctors refuse to perform the intervention because it is still indicated. Accurate description of abortions would clarify situations in which abortion can be legally provided.

  14. Sharing cost in social community networks

    DEFF Research Database (Denmark)

    Pal, Ranjan; Elango, Divya; Wardana, Satya Ardhy

    2012-01-01

    their deployment in a residential locality. Our proposed mechanism accounts for heterogeneous user preferences towards different router features and comes up with the optimal (feature-set, user costs) router blueprint that satisfies each user in a locality, in turn motivating them to buy routers and thereby improve......Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting...... reflect their slow progress in capturing the WiFi router market. In this paper, we look at a router design and cost sharing problem in WSCNs to improve deployment. We devise a simple to implement, successful, budget-balanced, ex-post efficient, and individually rational auction-based mechanism...

  15. Perspectives on Illegal Routes in Nigeria

    African Journals Online (AJOL)

    Nneka Umera-Okeke

    University of Kwazulu-Natal. Pietermaritzburg, South ... Key Words: Nigeria Immigration Service, Illegal Routes, Security Policing, Border,. State .... transported weapons across borders to sell them in exchange for food or other commodities. ... The study's respondents were of the opinion that illegal routes exist around the ...

  16. Non-POSIX File System for LHCb Online Event Handling

    CERN Document Server

    Garnier, J C; Cherukuwada, S S

    2011-01-01

    LHCb aims to use its O(20000) CPU cores in the high level trigger (HLT) and its 120 TB Online storage system for data reprocessing during LHC shutdown periods. These periods can last a few days for technical maintenance or only a few hours during beam interfill gaps. These jobs run on files which are staged in from tape storage to the local storage buffer. The result are again one or more files. Efficient file writing and reading is essential for the performance of the system. Rather than using a traditional shared file-system such as NFS or CIFS we have implemented a custom, light-weight, non-Posix network file-system for the handling of these files. Streaming this file-system for the data-access allows to obtain high performance, while at the same time keep the resource consumption low and add nice features not found in NFS such as high-availability, transparent fail-over of the read and write service. The writing part of this streaming service is in successful use for the Online, real-time writing of the d...

  17. Network Analysis of an Emergent Massively Collaborative Creation on Video Sharing Website

    Science.gov (United States)

    Hamasaki, Masahiro; Takeda, Hideaki; Nishimura, Takuichi

    The Web technology enables numerous people to collaborate in creation. We designate it as massively collaborative creation via the Web. As an example of massively collaborative creation, we particularly examine video development on Nico Nico Douga, which is a video sharing website that is popular in Japan. We specifically examine videos on Hatsune Miku, a version of a singing synthesizer application software that has inspired not only song creation but also songwriting, illustration, and video editing. As described herein, creators of interact to create new contents through their social network. In this paper, we analyzed the process of developing thousands of videos based on creators' social networks and investigate relationships among creation activity and social networks. The social network reveals interesting features. Creators generate large and sparse social networks including some centralized communities, and such centralized community's members shared special tags. Different categories of creators have different roles in evolving the network, e.g., songwriters gather more links than other categories, implying that they are triggers to network evolution.

  18. Optimizing Knowledge Sharing in Learning Networks through Peer Tutoring

    NARCIS (Netherlands)

    Hsiao, Amy; Brouns, Francis; Kester, Liesbeth; Sloep, Peter

    2009-01-01

    Hsiao, Y. P., Brouns, F., Kester, L., & Sloep, P. (2009). Optimizing Knowledge Sharing in Learning Networks through Peer Tutoring. Presentation at the IADIS international conference on Cognition and Exploratory in Digital Age (CELDA 2009). November, 20-22, 2009, Rome, Italy.

  19. 28 CFR 36.209 - Illegal use of drugs.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Illegal use of drugs. 36.209 Section 36... PUBLIC ACCOMMODATIONS AND IN COMMERCIAL FACILITIES General Requirements § 36.209 Illegal use of drugs. (a... discrimination against an individual based on that individual's current illegal use of drugs. (2) A public...

  20. ``The Legal Bit's in Russian'': Making Sense of Downloaded Music

    Science.gov (United States)

    Kibby, Marjorie D.

    Peer-to-peer sharing of music files grew in the face of consumer dissatisfaction with the compact disc and the absence of any real alternative. Many users were more or less “forced” to turn to illegal file sharing to access single tracks, back catalogues, and niche genres. Recently the almost simultaneous arrival of broadband internet and the iPod has seen music downloading become a respectable activity and a multi-billion dollar industry.

  1. Characteristics of illegal and legal cigarette packs sold in Guatemala.

    Science.gov (United States)

    Arevalo, Rodrigo; Corral, Juan E; Monzon, Diego; Yoon, Mira; Barnoya, Joaquin

    2016-11-25

    Guatemala, as a party to the Framework Convention on Tobacco Control (FCTC), is required to regulate cigarette packaging and labeling and eliminate illicit tobacco trade. Current packaging and labeling characteristics (of legal and illegal cigarettes) and their compliance with the FCTC is unknown. We sought to analyze package and label characteristics of illegal and legal cigarettes sold in Guatemala. We visited the 22 largest traditional markets in the country to purchase illegal cigarettes. All brands registered on tobacco industry websites were purchased as legal cigarettes. Analysis compared labeling characteristics of illegal and legal packs. Most (95%) markets and street vendors sold illegal cigarettes; 104 packs were purchased (79 illegal and 25 legal). Ten percent of illegal and none of the legal packs had misleading terms. Half of the illegal packs had a warning label covering 26 to 50% of the pack surface. All legal packs had a label covering 25% of the surface. Illegal packs were more likely to have information on constituents and emissions (85% vs. 45%, p Guatemala, neither illegal nor legal cigarette packs comply with FCTC labeling mandates. Urgent implementation and enforcement of the FCTC is necessary to halt the tobacco epidemic.

  2. Illegal drug use among female university students in Slovakia.

    Science.gov (United States)

    Matejovičová, Barbora; Trandžík, Jozef; Schlarmannová, Janka; Boledovičová, Mária; Velemínský, Miloš

    2015-01-20

    This study is focused on the issue of illegal drug use among female university students preparing to become teachers. The main aim was to determine the frequency of drug abuse in a group of young women (n=215, mean age 20.44 years). Using survey methods, we determined that 33.48% of female university students in Slovakia use illegal drugs and 66.51% of students have never used illegal drugs. Differences between these groups were determined using statistical analysis, mostly in 4 areas of survey questions. We determined that education of parents has a statistically significant influence on use of illegal drugs by their children (χ2=10.14; Pstudents not using illegal drugs were interested in how their children spend their free time (68.53%). We confirmed the relationship between consumption of alcohol and illegal drug use (χ2=16.645; Pstudents is marijuana. Our findings are relevant for comparison and generalization regarding causes of the steady increase in number of young people using illegal drugs.

  3. If you can't beat 'em, join 'em: Cooperative and non-cooperative games in network sharing

    NARCIS (Netherlands)

    Offergelt, F.H.S.; Berkers, F.T.H.M.; Hendrix, G.P.

    2011-01-01

    No Mobile Network Operator (MNO) will make the decision to share its network lightly. There are many financial and strategic considerations to this question. In this paper we outline a non-cooperative game which can be used to model the strategic decision of an MNO regarding mobile network sharing

  4. 28 CFR 35.131 - Illegal use of drugs.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Illegal use of drugs. 35.131 Section 35... STATE AND LOCAL GOVERNMENT SERVICES General Requirements § 35.131 Illegal use of drugs. (a) General. (1... an individual based on that individual's current illegal use of drugs. (2) A public entity shall not...

  5. Optimization of routing strategies for data transfer in peer-to-peer networks

    International Nuclear Information System (INIS)

    Morioka, Atsushi; Igarashi, Akito

    2014-01-01

    Since peer-to-peer file-sharing systems have become familiar recently, the information traffic in the networks is increasing. Therefore it causes various traffic problems in peer-to-peer networks. In this paper, we model some features of the peer-to-peer networks, and investigate the traffic problems. Peer-to-peer networks have two notable characters. One is that each peer frequently searches for a file and download it from a peer who has the requested file. To decide whether a peer has the requested file or not in modelling of the search and download process, we introduce file-parameter P j , which expresses the amount of files stored in peer j. It is assumed that if P j is large, peer j has many files and can meet other peers' requests with high probability. The other character is that peers leave and join into the network repeatedly. Many researchers address traffic problems of data transfer in computer communication networks. To our knowledge, however, no reports focus on those in peer-to-peer networks whose topology changes with time. For routing paths of data transfer, generally, the shortest paths are used in usual computer networks. In this paper, we introduce a new optimal routing strategy which uses weights of peers to avoid traffic congestion. We find that the new routing strategy is superior to the shortest path strategy in terms of congestion frequency in data transfer

  6. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  7. Fluid limits for bandwidth-sharing networks with rate constraints

    NARCIS (Netherlands)

    M. Frolkova (Masha); J. Reed (Josh); A.P. Zwart (Bert)

    2013-01-01

    htmlabstractBandwidth-sharing networks as introduced by Massouli\\'e~\\& Roberts (1998) model the dynamic interaction among an evolving population of elastic flows competing for several links. With policies based on optimization procedures, such models are of interest both from a~Queueing Theory and

  8. The Music Industry as a Vehicle for Economic Analysis

    Science.gov (United States)

    Klein, Christopher C.

    2015-01-01

    Issues arising in the music industry in response to the availability of digital music files provide an opportunity for exposing undergraduate students to economic analyses rarely covered in the undergraduate economics curriculum. Three of these analyses are covered here: the optimal copyright term, the effect of piracy or illegal file sharing, and…

  9. Trust Transitivity in Social Networks

    OpenAIRE

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical...

  10. Optimization of communication network topology for navigation sharing among distributed satellites

    Science.gov (United States)

    Dang, Zhaohui; Zhang, Yulin

    2013-01-01

    Navigation sharing among distributed satellites is quite important for coordinated motion and collision avoidance. This paper proposes optimization methods of the communication network topology to achieve navigation sharing. The whole communication network constructing by inter-satellite links are considered as a topology graph. The aim of this paper is to find the communication network topology with minimum communication connections' number (MCCN) in different conditions. It has found that the communication capacity and the number of channels are two key parameters affecting the results. The model of MCCN topology for navigation sharing is established and corresponding method is designed. Two main scenarios, viz., homogeneous case and heterogeneous case, are considered. For the homogeneous case where each member has the same communication capacity, it designs a construction method (Algorithm 1) to find the MCCN topology. For the heterogeneous case, it introduces a modified genetic algorithm (Algorithm 2) to find the MCCN topology. When considering the fact that the number of channels is limited, the Algorithm 2 is further modified by adding a penalized term in the fitness function. The effectiveness of these algorithms is all proved in theoretical. Three examples are further tested to illustrate the methods developed in this paper.

  11. An assessment of illegal fishing in Gonarezhou National Park, Zimbabwe

    NARCIS (Netherlands)

    Gandiwa, E.; Zisadza-Gandiwa, P.; Mutandwa, M.; Sandram, S.

    2012-01-01

    Illegal fishing is a worldwide problem. In this study we present the first assessment of illegal fishing in Gonarezhou National Park (GNP), Zimbabwe. Information on illegal fishing was gathered from a total of 39 illegal fishers who were arrested within GNP between February and October 2011. Data

  12. Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks

    OpenAIRE

    Yrjölä, S. (Seppo)

    2017-01-01

    Abstract Sharing is emerging as one of the megatrends influencing future business opportunities, and wireless communications is no exception to this development. Future mobile broadband networks will operate on different types of spectrum bands including shared spectrum, which calls for changes in the operation and management of the networks. The creation and capture of value by the different players in the mobile broadband ecosystem is expected to change due to regulation, technology, an...

  13. Optimizing Knowledge Sharing In Learning Networks Through Peer Tutoring

    NARCIS (Netherlands)

    Hsiao, Amy; Brouns, Francis; Kester, Liesbeth; Sloep, Peter

    2009-01-01

    Hsiao, Y. P., Brouns, F., Kester, L., & Sloep, P. B. (2009). Optimizing Knowledge Sharing In Learning Networks Through Peer Tutoring. In D. Kinshuk, J. Sampson, J. Spector, P. Isaías, P. Barbosa & D. Ifenthaler (Eds.). Proceedings of IADIS International Conference Cognition and Exploratory Learning

  14. An exploratory study of illegal gamblers in Hong Kong

    Directory of Open Access Journals (Sweden)

    Andrew Tessler

    2017-12-01

    Full Text Available Abstract This study investigates the nature and behaviour of illegal gamblers in Hong Kong. A face-to-face street survey of 512 gamblers was conducted in Hong Kong between September and December 2015 with supplementary convenience sampling allowing for analysis of a total sample of 103 illegal gamblers. 56% of illegal gamblers recorded results consistent with this study’s definition of ‘excessive gambling’ [i.e. moderate risk and problem gamblers under the Problem Gambling Severity Index (PGSI]. 81% of surveyed illegal gamblers were male, 77% were aged between 30 and 49 and 67% were in blue collar occupations. Illegal gamblers bet more frequently on both legal and illegal games than their legal counterparts and spent more when they did bet. While this research did not indicate the direction of causality between illegal and excessive gambling, international work (de Bruin et al. in verslingerd aan meer dan een spel: Een onderzoek naar de aard en omvang van kansspelproblematiek in Nederland, WODC/CVO, Utrecht, http://www.lexandgaming.eu/nl/wp-content/uploads/2015/01/Verslingerd-aan-meer-dan-een-spel.pdf , 2005; Binde in What are the most harmful forms of gambling? Analysing problem gambling prevalence surveys, http://www.utbildning.gu.se/digitalAssets/1327/1327132_cefos-wp12.pdf , 2011 suggests that excessive gamblers are drawn to illegal gambling. Reform could allow excessive gambling by illegal gamblers to be better addressed and initial work suggests some financial benefits to Hong Kong.

  15. Categorical Structure among Shared Features in Networks of Early-Learned Nouns

    Science.gov (United States)

    Hills, Thomas T.; Maouene, Mounir; Maouene, Josita; Sheya, Adam; Smith, Linda

    2009-01-01

    The shared features that characterize the noun categories that young children learn first are a formative basis of the human category system. To investigate the potential categorical information contained in the features of early-learned nouns, we examine the graph-theoretic properties of noun-feature networks. The networks are built from the…

  16. Sharing for Health: A Study of Chinese Adolescents' Experiences and Perspectives on Using Social Network Sites to Share Health Information.

    Science.gov (United States)

    Zhang, Ni; Teti, Michele; Stanfield, Kellie; Campo, Shelly

    2017-07-01

    This exploratory qualitative study examines Chinese adolescents' health information sharing habits on social network sites. Ten focus group meetings with 76 adolescents, ages 12 to 17 years, were conducted at community-based organizations in Chicago's Chinatown. The research team transcribed the recording and analyzed the transcripts using ATLAS.ti. Chinese adolescents are using different social network sites for various topics of health information including food, physical activity, and so on. Adolescents would share useful and/or interesting health information. Many adolescents raised credibility concerns regarding health information and suggested evaluating the information based on self-experience or intuition, word-of-mouth, or information online. The findings shed lights on future intervention using social network sites to promote health among Chinese adolescents in the United States. Future interventions should provide adolescents with interesting and culturally sensitive health information and educate them to critically evaluate health information on social network sites.

  17. Researching illegal logging and deforestation

    OpenAIRE

    Boekhout van Solinge, T.

    2014-01-01

    Tropical deforestation such as in the Amazon can be studied well from a green criminological perspective. Ethnographic research methods form a useful way to get insight into the dynamics and complexity of tropical deforestation, which often is illegal. This article gives an account of various ethnographic visits to the rainforests of the Amazon in the period 2003-2014. Ethnographic methods provide insight into the overlap between the legal and illegal, the functioning (or not) of state instit...

  18. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    KAUST Repository

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent

  19. GIFT: an HEP project for file transfer

    International Nuclear Information System (INIS)

    Ferrer, M.L.; Mirabelli, G.; Valente, E.

    1986-01-01

    Started in autumn 1983, GIFT (General Internetwork File Transfer) is a collaboration among several HEP centers, including CERN, Frascati, Oslo, Oxford, RAL and Rome. The collaboration was initially set up with the aim of studying the feasibility of a software system to allow direct file exchange between computers which do not share a common Virtual File Protocol. After the completion of this first phase, an implementation phase started and, since March 1985, an experimental service based on this system has been running at CERN between DECnet, CERNET and the UK Coloured Book protocols. The authors present the motivations that, together with previous gateway experiences, led to the definition of GIFT specifications and to the implementation of the GIFT Kernel system. The position of GIFT in the overall development framework of the networking facilities needed by large international collaborations within the HEP community is explained. (Auth.)

  20. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  1. Judgments about illegal performance-enhancing substances: reasoned, reactive, or both?

    Science.gov (United States)

    Dodge, Tonya; Stock, Michelle; Litt, Dana

    2013-07-01

    This study applied aspects of the Theory of Reasoned Action and the Prototype/Willingness model to understand cognitions associated with the use of illegal performance-enhancing substances. There were two study objectives. One was to investigate whether the illegal-is-effective heuristic (i.e. belief that illegal performance-enhancing substances are more effective than legal performance-enhancing substances) affects willingness to use illegal performance-enhancing substances. The second was to examine whether attitudes, norms, and prototypes influence the willingness and intentions to use illegal performance-enhancing substances. The illegal-is-effective heuristic was a significant predictor of willingness but was not a significant predictor of intentions. Implications for future research and prevention efforts are discussed.

  2. Knowledge sharing Network analysis and its relationship with the experience and education of librarians at Ferdowsi University of Mashhad

    Directory of Open Access Journals (Sweden)

    Maryam Salami

    2017-03-01

    Full Text Available As human resources are important resources in organization, it is important for organizations to use knowledge organization of human resources. Thus managing and sharing knowledge in organizations is so important. Libraries as well service-oriented and knowledge-based organizations, librarians’ contribution of knowledge management is important. The study tries to determine Ferdowsi University of Mashhad librarians’ participation in the process of knowledge sharing by knowledge sharing network analysis method. The application used for social network analysis is UCINET6. Determining the degree of centralization in the network of knowledge sharing can also help to detect factors may influence it. In this study, the degree of centralization in the network of knowledge sharing communicating with the librarians' qualifications and work experiences were tested. It is also determined the degree centralization of the whole of the knowledge sharing network with 26.76% that is not so satisfactory.  The results show that despite the positive relationship between level of education and the centrality of people, the experience no significant relationship. Statistically, there is also no significant difference between men and women in knowledge sharing degrees of librarians in Ferdowsi University of Mashhad. At the end, according to the results of this research some suggestions are given to increase degrees of knowledge sharing of librarians and generally knowledge sharing degree of the network knowledge sharing.

  3. Give-and-take based peer-to-peer content distribution networks

    Indian Academy of Sciences (India)

    Compared to traditional content distribution schemes, peer- to-peer networks ... are shared among users who desire to download files. In a peer-to-peer ..... randomly generated data points, with 300 segments and 200 peers. From the figure ...

  4. Network computing infrastructure to share tools and data in global nuclear energy partnership

    International Nuclear Information System (INIS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    2010-01-01

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer - Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP. (author)

  5. Patterns in the distribution of digital games via BitTorrent

    DEFF Research Database (Denmark)

    Drachen, Anders; Veitch, Robert W. D.

    2013-01-01

    The distribution of illegal copies of computer games via digital networks forms the centre in one of the most heated debates in the international games environment, but there is minimal objective information available. Here the results of a large-scale, open-method analysis of the distribution...... of computer games via BitTorrent peer-to-peer file-sharing protocol is presented. 173 games were included, tracked over a period of three months from 2010 to 2011. A total of 12.6 million unique peers were identified across over 200 countries. Analysis indicates that the distribution of illegal copies...... of games follows distinct pattern, e.g., that a few game titles drive the traffic - the 10 most accessed games encompassed 42.7% of the number of peers tracked. The traffic is geographically localised - 20 countries encompassed 76.7% of the total. Geographic patterns in the distribution of BitTorrent peers...

  6. 26 CFR 1.162-18 - Illegal bribes and kickbacks.

    Science.gov (United States)

    2010-04-01

    ... bribe (whether or not illegal) made on or after December 10, 1971, by any provider of services, supplier... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Illegal bribes and kickbacks. 1.162-18 Section 1... bribes and kickbacks. (a) Illegal payments to government officials or employees—(1) In general. No...

  7. Construction and Application of a National Data-Sharing Service Network of Material Environmental Corrosion

    Directory of Open Access Journals (Sweden)

    Xiaogang Li

    2007-12-01

    Full Text Available This article discusses the key features of a newly developed national data-sharing online network for material environmental corrosion. Written in Java language and based on Oracle database technology, the central database in the network is supported with two unique series of corrosion failure data, both of which were accumulated during a long period of time. The first category of data, provided by national environment corrosion test sites, is corrosion failure data for different materials in typical environments (atmosphere, seawater and soil. The other category is corrosion data in production environments, provided by a variety of firms. This network system enables standardized management of environmental corrosion data, an effective data sharing process, and research and development support for new products and after-sale services. Moreover this network system provides a firm base and data-service platform for the evaluation of project bids, safety, and service life. This article also discusses issues including data quality management and evaluation in the material corrosion data sharing process, access authority of different users, compensation for providers of shared historical data, and finally, the related policy and law legal processes, which are required to protect the intellectual property rights of the database.

  8. Piracy, Music, and Movies: A Natural Experiment

    OpenAIRE

    Adermon, Adrian; Liang, Che-Yuan

    2010-01-01

    Abstract: This paper investigates the effects of illegal file sharing (piracy) on music and movie sales. The Swedish implementation of the European Union directive IPRED on April 1, 2009 suddenly increased the risk of being caught and prosecuted for file sharing. We investigate the subsequent drop in piracy as approximated by the drop in Swedish Internet traffic and the effects on music and movie sales in Sweden. We find that the reform decreased Internet traffic by 18 percent during the subs...

  9. The importance of social networks in their association to drug equipment sharing among injection drug users: a review.

    Science.gov (United States)

    De, Prithwish; Cox, Joseph; Boivin, Jean-François; Platt, Robert W; Jolly, Ann M

    2007-11-01

    To examine the scientific evidence regarding the association between characteristics of social networks of injection drug users (IDUs) and the sharing of drug injection equipment. A search was performed on MEDLINE, EMBASE, BIOSIS, Current Contents, PsycINFO databases and other sources to identify published studies on social networks of IDUs. Papers were selected based on their examination of social network factors in relation to the sharing of syringes and drug preparation equipment (e.g. containers, filters, water). Additional relevant papers were found from the reference list of identified articles. Network correlates of drug equipment sharing are multi-factorial and include structural factors (network size, density, position, turnover), compositional factors (network member characteristics, role and quality of relationships with members) and behavioural factors (injecting norms, patterns of drug use, severity of drug addiction). Factors appear to be related differentially to equipment sharing. Social network characteristics are associated with drug injection risk behaviours and should be considered alongside personal risk behaviours in prevention programmes. Recommendations for future research into the social networks of IDUs are proposed.

  10. Sci-Share: Social Networking Adapted for Distributed Scientific Collaboration, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Our goal is to develop a social networking site with novel, specially designed feature sets to enable simultaneous remote collaboration and sharing of large data...

  11. ILLEGAL MIGRATION-CONCEPTUAL DELIMITATIONS

    Directory of Open Access Journals (Sweden)

    CRISTINA FLORINA POPESCU (PANAIT

    2013-05-01

    Full Text Available Illegal migration is a mobile phenomenon, which ignores national borders, a threat that originates outside the community and extends to Western societies. This phenomenon is becoming larger and irregular migrants are often in a precarious situation and exposed to the criminals involved in various manifestations of organized crime. The future risk factors of the illegal migration are the demographic bomb, because the population is decreasing in European countries and increasing rapidly in poorer countries, droughts, floods, deforestation, that cause conflicts between climate refugees , extreme poverty, totalitarian regimes, epidemics, can trigger millions of people, the elderly and the working population imbalance which leads to the permanent import of immigrants To combat this phenomenon, states must engage and cooperate with each other. Measures taken by states must balance their integration policy for immigrants, legally residents and asylum policy to comply with international conventions. Also, states must adopt anti-immigrant policies, consisting of subordination visa policy to the interests of international security and exchange of information and, not least, to continue the Schengen process, as a value of humanitarian law applied in the field. The aim of the research is to characterize this dangerous phenomenon for the society and the goal is to identify strategies to combat illegal migration.

  12. Shared "core" areas between the pain and other task-related networks.

    Directory of Open Access Journals (Sweden)

    Franco Cauda

    Full Text Available The idea of a 'pain matrix' specifically devoted to the processing of nociceptive inputs has been challenged. Alternative views now propose that the activity of the primary and secondary somatosensory cortices (SI, SII, the insula and cingulate cortex may be related to a basic defensive system through which significant potentially dangerous events for the body's integrity are detected. By reviewing the role of the SI, SII, the cingulate and the insular cortices in the perception of nociceptive and tactile stimuli, in attentional, emotional and reward tasks, and in interoception and memory, we found that all these task-related networks overlap in the dorsal anterior cingulate cortex, the anterior insula and the dorsal medial thalamus. A thorough analysis revealed that the 'pain-related' network shares important functional similarities with both somatomotor-somatosensory networks and emotional-interoceptive ones. We suggest that these shared areas constitute the central part of an adaptive control system involved in the processing and integration of salient information coming both from external and internal sources. These areas are activated in almost all fMRI tasks and have been indicated to play a pivotal role in switching between externally directed and internally directed brain networks.

  13. Illegal fishing and territorial user rights in Chile.

    Science.gov (United States)

    Oyanedel, Rodrigo; Keim, Andres; Castilla, Juan Carlos; Gelcich, Stefan

    2017-11-07

    Illegal fishing poses a major threat to conservation of marine resources worldwide. However, there is still limited empirical research that quantifies illegal catch levels. We used the randomized response technique to estimate the proportion of divers and the quantities of loco (Concholepas concholepas) they extracted illegally. Loco have been managed for the past 17 years through a territorial user rights for fisheries system (TURFs) in Chile. Illegal fishing of loco was widespread within the TURFs system. Official reported landings (i.e., legal landings) accounted for 14-30% of the total loco extraction. Our estimates suggest that ignoring the magnitude of illegal fishing and considering only official landing statistics may lead to false conclusions about the status and trends of a TURFs managed fishery. We found evidence of fisher associations authorizing their members to poach inside TURFs, highlighting the need to design TURFs systems so that government agencies and fishers' incentives and objectives align through continuous adaptation. Government support for enforcement is a key element for the TURFs system to secure the rights that are in place. © 2017 Society for Conservation Biology.

  14. Generalized Load Sharing for Homogeneous Networks of Distributed Environment

    Directory of Open Access Journals (Sweden)

    A. Satheesh

    2008-01-01

    Full Text Available We propose a method for job migration policies by considering effective usage of global memory in addition to CPU load sharing in distributed systems. When a node is identified for lacking sufficient memory space to serve jobs, one or more jobs of the node will be migrated to remote nodes with low memory allocations. If the memory space is sufficiently large, the jobs will be scheduled by a CPU-based load sharing policy. Following the principle of sharing both CPU and memory resources, we present several load sharing alternatives. Our objective is to reduce the number of page faults caused by unbalanced memory allocations for jobs among distributed nodes, so that overall performance of a distributed system can be significantly improved. We have conducted trace-driven simulations to compare CPU-based load sharing policies with our policies. We show that our load sharing policies not only improve performance of memory bound jobs, but also maintain the same load sharing quality as the CPU-based policies for CPU-bound jobs. Regarding remote execution and preemptive migration strategies, our experiments indicate that a strategy selection in load sharing is dependent on the amount of memory demand of jobs, remote execution is more effective for memory-bound jobs, and preemptive migration is more effective for CPU-bound jobs. Our CPU-memory-based policy using either high performance or high throughput approach and using the remote execution strategy performs the best for both CPU-bound and memory-bound job in homogeneous networks of distributed environment.

  15. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  16. Legal Effects of Link Sharing in Social Networks

    Directory of Open Access Journals (Sweden)

    Eugenio Gil

    2015-12-01

    Full Text Available Knowledge sharing among individuals has changed deeply with the advent of social networks in the environment of Web 2.0. Every user has the possibility of publishing what he or she deems of interest for their audience, regardless of the origin or authorship of the piece of knowledge. It is generally accepted that as the user is sharing a link to a document or video, for example, without getting paid for it, there is no point in worrying about the rights of the original author. It seems that the concepts of authorship and originality is about to disappear as promised the structuralists fifty years ago. Nevertheless the legal system has not changed, nor have the economic interests concerned. This paper explores the last developments of the legal system concerning these issues.

  17. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge Bow-Nan Cheng, Greg Kuperman, Patricia Deutsch, Logan...been a large push in the U.S. Department of Defense to move to an all Internet Protocol (IP) infrastructure, particularly on the tactical edge . IP and...lossy links, and scaling to large numbers of users. Unfortunately, these are the exact conditions military tactical edge networks must operate within

  18. Optimal File-Distribution in Heterogeneous and Asymmetric Storage Networks

    Science.gov (United States)

    Langner, Tobias; Schindelhauer, Christian; Souza, Alexander

    We consider an optimisation problem which is motivated from storage virtualisation in the Internet. While storage networks make use of dedicated hardware to provide homogeneous bandwidth between servers and clients, in the Internet, connections between storage servers and clients are heterogeneous and often asymmetric with respect to upload and download. Thus, for a large file, the question arises how it should be fragmented and distributed among the servers to grant "optimal" access to the contents. We concentrate on the transfer time of a file, which is the time needed for one upload and a sequence of n downloads, using a set of m servers with heterogeneous bandwidths. We assume that fragments of the file can be transferred in parallel to and from multiple servers. This model yields a distribution problem that examines the question of how these fragments should be distributed onto those servers in order to minimise the transfer time. We present an algorithm, called FlowScaling, that finds an optimal solution within running time {O}(m log m). We formulate the distribution problem as a maximum flow problem, which involves a function that states whether a solution with a given transfer time bound exists. This function is then used with a scaling argument to determine an optimal solution within the claimed time complexity.

  19. Enabling Interoperable and Selective Data Sharing among Social Networking Sites

    Science.gov (United States)

    Shin, Dongwan; Lopes, Rodrigo

    With the widespread use of social networking (SN) sites and even introduction of a social component in non-social oriented services, there is a growing concern over user privacy in general, how to handle and share user profiles across SN sites in particular. Although there have been several proprietary or open source-based approaches to unifying the creation of third party applications, the availability and retrieval of user profile information are still limited to the site where the third party application is run, mostly devoid of the support for data interoperability. In this paper we propose an approach to enabling interopearable and selective data sharing among SN sites. To support selective data sharing, we discuss an authenticated dictionary (ADT)-based credential which enables a user to share only a subset of her information certified by external SN sites with applications running on an SN site. For interoperable data sharing, we propose an extension to the OpenSocial API so that it can provide an open source-based framework for allowing the ADT-based credential to be used seamlessly among different SN sites.

  20. Parallel file system with metadata distributed across partitioned key-value store c

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-09-19

    Improved techniques are provided for storing metadata associated with a plurality of sub-files associated with a single shared file in a parallel file system. The shared file is generated by a plurality of applications executing on a plurality of compute nodes. A compute node implements a Parallel Log Structured File System (PLFS) library to store at least one portion of the shared file generated by an application executing on the compute node and metadata for the at least one portion of the shared file on one or more object storage servers. The compute node is also configured to implement a partitioned data store for storing a partition of the metadata for the shared file, wherein the partitioned data store communicates with partitioned data stores on other compute nodes using a message passing interface. The partitioned data store can be implemented, for example, using Multidimensional Data Hashing Indexing Middleware (MDHIM).

  1. Virtual File System Mounting amp Searching With Network JVM For LAN

    Directory of Open Access Journals (Sweden)

    Nikita Kamble

    2015-08-01

    Full Text Available Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and other mobile devices that share resources such as printer or network storage. A LAN is contrasted in principle to a wide area networkWANwhich covers a larger geographic distance and may involve leased telecom circuits while the media for LANs are locally managed. Ethernet are twisted pair cabling amp Wi-Fi are the two most common transmission technologies in use for LAN. The rise of virtualization has fueled the development of virtual LANWLANwhich allows network administrator to logically group network nodes amp partition their networks without the need for major infrastructure changes. In some situations a wireless LAN or Wi-Fi maybe preferable to a wired LAN because of its flexibility amp cost. Companies are asserting WLANs as a replacement for their wired infrastructure as the number of smart phones tablets amp other mobile devices proliferates.

  2. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  3. Illegal killing for ivory drives global decline in African elephants.

    Science.gov (United States)

    Wittemyer, George; Northrup, Joseph M; Blanc, Julian; Douglas-Hamilton, Iain; Omondi, Patrick; Burnham, Kenneth P

    2014-09-09

    Illegal wildlife trade has reached alarming levels globally, extirpating populations of commercially valuable species. As a driver of biodiversity loss, quantifying illegal harvest is essential for conservation and sociopolitical affairs but notoriously difficult. Here we combine field-based carcass monitoring with fine-scale demographic data from an intensively studied wild African elephant population in Samburu, Kenya, to partition mortality into natural and illegal causes. We then expand our analytical framework to model illegal killing rates and population trends of elephants at regional and continental scales using carcass data collected by a Convention on International Trade in Endangered Species program. At the intensively monitored site, illegal killing increased markedly after 2008 and was correlated strongly with the local black market ivory price and increased seizures of ivory destined for China. More broadly, results from application to continental data indicated illegal killing levels were unsustainable for the species between 2010 and 2012, peaking to ∼ 8% in 2011 which extrapolates to ∼ 40,000 elephants illegally killed and a probable species reduction of ∼ 3% that year. Preliminary data from 2013 indicate overharvesting continued. In contrast to the rest of Africa, our analysis corroborates that Central African forest elephants experienced decline throughout the last decade. These results provide the most comprehensive assessment of illegal ivory harvest to date and confirm that current ivory consumption is not sustainable. Further, our approach provides a powerful basis to determine cryptic mortality and gain understanding of the demography of at-risk species.

  4. Computerized management of radiology department: Installation and use of local area network(LAN) by personal computers

    International Nuclear Information System (INIS)

    Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo

    1993-01-01

    There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe

  5. Illegal markets, human trade and transnational organised crime

    Directory of Open Access Journals (Sweden)

    Nikolić-Ristanović Vesna Ž.

    2003-01-01

    Full Text Available In this paper the author explores, focusing largely on the example of the Balkans, the connection between the expansion of neoliberal market economy and war, and related to it the growth of illegal markets and the shadow economy, on one hand, and the victimisation by human trafficking, on the other. By locating human trade within expanding local and global illegal markets, the author is arguing that, without taking into consideration wider social contexts, which create structural incentives for illegal markets and transnational organised crime, we can hardly understand the causes, let alone build effective strategies to combat and prevent it. Consequently, on the basis of the analyses of human trade as a form of both transnational organised crime and illegal markets, some strategies (short-term and long-term for the prevention and control of human trafficking on both the micro and macro level are suggested.

  6. The social sharing of emotion (SSE) in online social networks: a case study in Live Journal

    NARCIS (Netherlands)

    Rodriguez Hidalgo, C.T.; Tan, E.S.; Verlegh, P.W.J.

    2015-01-01

    Social Sharing of Emotion (SSE) occurs when one person shares an emotional experience with another and is considered potentially beneficial. Though social sharing has been shown prevalent in interpersonal communication, research on its occurrence and communication structure in online social networks

  7. Investigation of Load Sharing in Hybrid (2G/3G) Mobile Networks

    OpenAIRE

    Martynas Stirbys; Karolis Žvinys

    2015-01-01

    The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indica...

  8. Economic incentives exist to support measures to reduce illegal logging

    Science.gov (United States)

    J.A. Turner; J. Buongiorno; A. Katz; S. Zhu; R. Li

    2008-01-01

    Three studies of the global economic implications of eliminating illegal logging are summarized. Processors of illegally sourced wood would lose from the elimination of illegal logging through high prices for logs and decreased production of wood products. Associated with these changes could be losses in employment and income. Beyond these losses to the processing...

  9. Non-sanctioning of illegal tackles in South African youth community rugby.

    Science.gov (United States)

    Brown, J C; Boucher, S J; Lambert, M; Viljoen, W; Readhead, C; Hendricks, S; Kraak, W J

    2018-06-01

    The tackle event in rugby union ('rugby') contributes to the majority of players' injuries. Referees can reduce this risk by sanctioning dangerous tackles. A study in elite adult rugby suggests that referees only sanction a minority of illegal tackles. The aim of this study was to assess if this finding was similar in youth community rugby. Observational study. Using EncodePro, 99 South African Rugby Union U18 Youth Week tournament matches were coded between 2011 and 2015. All tackles were coded by a researcher and an international referee to ensure that laws were interpreted correctly. The inter- and intra-rater reliabilities were 0.97-1.00. A regression analysis compared the non-sanctioned rates over time. In total, 12 216 tackles were coded, of which less than 1% (n=113) were 'illegal'. The majority of the 113 illegal tackles were front-on (75%), high tackles (72%) and occurred in the 2nd/4th quarters (29% each). Of the illegal tackles, only 59% were sanctioned. The proportions of illegal tackles and sanctioning of these illegal tackles to all tackles improved by 0.2% per year from 2011-2015 (p<0.05). In these youth community rugby players, 59% of illegal tackles were not sanctioned appropriately. This was better than a previous study in elite adult rugby, where only 7% of illegal tackles were penalised. Moreover, the rates of illegal tackles and non-sanctioned illegal tackles both improved over time. However, it is critical that referees consistently enforce all laws to enhance injury prevention efforts. Further studies should investigate the reasons for non-sanctioning. Copyright © 2017 Sports Medicine Australia. Published by Elsevier Ltd. All rights reserved.

  10. The Value Added Tax Implications of Illegal Transactions | van Zyl ...

    African Journals Online (AJOL)

    This article explores whether or not the decision in the MP Finance-case (and preceding cases on the taxation of illegal receipts) can be applied to determine if illegal transactions are subject to VAT and moreover if a trader in illegal goods and services should register as a VAT vendor. Although strictly speaking no analogy ...

  11. On the Macroeconomic and Welfare Effects of Illegal Immigration

    OpenAIRE

    Liu, Xiangbo

    2009-01-01

    This paper investigates the macroeconomic and welfare effects of illegal immigration on the native born within a dynamic general equilibrium framework with labor market frictions. A key feature of the model is that job competition is allowed for between domestic workers and illegal immigrants. We calibrate the model to match some key statistics of the postwar U.S. economy. The model predicts that in the long run illegal immigration is a boon, but the employment opportunities of domestic wo...

  12. Exploring differences among illegal activities in the Ugalla Game ...

    African Journals Online (AJOL)

    Exploring differences among illegal activities in the Ugalla Game Reserve of ... This study aimed to explore the differences among various illegal activities occurring in Ugalla Game Reserve, western Tanzania. ... AJOL African Journals Online.

  13. Investigation of Load Sharing in Hybrid (2G/3G Mobile Networks

    Directory of Open Access Journals (Sweden)

    Martynas Stirbys

    2015-07-01

    Full Text Available The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indicators.

  14. Evolution of market shares with repeated purchases and heterogeneous network externalities

    NARCIS (Netherlands)

    M.C.W. Janssen (Maarten); E. Mendys

    2007-01-01

    textabstractWe investigate how market shares change when a new, superior technology exhibiting network externalities is introduced in a market initially dominated by an old technology. This is done under the assumption that consumers are heterogeneous in their valuation of technology quality and

  15. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  16. Knowledge sharing in an Emerging Network of Practice: The Role of a Knowledge Portal

    NARCIS (Netherlands)

    P.J. van Baalen (Peter); J.M. Bloemhof-Ruwaard (Jacqueline); H.W.G.M. van Heck (Eric)

    2005-01-01

    textabstractThis article addresses the emergence of networks of practice and the role of knowledge sharing via knowledge portals. Its focus is on factors that stimulate the successful emergence of networks of practice. Literature on knowledge management and communities of practice suggest the

  17. Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt

    2010-01-01

    in high mobility conditions. These goals can be only achieved through the use highly Optimized Local Area (OLA) access networks, operating at low range and low power transmissions. The efficient sharing of radio resources among OLAs will be very difficult to achieve with a traditional network planning......The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...

  18. 49 CFR 28.131 - Illegal use of drugs.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Illegal use of drugs. 28.131 Section 28.131 Transportation Office of the Secretary of Transportation ENFORCEMENT OF NONDISCRIMINATION ON THE BASIS OF HANDICAP IN PROGRAMS OR ACTIVITIES CONDUCTED BY THE DEPARTMENT OF TRANSPORTATION § 28.131 Illegal use of...

  19. Perception of illegal practice of medicine by Brazilian medical students.

    Science.gov (United States)

    Lins, Liliane; Herbas, Suzana; Lisboa, Larissa; Damasceno, Hannah; Menezes, Marta

    2014-06-01

    Illegal practice of medicine by medical students is a worldwide problem. In Brazil, information about this issue is scarce. To describe the perception of illegal practice of medicine by medical students. A cross-sectional study in a stratified random sample of 130 medical students in the 6th to 12th semesters from a private faculty of medicine in Salvador, State of Bahia, Brazil, from September to October 2011. Students responded to a standardised questionnaire about the illegal practice of medicine by medical students. Knowing medical students who practised medical activities without supervision was reported by 86% of the respondents, and 93.8% had heard about someone who performed such practices. Medical specialties most often associated with illegal practice were general medicine (78.8%) and occupational health (55.9%). Illegal practice of medicine was more common in peripheral cities/towns (83.9%) than in the State capital, Salvador City (52.4%). Only 10.5% of illegal activities were reported to the authorities. Unsupervised medical practice was more often reported in the 8th-9th semester (56.8%) and 10th-11th semester (54.4%) of medical school. Illegal practice of medicine was commonly reported by the medical students questioned. The high frequency of reported illegal practice for financial reasons highlights the need for greater availability of paid internships for medical students. Educational institutions represent the social control responsible for supervising the activities of academics. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. 76 FR 79169 - Power Network New Mexico, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes...

    Science.gov (United States)

    2011-12-21

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ER12-605-000] Power Network New Mexico, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes Request for... Power Network New Mexico, LLC's application for market-based rate authority, with an accompanying rate...

  1. environmental impact of illegal refineries on the vegetation

    African Journals Online (AJOL)

    Dr. O. M. Adesope

    impact of illegal oil refineries in the Niger Delta, Nigeria, the floristic composition of the fresh water swamp forest at refining sites in two river systems and a brackish ... ecosystem of Rivers State, five species of Mangroves and two species of ... Visual observation was made along the Rivers to identify illegal refinery stations.

  2. Tracking the dynamic variations in a social network formed through shared interests

    Directory of Open Access Journals (Sweden)

    Gerold Pedemonte

    2009-06-01

    Full Text Available We tracked the dynamics of a social network formed by a shared interest in movies. Users-, movie ratings-, and rental date-data from the Netflix Prize dataset were used to construct a series of date-filtered social networks, wherein viewers were linked when they rented the same movie and gave the same rating. We obtained a nearly constant high clustering coefficient (0.60 – 0.85, and a low average path length (1.4 – 2.3 indicating a static 'small-world' network despite the dynamic behavior of the borrowers.

  3. Illegible handwriting and other prescription errors on prescriptions at ...

    African Journals Online (AJOL)

    H. Brits

    Background: It is generally accepted that doctors have illegible handwriting. The writer usually ... the text.2 The following quote stresses the problem with illegible ... to determine which group of health care workers (HCWs) could read the ...

  4. Hierarchical Data Distribution Scheme for Peer-to-Peer Networks

    Science.gov (United States)

    Bhushan, Shashi; Dave, M.; Patel, R. B.

    2010-11-01

    In the past few years, peer-to-peer (P2P) networks have become an extremely popular mechanism for large-scale content sharing. P2P systems have focused on specific application domains (e.g. music files, video files) or on providing file system like capabilities. P2P is a powerful paradigm, which provides a large-scale and cost-effective mechanism for data sharing. P2P system may be used for storing data globally. Can we implement a conventional database on P2P system? But successful implementation of conventional databases on the P2P systems is yet to be reported. In this paper we have presented the mathematical model for the replication of the partitions and presented a hierarchical based data distribution scheme for the P2P networks. We have also analyzed the resource utilization and throughput of the P2P system with respect to the availability, when a conventional database is implemented over the P2P system with variable query rate. Simulation results show that database partitions placed on the peers with higher availability factor perform better. Degradation index, throughput, resource utilization are the parameters evaluated with respect to the availability factor.

  5. ABORTION IN BRAZIL: IMPACTS OF ILLEGALITY IN PUBLIC HEALTH

    Directory of Open Access Journals (Sweden)

    Vanessa Cruz Santos

    2013-12-01

    Full Text Available Abortion in Brazil provides public health impacts, mainly due to the high rate of maternal morbidity and mortality, because it most often occurs in an illegal practice and / or unsafe, because of the illegality of abortion in certain situations in the country. Therefore, it is an issue that refers to the various reflections, such as legal, moral, cultural, socio-economic and bioethical. Given the above, the study aims to address about abortion in Brazil and the impacts of illegality in public health. Study of literature review, descriptive and discursive, held in the database SciELO sites and governmental and non-governmental organizations. It was evident that the illegality of abortion in Brazil is harmful to the health of women who resort to unsafe practices and / or illegal, a violation of human rights, the women’s autonomy, as well as providing public health impacts, and sometimes this actually happens because the deficit in quality of care, specifically to sexual and reproductive health, as the actions of Family Planning. It is considered that the way of abortion in Brazil requires modifications, especially with regard to legislative and bioethics conflicts.

  6. Lessons Learned in Deploying the World s Largest Scale Lustre File System

    Energy Technology Data Exchange (ETDEWEB)

    Dillow, David A [ORNL; Fuller, Douglas [ORNL; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Zhang, Zhe [ORNL; Hill, Jason J [ORNL; Shipman, Galen M [ORNL

    2010-01-01

    The Spider system at the Oak Ridge National Laboratory's Leadership Computing Facility (OLCF) is the world's largest scale Lustre parallel file system. Envisioned as a shared parallel file system capable of delivering both the bandwidth and capacity requirements of the OLCF's diverse computational environment, the project had a number of ambitious goals. To support the workloads of the OLCF's diverse computational platforms, the aggregate performance and storage capacity of Spider exceed that of our previously deployed systems by a factor of 6x - 240 GB/sec, and 17x - 10 Petabytes, respectively. Furthermore, Spider supports over 26,000 clients concurrently accessing the file system, which exceeds our previously deployed systems by nearly 4x. In addition to these scalability challenges, moving to a center-wide shared file system required dramatically improved resiliency and fault-tolerance mechanisms. This paper details our efforts in designing, deploying, and operating Spider. Through a phased approach of research and development, prototyping, deployment, and transition to operations, this work has resulted in a number of insights into large-scale parallel file system architectures, from both the design and the operational perspectives. We present in this paper our solutions to issues such as network congestion, performance baselining and evaluation, file system journaling overheads, and high availability in a system with tens of thousands of components. We also discuss areas of continued challenges, such as stressed metadata performance and the need for file system quality of service alongside with our efforts to address them. Finally, operational aspects of managing a system of this scale are discussed along with real-world data and observations.

  7. Information sharing and relationships on social networking sites.

    Science.gov (United States)

    Steijn, Wouter M P; Schouten, Alexander P

    2013-08-01

    This article investigates the relationship between sharing personal information and relationship development in the context of social networking sites (SNSs). Information disclosed on these sites could affect relationships in a different manner compared to more traditional interactions, such as instant messaging or face-to-face interaction. Respondents in the age range of 12 to 83 were surveyed about experiences of relationship development as a consequence of contact through Facebook or Hyves-the most popular Dutch SNSs. Results showed a primarily positive effect of information sharing on SNSs on our relationships. Furthermore, relationship development mainly occurs among acquaintances and friends, and public posts are most strongly related to relationship development. These findings suggest that SNSs might affect relationships in a distinct fashion as acquaintances and friends gain access to public self-disclosures that might normally only be reserved for close friends and family. Overall, this study provides an insight into some of the positive aspects of the public nature of SNSs in contrast with the general negative associations.

  8. Sharing and community curation of mass spectrometry data with Global Natural Products Social Molecular Networking

    DEFF Research Database (Denmark)

    Wang, Mingxun; Carver, Jeremy J.; Pevzner, Pavel

    2016-01-01

    are well-suited to high-throughput characterization of NP, there is a pressing need for an infrastructure to enable sharing and curation of data. We present Global Natural Products Social Molecular Networking (GNPS; http://gnps.ucsd.edu), an open-access knowledge base for community-wide organization...... and sharing of raw, processed or identified tandem mass (MS/MS) spectrometry data. In GNPS, crowdsourced curation of freely available community-wide reference MS libraries will underpin improved annotations. Data-driven social-networking should facilitate identification of spectra and foster collaborations...

  9. Traffic sharing algorithms for hybrid mobile networks

    Science.gov (United States)

    Arcand, S.; Murthy, K. M. S.; Hafez, R.

    1995-01-01

    In a hybrid (terrestrial + satellite) mobile personal communications networks environment, a large size satellite footprint (supercell) overlays on a large number of smaller size, contiguous terrestrial cells. We assume that the users have either a terrestrial only single mode terminal (SMT) or a terrestrial/satellite dual mode terminal (DMT) and the ratio of DMT to the total terminals is defined gamma. It is assumed that the call assignments to and handovers between terrestrial cells and satellite supercells take place in a dynamic fashion when necessary. The objectives of this paper are twofold, (1) to propose and define a class of traffic sharing algorithms to manage terrestrial and satellite network resources efficiently by handling call handovers dynamically, and (2) to analyze and evaluate the algorithms by maximizing the traffic load handling capability (defined in erl/cell) over a wide range of terminal ratios (gamma) given an acceptable range of blocking probabilities. Two of the algorithms (G & S) in the proposed class perform extremely well for a wide range of gamma.

  10. Interference-Aware Spectrum Sharing Techniques for Next Generation Wireless Networks

    KAUST Repository

    Qaraqe, Marwa Khalid

    2011-11-20

    Background: Reliable high-speed data communication that supports multimedia application for both indoor and outdoor mobile users is a fundamental requirement for next generation wireless networks and requires a dense deployment of physically coexisting network architectures. Due to the limited spectrum availability, a novel interference-aware spectrum-sharing concept is introduced where networks that suffer from congested spectrums (secondary-networks) are allowed to share the spectrum with other networks with available spectrum (primary-networks) under the condition that limited interference occurs to primary networks. Objective: Multiple-antenna and adaptive rate can be utilized as a power-efficient technique for improving the data rate of the secondary link while satisfying the interference constraint of the primary link by allowing the secondary user to adapt its transmitting antenna, power, and rate according to the channel state information. Methods: Two adaptive schemes are proposed using multiple-antenna transmit diversity and adaptive modulation in order to increase the spectral-efficiency of the secondary link while maintaining minimum interference with the primary. Both the switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan-and-wait combining antenna technique (SWC) where there is a secondary transmission only when a branch with an acceptable performance is found; else the data is buffered. Results: In both these schemes the constellation size and selected transmit branch are determined to minimized the average number of switches and achieve the highest spectral efficiency given a minimum bit-error-rate (BER), fading conditions, and peak interference constraint. For delayed sensitive applications, two schemes using power control are used: SES-PC and BES-PC. In these schemes the secondary transmitter sends data using a nominal power level, which is optimized to minimize the average delay. Several numerical examples show

  11. The disciplining of illegal palm oil plantations in Sumatra

    NARCIS (Netherlands)

    Pramudya, Eusebius Pantja; Hospes, Otto; Termeer, C.J.A.M.

    2018-01-01

    The Indonesian state has issued many regulations to control palm oil expansion, but they have been weakly enforced, resulting in widespread illegal plantations. During the last decade, Indonesian authorities have used force to reduce illegal plantations. This article analyses the drivers behind

  12. Injury Patterns Among Illegal Migrants from Africa in Israel.

    Science.gov (United States)

    Perlman, Amotz; Radomislensky, Irina; Peleg, Kobi

    2015-08-01

    In recent years Israel has become a destination for many migrants from Africa that illegally cross the Egyptian-Israeli border. The objective of this paper is to describe the epidemiological characteristics of injuries among illegal migrants in Israel. The study was carried out retrospectively using data from 19 trauma centers that participated in the Israel National Trauma Registry between 1 January 2006 and 31 December 2011. Illegal migrants from Africa were compared to the local population. Migrants were injured more often than the local population from intentional injuries (57.11 %). Migrants were also less likely than the local population (58.38 %) to sustain a minor injury (i.e., injury severity ≤8). The study also shows the hospitalization cost as a result of injuries among migrants from Africa. Preventive measures among illegal migrants from Africa should prioritize intentional injuries and industrial site injuries.

  13. The Sharing Economy

    OpenAIRE

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  14. The jabber chat tool EFDA Messenger and screen sharing tool EFDATV

    Energy Technology Data Exchange (ETDEWEB)

    Thomsen, K. [EFDA Close Support Unit Garching, Boltzmannstr. 2, D-85748 Garching (Germany)], E-mail: Knud.Thomsen@efda.org; Beck, S. [EFDA Close Support Unit Garching, Boltzmannstr. 2, D-85748 Garching (Germany); Wilhelm, B. [EFDA CSU Barcelona, c/Josep Pla n.2, Torres Diag. Litoral Edificio B3, 7a planta, 08019 Barcelona (Spain)

    2008-04-15

    Two Remote Participation (RP) tools are described. The first tool, named EFDA Messenger, is a secure Instant Messaging (IM) tool based on a Jabber server that only accepts SSL encrypted communication and does not allow file transfers as well as audio and video transmissions. This tool is useful to have as another mean of communication during video or teleconferences. The second tool, named EFDATV, is a multipurposeVirtual Network Computing (VNC) based desktop screen sharing system used to share presentations via the Internet. A Java enabled web browser or a VNC client is sufficient for the presenter and the audience to use EFDATV. It is also possible from an EFDATV channel to connect to another VNC server and broadcast the view from that VNC server.

  15. The jabber chat tool EFDA Messenger and screen sharing tool EFDATV

    International Nuclear Information System (INIS)

    Thomsen, K.; Beck, S.; Wilhelm, B.

    2008-01-01

    Two Remote Participation (RP) tools are described. The first tool, named EFDA Messenger, is a secure Instant Messaging (IM) tool based on a Jabber server that only accepts SSL encrypted communication and does not allow file transfers as well as audio and video transmissions. This tool is useful to have as another mean of communication during video or teleconferences. The second tool, named EFDATV, is a multipurposeVirtual Network Computing (VNC) based desktop screen sharing system used to share presentations via the Internet. A Java enabled web browser or a VNC client is sufficient for the presenter and the audience to use EFDATV. It is also possible from an EFDATV channel to connect to another VNC server and broadcast the view from that VNC server

  16. Derived virtual devices: a secure distributed file system mechanism

    Science.gov (United States)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  17. Risk, Benefit, and Moderators of the Affect Heuristic in a Widespread Unlawful Activity: Evidence from a Survey of Unlawful File-Sharing Behavior.

    Science.gov (United States)

    Watson, Steven J; Zizzo, Daniel J; Fleming, Piers

    2017-06-01

    Increasing the perception of legal risk via publicized litigation and lobbying for copyright law enforcement has had limited success in reducing unlawful content sharing by the public. We consider the extent to which engaging in file sharing online is motivated by the perceived benefits of this activity as opposed to perceived legal risks. Moreover, we explore moderators of the relationship between perceived risk and perceived benefits; namely, trust in industry and legal regulators, and perceived online anonymity. We examine these questions via a large two-part survey of consumers of music (n = 658) and eBooks (n = 737). We find that perceptions of benefit, but not of legal risk, predict stated file-sharing behavior. An affect heuristic is employed: as perceived benefit increases, perceived risk falls. This relationship is increased under high regulator and industry trust (which actually increases perceived risk in this study) and low anonymity (which also increases perceived risk). We propose that, given the limited impact of perceived legal risk upon unlawful downloading, it would be better for the media industries to target enhancing the perceived benefit and availability of lawful alternatives. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  18. Illegal deforestation in Zambia

    OpenAIRE

    Travis, A.J.

    2005-01-01

    Dr. Dale Lewis, a co-PI on the grant and the originator of the COMACO model, points out recent illegal deforestation in one of Zambia's National Forests to Dr. Alfonso Torres, another co-PI on the grant (from Cornell). LTRA-2 (An Agricultural Markets Model for Biodiversity Conservation)

  19. Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network

    Directory of Open Access Journals (Sweden)

    Zhen Hong

    2017-11-01

    Full Text Available Device-to-device (D2D communication is becoming an increasingly important technology in future networks with the climbing demand for local services. For instance, resource sharing in the D2D network features ubiquitous availability, flexibility, low latency and low cost. However, these features also bring along challenges when building a satisfactory resource sharing system in the D2D network. Specifically, user mobility is one of the top concerns for designing a cooperative D2D computational resource sharing system since mutual communication may not be stably available due to user mobility. A previous endeavour has demonstrated and proven how connectivity can be incorporated into cooperative task scheduling among users in the D2D network to effectively lower average task execution time. There are doubts about whether this type of task scheduling scheme, though effective, presents fairness among users. In other words, it can be unfair for users who contribute many computational resources while receiving little when in need. In this paper, we propose a novel blockchain-based credit system that can be incorporated into the connectivity-aware task scheduling scheme to enforce fairness among users in the D2D network. Users’ computational task cooperation will be recorded on the public blockchain ledger in the system as transactions, and each user’s credit balance can be easily accessible from the ledger. A supernode at the base station is responsible for scheduling cooperative computational tasks based on user mobility and user credit balance. We investigated the performance of the credit system, and simulation results showed that with a minor sacrifice of average task execution time, the level of fairness can obtain a major enhancement.

  20. Interpreting the empirical evidence on illegal gun market dynamics.

    Science.gov (United States)

    Braga, Anthony A; Wintemute, Garen J; Pierce, Glenn L; Cook, Philip J; Ridgeway, Greg

    2012-10-01

    Thousands of Americans are killed by gunfire each year, and hundreds of thousands more are injured or threatened with guns in robberies and assaults. The burden of gun violence in urban areas is particularly high. Critics suggest that the results of firearm trace data and gun trafficking investigation studies cannot be used to understand the illegal supply of guns to criminals and, therefore, that regulatory and enforcement efforts designed to disrupt illegal firearms markets are futile in addressing criminal access to firearms. In this paper, we present new data to address three key arguments used by skeptics to undermine research on illegal gun market dynamics. We find that criminals rely upon a diverse set of illegal diversion pathways to acquire guns, gun traffickers usually divert small numbers of guns, newer guns are diverted through close-to-retail diversions from legal firearms commerce, and that a diverse set of gun trafficking indicators are needed to identify and shut down gun trafficking pathways.

  1. User Identification Framework in Social Network Services Environment

    Directory of Open Access Journals (Sweden)

    Brijesh BAKARIYA

    2014-01-01

    Full Text Available Social Network Service is a one of the service where people may communicate with one an-other; and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a type of network. Such type of web application plays a dominant role in internet technology. In such type of online community, people may share their common interest. Facebook LinkedIn, orkut and many more are the Social Network Service and it is good medium of making link with people having unique or common interest and goals. But the problem of privacy protection is a big issue in today’s world. As social networking sites allows anonymous users to share information of other stuffs. Due to which cybercrime is also increasing to a rapid extent. In this article we preprocessed the web log data of Social Network Services and assemble that data on the basis of image file format like jpg, jpeg, gif, png, bmp etc. and also propose a framework for victim’s identification.

  2. A distributed authentication and authorization scheme for in-network big data sharing

    Directory of Open Access Journals (Sweden)

    Ruidong Li

    2017-11-01

    Full Text Available Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC to propose a Distributed Authentication and Authorization Scheme (DAAS, where an identity-based signature (IBS is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribute-based encryption (CP-ABE is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the interest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.

  3. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  4. Scaling laws for file dissemination in P2P networks with random contacts

    NARCIS (Netherlands)

    Nunez-Queija, R.; Prabhu, B.

    2008-01-01

    In this paper we obtain the scaling law for the mean broadcast time of a file in a P2P network with an initial population of N nodes. In the model, at Poisson rate λ a node initiates a contact with another node chosen uniformly at random. This contact is said to be successful if the contacted node

  5. Scaling laws for file dissemination in P2P networks with random contacts

    NARCIS (Netherlands)

    Núñez-Queija, R.; Prabhu, B.

    2008-01-01

    In this paper we obtain the scaling law for the mean broadcast time of a file in a P2P network with an initial population of N nodes. In the model, at Poisson rate lambda a node initiates a contact with another node chosen uniformly at random. This contact is said to be successful if the contacted

  6. Data Sharing Interviews with Crop Sciences Faculty: Why They Share Data and How the Library Can Help

    Science.gov (United States)

    Williams, Sarah C.

    2013-01-01

    This study was designed to generate a deeper understanding of data sharing by targeting faculty members who had already made data publicly available. During interviews, crop scientists at the University of Illinois at Urbana-Champaign were asked why they decided to share data, why they chose a data sharing method (e. g., supplementary file,…

  7. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  8. An Agent-mediated Approach to Promote Knowledge Sharing Through Enterprise Social Networks

    NARCIS (Netherlands)

    Van Splunter, S.; Sedighi, M.

    2013-01-01

    Broadening adoption of social network tools within the enterprise suggests a new and valuable source for insight into the social structure through organizations. While online social media tools are being evolved by enterprises in recent years, the social media are used much for knowledge sharing.

  9. Digital music and subculture: Sharing files, sharing styles

    OpenAIRE

    Ebare, Sean

    2004-01-01

    In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around issues of anonymity and trust, identity experimentation, and online communication...

  10. Twitter-Based Detection of Illegal Online Sale of Prescription Opioid.

    Science.gov (United States)

    Mackey, Tim K; Kalyanam, Janani; Katsuki, Takeo; Lanckriet, Gert

    2017-12-01

    To deploy a methodology accurately identifying tweets marketing the illegal online sale of controlled substances. We first collected tweets from the Twitter public application program interface stream filtered for prescription opioid keywords. We then used unsupervised machine learning (specifically, topic modeling) to identify topics associated with illegal online marketing and sales. Finally, we conducted Web forensic analyses to characterize different types of online vendors. We analyzed 619 937 tweets containing the keywords codeine, Percocet, fentanyl, Vicodin, Oxycontin, oxycodone, and hydrocodone over a 5-month period from June to November 2015. A total of 1778 tweets (marketing the sale of controlled substances online; 90% had imbedded hyperlinks, but only 46 were "live" at the time of the evaluation. Seven distinct URLs linked to Web sites marketing or illegally selling controlled substances online. Our methodology can identify illegal online sale of prescription opioids from large volumes of tweets. Our results indicate that controlled substances are trafficked online via different strategies and vendors. Public Health Implications. Our methodology can be used to identify illegal online sellers in criminal violation of the Ryan Haight Online Pharmacy Consumer Protection Act.

  11. Critical Factors to Achieve Dockless Bike-Sharing Sustainability in China: A Stakeholder-Oriented Network Perspective

    Directory of Open Access Journals (Sweden)

    Jian-gang Shi

    2018-06-01

    Full Text Available In China, dockless bike-sharing programs (DBSPs play a significant role in promoting the goals of sustainable urban travel and carbon emissions reduction. However, the sustainability of DBSPs is increasingly being challenged as various issues associated with different stakeholders emerge. While numerous studies have focused on the barriers to traditional bike-sharing programs, the sustainability performance of new-generation DBSPs is largely overlooked. It is accordingly imperative to understand the primary challenges that impede the sustainability of DBSPs and to consider what stimulative measures can be taken. In this study, we investigate the factors that are critical to DBSPs’ sustainability from a network perspective. Stakeholder-associated factors and their interrelations were identified via literature analysis and interviews, and the social network analysis (SNA method was employed to recognize the critical factors and links in DBSPs. As a result, 10 critical factors and 10 major interactions were identified and further classified into six challenges. Sharing transport schemes, legislative perfection, public private partnership (PPP, and product lifecycle management (PLM were proposed to govern these challenges. This paper contributes to the existing body of knowledge of bike-sharing programs via a network approach that integrates the key influencing factors with those factors’ associated stakeholders. Furthermore, these findings provide the government and operators with implications for mitigating the tough challenges and facilitating the sustainability of DBSPs.

  12. Data Publishing and Sharing Via the THREDDS Data Repository

    Science.gov (United States)

    Wilson, A.; Caron, J.; Davis, E.; Baltzer, T.

    2007-12-01

    The terms "Team Science" and "Networked Science" have been coined to describe a virtual organization of researchers tied via some intellectual challenge, but often located in different organizations and locations. A critical component to these endeavors is publishing and sharing of content, including scientific data. Imagine pointing your web browser to a web page that interactively lets you upload data and metadata to a repository residing on a remote server, which can then be accessed by others in a secure fasion via the web. While any content can be added to this repository, it is designed particularly for storing and sharing scientific data and metadata. Server support includes uploading of data files that can subsequently be subsetted, aggregrated, and served in NetCDF or other scientific data formats. Metadata can be associated with the data and interactively edited. The THREDDS Data Repository (TDR) is a server that provides client initiated, on demand, location transparent storage for data of any type that can then be served by the THREDDS Data Server (TDS). The TDR provides functionality to: * securely store and "own" data files and associated metadata * upload files via HTTP and gridftp * upload a collection of data as single file * modify and restructure repository contents * incorporate metadata provided by the user * generate additional metadata programmatically * edit individual metadata elements The TDR can exist separately from a TDS, serving content via HTTP. Also, it can work in conjunction with the TDS, which includes functionality to provide: * access to data in a variety of formats via -- OPeNDAP -- OGC Web Coverage Service (for gridded datasets) -- bulk HTTP file transfer * a NetCDF view of datasets in NetCDF, OPeNDAP, HDF-5, GRIB, and NEXRAD formats * serving of very large volume datasets, such as NEXRAD radar * aggregation into virtual datasets * subsetting via OPeNDAP and NetCDF Subsetting services This talk will discuss TDR

  13. Effect of illegal on-street parking on travel times in urban environment

    Energy Technology Data Exchange (ETDEWEB)

    Morillo Carbonell, C.; Magin Campos Cacheda, J.

    2016-07-01

    The aim of this paper is to evaluate the effect of the on-street illegal parking on the commercial travel time of the vehicles in the area. The effect of the illegal parking in the travel time of the vehicles in the zone is analyzed in an urban scenario in order to quantify the negative impact that illegal parking implies to this, by itself, congested areas. To achieve the objective of the paper, a 3x3 street model has been designed and evaluated for different situations. In this sense, based on a traffic microsimulation model a bunch of scenarios have been considered in function of parameters referred to intensity of vehicles, illegal on street parking level and location of the illegals. Based on the scenarios mentioned, it has been analyzed the effect that the different parameters have on the commercial speed of the vehicles in order to have a first set of information that permits how to act to reduce the effect of illegal on street parking. The results obtained in this article will be able to be used in next steps in order to define direct and indirect reduction strategies referred to illegal on street parking effect. (Author)

  14. Virtual File System Mounting amp Searching With Network JVM For LAN

    OpenAIRE

    Nikita Kamble; Vaishnavi Patil; Shweta Desai; Dhanashri Kasar; Mrunali Patil

    2015-01-01

    Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and...

  15. Investment and Usage of New Technologies : Evidence from a Shared ATM Network

    NARCIS (Netherlands)

    Ferrari, S.; Verboven, F.L.; Degryse, H.A.

    2007-01-01

    When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment

  16. Investment and Usage of New Technologies : Evidence from a Shared ATM Network

    NARCIS (Netherlands)

    Ferrari, S.; Verboven, F.L.; Degryse, H.A.

    2008-01-01

    When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment

  17. Toward a new understanding of the links between poverty and illegal wildlife hunting.

    Science.gov (United States)

    Duffy, Rosaleen; St John, Freya A V; Büscher, Bram; Brockington, Dan

    2016-02-01

    Conservation organizations have increasingly raised concerns about escalating rates of illegal hunting and trade in wildlife. Previous studies have concluded that people hunt illegally because they are financially poor or lack alternative livelihood strategies. However, there has been little attempt to develop a richer understanding of the motivations behind contemporary illegal wildlife hunting. As a first step, we reviewed the academic and policy literatures on poaching and illegal wildlife use and considered the meanings of poverty and the relative importance of structure and individual agency. We placed motivations for illegal wildlife hunting within the context of the complex history of how wildlife laws were initially designed and enforced to indicate how hunting practices by specific communities were criminalized. We also considered the nature of poverty and the reasons for economic deprivation in particular communities to indicate how particular understandings of poverty as material deprivation ultimately shape approaches to illegal wildlife hunting. We found there is a need for a much better understanding of what poverty is and what motivates people to hunt illegally. © 2015 Society for Conservation Biology.

  18. XML Files

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  19. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  20. Creation and demolition of illegal structures in Nigerian cities ...

    African Journals Online (AJOL)

    The paper examined the issue of demolition of illegal structures in Benin City. The study revealed that the poor economic condition of the country forced many landlords in the city to restructure and convert their houses into mixed uses in order to make a living. In the process many illegal structures sprang up as many ...

  1. Time Shared Optical Network (TSON): a novel metro architecture for flexible multi-granular services.

    Science.gov (United States)

    Zervas, Georgios S; Triay, Joan; Amaya, Norberto; Qin, Yixuan; Cervelló-Pastor, Cristina; Simeonidou, Dimitra

    2011-12-12

    This paper presents the Time Shared Optical Network (TSON) as metro mesh network architecture for guaranteed, statistically-multiplexed services. TSON proposes a flexible and tunable time-wavelength assignment along with one-way tree-based reservation and node architecture. It delivers guaranteed sub-wavelength and multi-granular network services without wavelength conversion, time-slice interchange and optical buffering. Simulation results demonstrate high network utilization, fast service delivery, and low end-to-end delay on a contention-free sub-wavelength optical transport network. In addition, implementation complexity in terms of Layer 2 aggregation, grooming and optical switching has been evaluated. © 2011 Optical Society of America

  2. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  3. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  4. 75 FR 23752 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-05-04

    ...Corp. Description: PacifiCorp submits Revised Network Integration Transmission Service Agreement dated... Network Integration Transmission Service Agreement et al. Filed Date: 04/26/2010. Accession Numbers... filing per 35.12: Initial Market Based Rates to be effective 6/1/2010. Filed Date: 04/27/2010. Accession...

  5. [The risk for illegal behaviour and corruption in the healthcare sector: what preventive measures can be taken?].

    Science.gov (United States)

    Rivoiro, Chiara

    2016-05-01

    In the healthcare sector risk factors for illegal behavior and corruption are peculiar and greater than in other social areas, as it plays a crucial role in the community's economical, political and cultural life. The healthcare services is a complex network that require interaction between may people, constant contacts with the industry, safety and adequate facilities that require regular maintenance, upgrade and replacement of medical technology, connection with local and regional policy makers. This provides the opportunity of being exposed to improper influence. However, illegal behaviors can be prevented: first of all supporting all professionals that everyday work to protect our health with ethics and expertise; then with all instruments that anti-corruption action plans, such as the one introduced in Italy in 2012, aim to identify and target those areas most at risk of corruption phenomena.

  6. Reducing the illegal sale of cigarettes to minors.

    Science.gov (United States)

    Altman, D G; Foster, V; Rasenick-Douss, L; Tye, J B

    1989-01-06

    This study reports on an effort to stop the illegal sale of cigarettes to minors. In Santa Clara County, Calif, 412 stores and 30 vending machines were visited by 18 minors aged 14 through 16 years with the intent to purchase cigarettes; they were successful at 74% of the stores and 100% of the vending machines. After an aggressive six-month campaign using communitywide media, direct merchant education, contact with the chief executive officers of chain stores and franchise operations owned by major companies, and grassroots work with community organizations, the percentage of stores with illegal over-the-counter sale of cigarettes to minors was reduced to 39%. Sales from vending machines were not reduced. While much remains to be accomplished in stopping the illegal sale of tobacco to minors, data from this study illustrate that a well-designed community and merchant education campaign can significantly reduce such sales.

  7. [Smuggling of illegal drugs by body suffers].

    Science.gov (United States)

    Aksnes, Tonje Amb; Jacobsen, Dag

    2004-07-01

    Body packers are persons who smuggle illegal drugs by swallowing condoms or plastic cylinders containing such substances. Body stuffers are drug dealers or drug abusers who swallow illegal drugs in an effort to conceal evidence during an arrest or in fear of being arrested. We report four cases and discuss management. Asymptomatic body packers may be managed conservatively with laxatives and water-soluble contrast medium. This method allows an accurate follow-up with abdominal radiography. If patients develop abdominal pain or signs and symptoms of intoxication, surgical intervention should be considered. Both types of patients should be monitored carefully.

  8. A performance analysis of advanced I/O architectures for PC-based network file servers

    Science.gov (United States)

    Huynh, K. D.; Khoshgoftaar, T. M.

    1994-12-01

    In the personal computing and workstation environments, more and more I/O adapters are becoming complete functional subsystems that are intelligent enough to handle I/O operations on their own without much intervention from the host processor. The IBM Subsystem Control Block (SCB) architecture has been defined to enhance the potential of these intelligent adapters by defining services and conventions that deliver command information and data to and from the adapters. In recent years, a new storage architecture, the Redundant Array of Independent Disks (RAID), has been quickly gaining acceptance in the world of computing. In this paper, we would like to discuss critical system design issues that are important to the performance of a network file server. We then present a performance analysis of the SCB architecture and disk array technology in typical network file server environments based on personal computers (PCs). One of the key issues investigated in this paper is whether a disk array can outperform a group of disks (of same type, same data capacity, and same cost) operating independently, not in parallel as in a disk array.

  9. Imperceptible Politics: Illegalized Migrants and Their Struggles for Work and Unionization

    Directory of Open Access Journals (Sweden)

    Holger Wilcke

    2018-03-01

    Full Text Available This article argues that illegalized migrants carry the potential for social change not only through their acts of resistance but also in their everyday practices. This is the case despite illegalized migrants being the most disenfranchised subjects produced by the European border regime. In line with Jacques Rancière (1999 these practices can be understood as ‘politics’. For Rancière, becoming a political subject requires visibility, while other scholars (Papadopoulos & Tsianos, 2007; Rygiel, 2011 stress that this is not necessarily the case. They argue that political subjectivity can also be achieved via invisible means; important in this discussion as invisibility is an essential strategy of illegalized migrants. The aim of this article is to resolve this binary and demonstrate, via empirical examples, that the two concepts of visibility and imperceptibility are often intertwined in the messy realities of everyday life. In the first case study, an intervention at the ver.di trade union conference in 2003, analysis reveals that illegalized migrants transformed society in their fight for union membership, but also that their visible campaigning simultaneously comprised strategies of imperceptibility. The second empirical section, which examines the employment stories of illegalized migrants, demonstrates that the everyday practices of illegal work can be understood as ‘imperceptible politics’. The discussion demonstrates that despite the exclusionary mechanisms of the existing social order, illegalized migrants are often able to find work. Thus, they routinely undermine the very foundations of the order that produces their exclusions. I argue that this disruption can be analyzed as migrants’ ‘imperceptible politics’, which in turn can be recognized as migrants’ transformative power.

  10. Hybrid shared/distributed parallelism for 3D characteristics transport solvers

    International Nuclear Information System (INIS)

    Dahmani, M.; Roy, R.

    2005-01-01

    In this paper, we will present a new hybrid parallel model for solving large-scale 3-dimensional neutron transport problems used in nuclear reactor simulations. Large heterogeneous reactor problems, like the ones that occurs when simulating Candu cores, have remained computationally intensive and impractical for routine applications on single-node or even vector computers. Based on the characteristics method, this new model is designed to solve the transport equation after distributing the calculation load on a network of shared memory multi-processors. The tracks are either generated on the fly at each characteristics sweep or stored in sequential files. The load balancing is taken into account by estimating the calculation load of tracks and by distributing batches of uniform load on each node of the network. Moreover, the communication overhead can be predicted after benchmarking the latency and bandwidth using appropriate network test suite. These models are useful for predicting the performance of the parallel applications and to analyze the scalability of the parallel systems. (authors)

  11. Researching illegal logging and deforestation

    NARCIS (Netherlands)

    Boekhout van Solinge, T.

    2014-01-01

    Tropical deforestation such as in the Amazon can be studied well from a green criminological perspective. Ethnographic research methods form a useful way to get insight into the dynamics and complexity of tropical deforestation, which often is illegal. This article gives an account of various

  12. THE PROBLEM OF ILLEGAL MIGRATION OF ETHNIC ROHINGYA IN SOUTHEAST ASIA

    OpenAIRE

    Сомкамнерд, Навапат

    2017-01-01

    The article is devoted to the problem of illegal migration of ethnic Rohingya in the region of South-East Asia, in some ASEAN countries, especially in Myanmar and Thailand. An overview focuses on the role of Thailand, Myanmar, Bangladesh and the role of international and regional organizations, especially the role of the UN and ASEAN in resolution of the problem of illegal migration of Rohingya. Particular emphasis is placed on activities of ASEAN and Thailand to tackle the problem of illegal...

  13. Combining sync&share functionality with filesystem-like access

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  14. Biodiversity data mining from Argus-eyed citizens: the first illegal introduction record of Lepomis macrochirus macrochirus Rafinesque, 1819 in Japan based on Twitter information.

    Science.gov (United States)

    Miyazaki, Yusuke; Teramura, Akinori; Senou, Hiroshi

    2016-01-01

    An apparent illegal introduction of Lepomis macrochirus macrochirus from Yokohama City, Kanagawa Prefecture, Japan, is reported based on a juvenile specimen and a photograph of two adults collected on 14 June 2015 and deposited in the Kangawa Prefectural Museum of Natural History. The specimens and photographs were initially reported on the internet-based social networking site, Twitter. Two specimens of Carassius auratus, including an aquarium form, were also reported at the same locality and date, suggesting that the illegal introductions originated from an aquarium release. Our report demonstrates an example of web data mining in the discipline of Citizen Science.

  15. 36 CFR 1280.20 - What is your policy on illegal drugs and alcohol?

    Science.gov (United States)

    2010-07-01

    ... illegal drugs and alcohol? 1280.20 Section 1280.20 Parks, Forests, and Public Property NATIONAL ARCHIVES... Conduct on NARA Property? Prohibited Activities § 1280.20 What is your policy on illegal drugs and alcohol... property while under the influence of illegal drugs or alcohol. Using alcoholic beverages on NARA property...

  16. Molecular tracing of confiscated pangolin scales for conservation and illegal trade monitoring in Southeast Asia

    Science.gov (United States)

    Zhang, Huarong; Miller, Mark P.; Yang, Feng; Chan, Hon Ki; Gaubert, Philippe; Ades, Gary; Fischer, Gunter A

    2015-01-01

    Despite being protected by both international and national regulations, pangolins are threatened by illegal trade. Here we report mitochondrial DNA identification and haplotype richness estimation, using 239 pangolin scale samples from two confiscations in Hong Kong. We found a total of 13 genetically distinct cytochrome c oxidase I (COI) haplotypes in two confiscations (13 and ten haplotypes respectively, with ten shared haplotypes between confiscations). These haplotypes clustered in two distinct clades with one clade representing the Sunda pangolin (Manisjavanica). The other clade did not match with any known Asian pangolin sequences, and likely represented a cryptic pangolin lineage in Asia. By fitting sample coverage and rarefaction/regression models to our sample data, we predicted that the total number of COI haplotypes in two confiscations were 14.86 and 11.06 respectively, suggesting that our sampling caught the majority of haplotypes and that we had adequately characterized each confiscation. We detected substantial sequence divergence among the seized scales, likely evidencing that the Sunda pangolins were harvested over wide geographical areas across Southeast Asia. Our study illustrates the value of applying DNA forensics for illegal wildlife trade monitoring.

  17. Molecular tracing of confiscated pangolin scales for conservation and illegal trade monitoring in Southeast Asia

    Directory of Open Access Journals (Sweden)

    Huarong Zhang

    2015-07-01

    Full Text Available Despite being protected by both international and national regulations, pangolins are threatened by illegal trade. Here we report mitochondrial DNA identification and haplotype richness estimation, using 239 pangolin scale samples from two confiscations in Hong Kong. We found a total of 13 genetically distinct cytochrome c oxidase I (COI haplotypes in two confiscations (13 and ten haplotypes respectively, with ten shared haplotypes between confiscations. These haplotypes clustered in two distinct clades with one clade representing the Sunda pangolin (Manisjavanica. The other clade did not match with any known Asian pangolin sequences, and likely represented a cryptic pangolin lineage in Asia. By fitting sample coverage and rarefaction/regression models to our sample data, we predicted that the total number of COI haplotypes in two confiscations were 14.86 and 11.06 respectively, suggesting that our sampling caught the majority of haplotypes and that we had adequately characterized each confiscation. We detected substantial sequence divergence among the seized scales, likely evidencing that the Sunda pangolins were harvested over wide geographical areas across Southeast Asia. Our study illustrates the value of applying DNA forensics for illegal wildlife trade monitoring.

  18. Illegal Passive Smoking at Work

    Directory of Open Access Journals (Sweden)

    François-Xavier Lesage

    2011-01-01

    Results. Ninety-five percent of a total group of 172 OP of Champagne county filled the postal questionnaire. More than 80% of OP's replies identified illegal PSW. The average prevalence of PSW exposure was 0.7% of the total working population. Environmental tobacco smoke (ETS levels were considered between low and medium for most passive smokers (71%. Main features exposure to ETS at work for non-smokers was associated with female gender (69.5%, age between 40 and 49 years (41.2% and belonging to tertiary sector (75.6%. Environmental tobacco smoke exposures at work was firstly in the office for 49.7% of the subjects and secondly in the restroom for 18% of them. Main medical symptoms encountered by non-smokers were respiratory tractus irritation (81.7%. Eighty-three percent of OPs indicated solution to eradicate PSW. Illegal PSW is really weaker than fifteen years ago. However, the findings support a real ban on smoking in the workplace in order to protect all workers.

  19. Parables and Politics: Clergy Attitudes toward Illegal Immigration in Alabama

    Science.gov (United States)

    Wickersham, Mary Eleanor

    2013-01-01

    The passage of a stringent immigration law in Alabama in 2011 makes relevant the juxtaposition of clergy and congregant attitudes and behaviors toward illegal immigrants as related to Biblical teachings that require charity to aliens. In order to examine the relationship between religious attitudes and illegal immigration, approximately 426…

  20. Infanticide and illegal infant abandonment in Malaysia.

    Science.gov (United States)

    Razali, Salmi; Kirkman, Maggie; Ahmad, S Hassan; Fisher, Jane

    2014-10-01

    Infant abandonment and infanticide are poorly understood in Malaysia. The information available in the public arena comes predominantly from anecdotal sources. The aim of this study was to describe the prevalence and characteristics of infanticide and illegal infant abandonment in Malaysia and to estimate annual rates for the most recent decade. Summaries of data about infanticide and illegal infant abandonment were gathered from police records; the annual number of live births was ascertained from the national registry. The estimated inferred infanticide rates for Malaysia were compared with the infanticide rates among countries of very high, high, medium, and low rankings on the Human Development, Gender Inequality, and Gini indices. From 1999 to 2011, 1,069 cases of illegal infant abandonment were recorded and 1,147 people were arrested as suspected perpetrators. The estimated inferred infanticide rate fluctuated between 4.82 and 9.11 per 100,000 live births, a moderate rate relative to the infanticide rates of other countries. There are substantial missing data, with details undocumented for about 78-87% of cases and suspected perpetrators. Of the documented cases, it appeared that more boys than girls were victims and that suspected perpetrators were predominantly Malays who were women, usually mothers of the victim; the possibility of arrest bias must be acknowledged. Economic and social inequality, particularly gender inequality, might contribute to the phenomena of infanticide and abandonment. Strategies to reduce rates of infanticide and illegal infant abandonment in Malaysia will require strengthening of the surveillance system and attention to the gender-based inequalities that underpin human development. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Illegal Migration and the Risks of Terrorism in the Republic of Ingushetia

    Directory of Open Access Journals (Sweden)

    Ахмед Курейшевич Чапанов

    2017-12-01

    Full Text Available In this article the authors analyze the extent and nature of illegal migration in modern Ingushetia. It noted the relationship of illegal migration and terrorism, proposed a strategy to combat this phenomenon. The authors analyzed the socio-political problems arising from uncontrolled migration flows into the country. In recent years, illegal migration in the Republic of Ingushetia has become a frequent phenomenon. Illegal migration is a real threat to regional and national security of the Russian Federation. The authors propose the concept that migration policy should be guided first and foremost the interests of national security, preservation of socio-political stability and the integrity of the territory of the Russian Federation. In this regard, it is crucial interaction of state and law enforcement agencies of all the countries involved: the outcome of, and transit of illegal migrants settling. The current socio-political conditions of life of the Ingush society, increased uncontrolled migration, national security require a tightening of migration policy.

  2. Analysis of methanol and its derivatives in illegally produced alcoholic beverages.

    Science.gov (United States)

    Arslan, M Mustafa; Zeren, Cem; Aydin, Zeki; Akcan, Ramazan; Dokuyucu, Recep; Keten, Alper; Cekin, Necmi

    2015-07-01

    Illegal alcohol production remains as a common issue worldwide. Methanol poisoning mostly occurs because of the methanol used in production of counterfeit alcohol instead of ethyl alcohol due to its low price or by drinking the liquids containing methyl alcohol. Pectolytic enzymes results in an increase of methanol levels in many fermentation products such as ciders or wines. Methanol poisonings are infrequently encountered in forensic medicine practice. However, sporadic cases due to methanol intoxication as well as epidemic cases have been reported. In this study, we aimed to identify existence of methanol and its metabolites in illegally produced alcoholic beverages used in Antakya region. Twelve legally produced alcohol samples and Fifty-six different illegally produced alcohol samples were collected from the markets and local producers. Existence of methanol, formic acid, methyl amine, methyl formate and trioxan were determined using GC-MS method in these samples. Fifty-six different illegal alcohol samples were analyzed in this study and methanol was detected in 39 (75%) of samples. Formic acid was detected in 3, formamide in 1, methyl amine in 6, methyl formate in 10 and trioxan in 2 samples. Overwhelming majority of illegal alcoholic beverages was detected to contain methanol. Interestingly this study also revealed the presence of trioxane, which has not previously reported among toxic agents in illegal alcohol samples. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  3. Spatiotemporal trends of illegal activities from ranger-collected data in a Ugandan national park.

    Science.gov (United States)

    Critchlow, R; Plumptre, A J; Driciru, M; Rwetsiba, A; Stokes, E J; Tumwesigye, C; Wanyama, F; Beale, C M

    2015-10-01

    Within protected areas, biodiversity loss is often a consequence of illegal resource use. Understanding the patterns and extent of illegal activities is therefore essential for effective law enforcement and prevention of biodiversity declines. We used extensive data, commonly collected by ranger patrols in many protected areas, and Bayesian hierarchical models to identify drivers, trends, and distribution of multiple illegal activities within the Queen Elizabeth Conservation Area (QECA), Uganda. Encroachment (e.g., by pastoralists with cattle) and poaching of noncommercial animals (e.g., snaring bushmeat) were the most prevalent illegal activities within the QECA. Illegal activities occurred in different areas of the QECA. Poaching of noncommercial animals was most widely distributed within the national park. Overall, ecological covariates, although significant, were not useful predictors for occurrence of illegal activities. Instead, the location of illegal activities in previous years was more important. There were significant increases in encroachment and noncommercial plant harvesting (nontimber products) during the study period (1999-2012). We also found significant spatiotemporal variation in the occurrence of all activities. Our results show the need to explicitly model ranger patrol effort to reduce biases from existing uncorrected or capture per unit effort analyses. Prioritization of ranger patrol strategies is needed to target illegal activities; these strategies are determined by protected area managers, and therefore changes at a site-level can be implemented quickly. These strategies should also be informed by the location of past occurrences of illegal activity: the most useful predictor of future events. However, because spatial and temporal changes in illegal activities occurred, regular patrols throughout the protected area, even in areas of low occurrence, are also required. © 2015 Society for Conservation Biology.

  4. Beware of Illegally Marketed Diabetes Treatments

    Science.gov (United States)

    ... Good To Be True? Then it's probably a scam. Watch out for these and similar red flags: " ... at illegal marketing of prescription drugs by fraudulent online pharmacies. Signs that may indicate an online pharmacy ...

  5. IBM Software Defined Storage and ownCloud Enterprise Editon - a perfect match for hyperscale Enterprise File Sync and Share

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    IBM Software Defined Storage, in particular the technology offering codenamed Elastic Storage (based on GPFS technology) has proven to be an ideal match for Enterprise File Sync and Share (EFSS) solutions that need highly scalable storage. The presentation will provide insight into the integration of Elastic Storage with the ownCloud Enterprise Edition (based on Open Source technology) software that showed impressive scalability and performance metrics during a proof-of-concept phase of an installation that is supposed to serve 300000 users when fully deployed.

  6. 24 CFR 982.304 - Illegal discrimination: PHA assistance to family.

    Science.gov (United States)

    2010-04-01

    ... assistance to family. 982.304 Section 982.304 Housing and Urban Development Regulations Relating to Housing... Leasing a Unit § 982.304 Illegal discrimination: PHA assistance to family. A family may claim that illegal... prevents the family from finding or leasing a suitable unit with assistance under the program. The PHA must...

  7. The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

    OpenAIRE

    S.Saravana Kumar; J.Lakshmi Priya; P.Hannah Jennifer; N.Jeff Monica; Fathima

    2013-01-01

    In this research paper presents an design model for file sharing system for ubiquitos mobile devices using both cloud and text computing. File s haring is one of the rationales for computer networks with increasing demand for file sharing ap plications and technologies in small and large enterprise networks and on the Internet. File transfer is an important process in any form of computing as we need to really share the data ac ross. ...

  8. New Rules Will Push Colleges to Rethink Tactics against Student Pirates

    Science.gov (United States)

    Lipka, Sara

    2009-01-01

    Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…

  9. Performance evaluation of a high-speed switched network for PACS

    Science.gov (United States)

    Zhang, Randy H.; Tao, Wenchao; Huang, Lu J.; Valentino, Daniel J.

    1998-07-01

    We have replaced our shared-media Ethernet and FDDI network with a multi-tiered, switched network using OC-12 (622 Mbps) ATM for the network backbone, OC3 (155 Mbps) connections to high-end servers and display workstations, and switched 100/10 Mbps Ethernet for workstations and desktop computers. The purpose of this research was to help PACS designers and implementers understand key performance factors in a high- speed switched network by characterizing and evaluating its image delivery performance, specifically, the performance of socket-based TCP (Transmission Control Protocol) and DICOM 3.0 communications. A test network within the UCLA Clinical RIS/PACS was constructed using Sun UltraSPARC-II machines with ATM, Fast Ethernet, and Ethernet network interfaces. To identify performance bottlenecks, we evaluated network throughput for memory to memory, memory to disk, disk to memory, and disk to disk transfers. To evaluate the effect of file size, tests involving disks were further divided using sizes of small (514 KB), medium (8 MB), and large (16 MB) files. The observed maximum throughput for various network configurations using the TCP protocol was 117 Mbps for memory to memory and 88 MBPS for memory to disk. For disk to memory, the peak throughput was 98 Mbps using small files, 114 Mbps using medium files, and 116 Mbps using large files. The peak throughput for disk to disk became 64 Mbps using small files and 96 Mbps using medium and large files. The peak throughput using the DICOM 3.0 protocol was substantially lower in all categories. The measured throughput varied significantly among the tests when TCP socket buffer was raised above the default value. The optimal buffer size was approximately 16 KB or the TCP protocol and around 256 KB for the DICOM protocol. The application message size also displayed distinctive effects on network throughput when the TCP socket buffer size was varied. The throughput results for Fast Ethernet and Ethernet were expectedly

  10. Corruption within the Illegal Wildlife Trade : A symbiotic and Antithetical Enterprise

    NARCIS (Netherlands)

    van Uhm, D.P.|info:eu-repo/dai/nl/380477025; Moreto, William D.

    2017-01-01

    This study focuses on the role of corruption in facilitating the illegal wildlife trade. This research attempts to contribute to the literature by disentangling the existence, influence and nested nature of corruption within the illegal wildlife trade based on ethnographic fieldwork conducted in

  11. Applying social network analysis to understand the knowledge sharing behaviour of practitioners in a clinical online discussion forum.

    Science.gov (United States)

    Stewart, Samuel Alan; Abidi, Syed Sibte Raza

    2012-12-04

    Knowledge Translation (KT) plays a vital role in the modern health care community, facilitating the incorporation of new evidence into practice. Web 2.0 tools provide a useful mechanism for establishing an online KT environment in which health practitioners share their practice-related knowledge and experiences with an online community of practice. We have implemented a Web 2.0 based KT environment--an online discussion forum--for pediatric pain practitioners across seven different hospitals in Thailand. The online discussion forum enabled the pediatric pain practitioners to share and translate their experiential knowledge to help improve the management of pediatric pain in hospitals. The goal of this research is to investigate the knowledge sharing dynamics of a community of practice through an online discussion forum. We evaluated the communication patterns of the community members using statistical and social network analysis methods in order to better understand how the online community engages to share experiential knowledge. Statistical analyses and visualizations provide a broad overview of the communication patterns within the discussion forum. Social network analysis provides the tools to delve deeper into the social network, identifying the most active members of the community, reporting the overall health of the social network, isolating the potential core members of the social network, and exploring the inter-group relationships that exist across institutions and professions. The statistical analyses revealed a network dominated by a single institution and a single profession, and found a varied relationship between reading and posting content to the discussion forum. The social network analysis discovered a healthy network with strong communication patterns, while identifying which users are at the center of the community in terms of facilitating communication. The group-level analysis suggests that there is strong interprofessional and interregional

  12. Shared atypical default mode and salience network functional connectivity between autism and schizophrenia.

    Science.gov (United States)

    Chen, Heng; Uddin, Lucina Q; Duan, Xujun; Zheng, Junjie; Long, Zhiliang; Zhang, Youxue; Guo, Xiaonan; Zhang, Yan; Zhao, Jingping; Chen, Huafu

    2017-11-01

    Schizophrenia and autism spectrum disorder (ASD) are two prevalent neurodevelopmental disorders sharing some similar genetic basis and clinical features. The extent to which they share common neural substrates remains unclear. Resting-state fMRI data were collected from 35 drug-naïve adolescent participants with first-episode schizophrenia (15.6 ± 1.8 years old) and 31 healthy controls (15.4 ± 1.6 years old). Data from 22 participants with ASD (13.1 ± 3.1 years old) and 21 healthy controls (12.9 ± 2.9 years old) were downloaded from the Autism Brain Imaging Data Exchange. Resting-state functional networks were constructed using predefined regions of interest. Multivariate pattern analysis combined with multi-task regression feature selection methods were conducted in two datasets separately. Classification between individuals with disorders and controls was achieved with high accuracy (schizophrenia dataset: accuracy = 83%; ASD dataset: accuracy = 80%). Shared atypical brain connections contributing to classification were mostly present in the default mode network (DMN) and salience network (SN). These functional connections were further related to severity of social deficits in ASD (p = 0.002). Distinct atypical connections were also more related to the DMN and SN, but showed different atypical connectivity patterns between the two disorders. These results suggest some common neural mechanisms contributing to schizophrenia and ASD, and may aid in understanding the pathology of these two neurodevelopmental disorders. Autism Res 2017, 10: 1776-1786. © 2017 International Society for Autism Research, Wiley Periodicals, Inc. Autism spectrum disorder (ASD) and schizophrenia are two common neurodevelopmental disorders which share several genetic and behavioral features. The present study identified common neural mechanisms contributing to ASD and schizophrenia using resting-state functional MRI data. The results may help to understand

  13. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  14. Illegal Migration and Human Smuggling in Central and Eastern Europe

    Directory of Open Access Journals (Sweden)

    Peter Futo

    2005-06-01

    Full Text Available The analytical and statistical services of border management organizations in Central and Eastern European countries have registered and accumulated a vast body of knowledge on the demographics and mechanisms of illegal migration over the last one-and-a-half decade. This paper attempts to tap this resource by summarising the results of a yearly survey among border guards of 17 countries. A set of quantitative indicators of illegal migration is developed, presented and interpreted, based on the answers of the border services to a series of quantitative and qualitative questions. This empirical material is used to evaluate the dynamics and pattern of illegal migration in Central and Eastern Europe on the one hand, and to examine the development of border management strategies on the other. The impacts of legal and institutional reforms are investigated in light of the temporal and spatial variations of border apprehension statistics. The interdependence of the two processes is reviewed from the point of view of national border management authorities, perhaps the most authoritative source of information on the issue. The results of the authors’ annual survey indicate that the progressive development of migration control mechanisms at national and international levels seems to have a significant impact on irregular migration flows as most indicators of illegal migration have significantly decreased after the turn of the century. At the same time, the geographical distribution of illegal migration flows in Central and Eastern European countries has become more complex over the years.

  15. Data Use for School Improvement : Knowledge Sharing and Knowledge Brokerage in Network Structures

    NARCIS (Netherlands)

    Hubers, Mireille Desirée; Moolenaar, Nienke; Schildkamp, Kim; Handelzalts, Adam; Pieters, Julius Marie; Daly, A.J.; Daly, Alan J.

    2015-01-01

    Data teams are used in Dutch secondary education to support schools in data use for school improvement. Such teams are likely to be most effective when knowledge is shared between the data team members and brokered throughout the school. Social network structures may play an important role in this.

  16. The Mexican "Illegal Alien" Commute.

    Science.gov (United States)

    Decker, Phil

    1986-01-01

    A photo report of the following three treks by illegal aliens across the border from Mexico to work in Arizona reveals the dangers and disappointments the migrants are exposed to: (1) a "carpool" from Southern Mexico; (2) a train ride from Sinaloa; and (3) a 40-mile hike through the Arizona desert. (PS)

  17. Digital Libraries: The Next Generation in File System Technology.

    Science.gov (United States)

    Bowman, Mic; Camargo, Bill

    1998-01-01

    Examines file sharing within corporations that use wide-area, distributed file systems. Applications and user interactions strongly suggest that the addition of services typically associated with digital libraries (content-based file location, strongly typed objects, representation of complex relationships between documents, and extrinsic…

  18. Legal Drugs Are Good Drugs And Illegal Drugs Are Bad Drugs

    Directory of Open Access Journals (Sweden)

    Dina Indrati

    2011-07-01

    Full Text Available ABSTRACT : Labelling drugs are important issue nowadays in a modern society. Although it is generally believed that legal drugs are good drugs and illegal drugs are bad drugs, it is evident that some people do not aware about the side effects of drugs used. Therefore, a key contention of this philosophical essay is that explores harms minimisation policy, discuss whether legal drugs are good drugs and illegal drugs are bad drugs and explores relation of drugs misuse in a psychiatric nursing setting and dual diagnosis.Key words: Legal, good drugs, illegal, bad drugs.

  19. [Legal and illegal abortion in Switzerland].

    Science.gov (United States)

    Stamm, H

    1970-01-01

    Aspects of legal and illegal abortion in Switzerland are discussed. About 110,000 births, 25,000 therapeutic abortions (75% for psychiatric indications) and an estimated 50,000 illegal abortions occur annually in Switzerland. Although the mortality and morbidity of therapeutic aborti on are similar to those of normal births (1.4 per 1000 and 11%, respectively) the mortality and morbidity of criminal abortions are far greater (3 per 1000 and 73%, respectively). In the author's view, too strict an interpretatiok of Swiss abortion law (which permits abortion to avoid serious harm to the mother's health) does not take into account the severe and lasting emotional and psychological damage which may be caused by unwanted pregnancy, birth, and childraising. In the present social situation, the social and psychological support required by these women is not available; until it is, abortion is to be preferred.

  20. A Preliminary Theory of Dark Network Resilience

    Science.gov (United States)

    Bakker, Rene M.; Raab, Jorg; Milward, H. Brinton

    2012-01-01

    A crucial contemporary policy question for governments across the globe is how to cope with international crime and terrorist networks. Many such "dark" networks--that is, networks that operate covertly and illegally--display a remarkable level of resilience when faced with shocks and attacks. Based on an in-depth study of three cases…

  1. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  2. Narrating Illegal Logging Across the Globe

    DEFF Research Database (Denmark)

    Winkel, Georg; Leipold, Sina; Buhmann, Karin

    2017-01-01

    In the last decade illegal logging has triggered the attention of policy makers and scholars of international forest governance. The issue is multifaceted, involving aspects of social and environmental sustainability, development, trade, access to markets and competitiveness. A vivid academic deb...

  3. Researching Illegal Logging and Deforestation

    Directory of Open Access Journals (Sweden)

    Tim Boekhout van Solinge

    2014-08-01

    Full Text Available Tropical deforestation such as in the Amazon can be studied well from a green criminological perspective. Ethnographic research methods form a useful way to get insight into the dynamics and complexity of tropical deforestation, which often is illegal. This article gives an account of various ethnographic visits to the rainforests of the Amazon in the period 2003-2014. Ethnographic methods provide insight into the overlap between the legal and illegal, the functioning (or not of state institutions, the power of (corporate lobbies, and why tropical deforestation correlates with crimes such as corruption and violence. The use of ethnographic methods in forest areas where trustworthy state actors and institutions are not very present can also present danger and raise ethical issues (such as when the researcher, for reasons of safety, does not present as a criminological researcher. However, a large advantage of ethnographic visits to tropical rainforests is that they allow the gathering of local views and voices, which rarely reach the international level. These local views lead to interesting contradictions at the international level where corporate views and lobbies dominate.

  4. The feasibility study based on e-commerce instructions-focuses on detection and deletion of illegal content

    Science.gov (United States)

    Guo, Tianze; Bi, Siyu; Liu, Jiaming

    2018-04-01

    This essay legally restrains the illegal content based on the e-commerce directive and introduces that the European countries detect and notify illegal content through the instructions of competent authorities, notification of credible flaggers, user reports and technical tools. The illegal content should be deleted through the service terms and transparency report basing on prevent excessive deletions system. At the same time, use filters to detect and filter to against the recurrence of illegal content. By analyzing the advantages of China under the environment of cracking down on illegal content, this essay concludes that the success of China in cracking down on illegal content lies in all-round collaborative management model of countries, governments, enterprises and individuals. At the end of the essay, one is to build a training corpus that can automatically update the ability to identify the illegal content. And it proposes an optimization scheme that establish a complete set of address resolution procedures and classify IP address data according to big data analysis and DNS protection module to prevent hackers from spreading illegal content by tampering with DNS segments.

  5. Benefit of adaptive FEC in shared backup path protected elastic optical network.

    Science.gov (United States)

    Guo, Hong; Dai, Hua; Wang, Chao; Li, Yongcheng; Bose, Sanjay K; Shen, Gangxiang

    2015-07-27

    We apply an adaptive forward error correction (FEC) allocation strategy to an Elastic Optical Network (EON) operated with shared backup path protection (SBPP). To maximize the protected network capacity that can be carried, an Integer Linear Programing (ILP) model and a spectrum window plane (SWP)-based heuristic algorithm are developed. Simulation results show that the FEC coding overhead required by the adaptive FEC scheme is significantly lower than that needed by a fixed FEC allocation strategy resulting in higher network capacity for the adaptive strategy. The adaptive FEC allocation strategy can also significantly outperform the fixed FEC allocation strategy both in terms of the spare capacity redundancy and the average FEC coding overhead needed per optical channel. The proposed heuristic algorithm is efficient and not only performs closer to the ILP model but also does much better than the shortest-path algorithm.

  6. AIRBNB AND UBER: LEGAL PLATFORM BUT ILLEGAL NETWORKED BUSINESS

    Directory of Open Access Journals (Sweden)

    Saša Zupan Korže

    2018-05-01

    Full Text Available Airbnb’s and Uber's popularity and scope of their networked business has significantly grown in the last few years. Both companies are engaged in sectors, which are regulated. The purpose of this paper is to discuss the legal issues related to Airbnb networked hospitality business and to Uber's networked transport business, with focus on EU member states solutions and Slovenian approach. The research was carried out from July 2017 to March 2018. We used the method of content analysis of secondary sources, methods of compilation and comparisons, analyses of qualitative data, collected in semi-structures interviews and explanatory case studies. The results show that Airbnb and Uber have become victims of their own success. The hospitality and transport business that participants perform using Airbnb or Uber platform do not comply with sectorial regulation of majority of EU member states. European Commission suggested some guidelines to solve the issues related with networked businesses. Moreover, European Court of Justice pointed out the exact solution on Uber's case. The research opens a debate on legal issues related to new technology-based business models and questions the rationale that stand behind legal solutions.

  7. Combating Forest Corruption: the Forest Integrity Network

    NARCIS (Netherlands)

    Gupta, A.; Siebert, U.

    2004-01-01

    This article describes the strategies and activities of the Forest Integrity Network. One of the most important underlying causes of forest degradation is corruption and related illegal logging. The Forest Integrity Network is a timely new initiative to combat forest corruption. Its approach is to

  8. Official control of plant protection products in Poland: detection of illegal products.

    Science.gov (United States)

    Miszczyk, Marek; Płonka, Marlena; Stobiecki, Tomasz; Kronenbach-Dylong, Dorota; Waleczek, Kazimierz; Weber, Roland

    2018-04-03

    Market presence of illegal and counterfeit pesticides is now a global problem. According to data published in 2012 by the European Crop Protection Association (ECPA), illegal products represent over 10% of the global market of plant protection products. Financial benefits are the main reason for the prevalence of this practice. Counterfeit and illegal pesticides may contain substances that may pose a threat to the environment, crops, animals, and humans, inconsistent with the label and registration dossier. In Poland, action against illegal and counterfeit plant protection products is undertaken by the Main Inspectorate of Plant Health and Seed Inspection (PIORiN), the police, the prosecution, and the pesticide producers. Results of chemical analyses carried out by the Institute of Plant Protection - National Research Institute Sośnicowice Branch, Pesticide Quality Testing Laboratory (PQTL IPP-NRI Sosnicowice Branch) indicate that a majority of illegal pesticides in Poland are detected in the group of herbicides. Products from parallel trade tend to have the most irregularities. This article describes the official quality control system of plant protection products in Poland and presents the analytical methods for testing pesticides suspected of adulteration and recent test results.

  9. Shared molecular pathways and gene networks for cardiovascular disease and type 2 diabetes mellitus in women across diverse ethnicities.

    Science.gov (United States)

    Chan, Kei Hang K; Huang, Yen-Tsung; Meng, Qingying; Wu, Chunyuan; Reiner, Alexander; Sobel, Eric M; Tinker, Lesley; Lusis, Aldons J; Yang, Xia; Liu, Simin

    2014-12-01

    Although cardiovascular disease (CVD) and type 2 diabetes mellitus (T2D) share many common risk factors, potential molecular mechanisms that may also be shared for these 2 disorders remain unknown. Using an integrative pathway and network analysis, we performed genome-wide association studies in 8155 blacks, 3494 Hispanic American, and 3697 Caucasian American women who participated in the national Women's Health Initiative single-nucleotide polymorphism (SNP) Health Association Resource and the Genomics and Randomized Trials Network. Eight top pathways and gene networks related to cardiomyopathy, calcium signaling, axon guidance, cell adhesion, and extracellular matrix seemed to be commonly shared between CVD and T2D across all 3 ethnic groups. We also identified ethnicity-specific pathways, such as cell cycle (specific for Hispanic American and Caucasian American) and tight junction (CVD and combined CVD and T2D in Hispanic American). In network analysis of gene-gene or protein-protein interactions, we identified key drivers that included COL1A1, COL3A1, and ELN in the shared pathways for both CVD and T2D. These key driver genes were cross-validated in multiple mouse models of diabetes mellitus and atherosclerosis. Our integrative analysis of American women of 3 ethnicities identified multiple shared biological pathways and key regulatory genes for the development of CVD and T2D. These prospective findings also support the notion that ethnicity-specific susceptibility genes and process are involved in the pathogenesis of CVD and T2D. © 2014 American Heart Association, Inc.

  10. Outdoor Illegal Construction Identification Algorithm Based on 3D Point Cloud Segmentation

    Science.gov (United States)

    An, Lu; Guo, Baolong

    2018-03-01

    Recently, various illegal constructions occur significantly in our surroundings, which seriously restrict the orderly development of urban modernization. The 3D point cloud data technology is used to identify the illegal buildings, which could address the problem above effectively. This paper proposes an outdoor illegal construction identification algorithm based on 3D point cloud segmentation. Initially, in order to save memory space and reduce processing time, a lossless point cloud compression method based on minimum spanning tree is proposed. Then, a ground point removing method based on the multi-scale filtering is introduced to increase accuracy. Finally, building clusters on the ground can be obtained using a region growing method, as a result, the illegal construction can be marked. The effectiveness of the proposed algorithm is verified using a publicly data set collected from the International Society for Photogrammetry and Remote Sensing (ISPRS).

  11. Quantifying the Effect of Macroeconomic and Social Factors on Illegal E-Waste Trade.

    Science.gov (United States)

    Efthymiou, Loukia; Mavragani, Amaryllis; Tsagarakis, Konstantinos P

    2016-08-05

    As illegal e-waste trade has been significantly growing over the course of the last few years, the consequences on human health and the environment demand immediate action on the part of the global community. Though it is argued that e-waste flows from developed to developing countries, this subject seems to be more complex than that, with a variety of studies suggesting that income per capita is not the only factor affecting the choice of regions that e-waste is illegally shipped to. How is a country's economic and social development associated with illegal e-waste trade? Is legislation an important factor? This paper aims at quantifying macroeconomic (per capita income and openness of economy) and social (human development and social progress) aspects, based on qualitative data on illegal e-waste trade routes, by examining the percentage differences in scorings in selected indicators for all known and suspected routes. The results show that illegal e-waste trade occurs from economically and socially developed regions to countries with significantly lower levels of overall development, with few exceptions, which could be attributed to the fact that several countries have loose regulations on e-waste trade, thus deeming them attractive for potential illegal activities.

  12. 75 FR 29750 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-05-27

    ...: Consumers Energy Company submits tariff filing per 35: Wholesale Market-Based Rate Tariff For Sales Of.... Description: Southern Companies submits an amendment to the Network Integration Transmission Service Agreement...: Southern Companies submits an amendment to the Network Integration Transmission Service Agreement. Filed...

  13. Nicotine dependence, use of illegal drugs and psychiatric morbidity.

    Science.gov (United States)

    Martínez-Ortega, José María; Jurado, Dolores; Martínez-González, Miguel Angel; Gurpegui, Manuel

    2006-09-01

    The purpose of this study was to examine the association of smoking and nicotine dependence with psychiatric morbidity, controlling for the potential confounding effect of smoking on the relationship between the use of other substances and psychiatric morbidity. A sample of 290 adults were interviewed at a primary health centre (patients, 58%; patients' relatives, 34%; staff, 8%) to inquire about their tobacco, caffeine, alcohol, and illegal drug consumption. Psychiatric morbidity, defined by a score >6 on the General Health Questionnaire (GHQ-28), showed a strong direct association with nicotine dependence. The use of illegal drugs, but not of alcohol, was also strongly associated with psychiatric morbidity, after controlling for smoking. Both smoking and high nicotine dependence were also associated with use of caffeine, alcohol, cannabis and cocaine. High nicotine dependence may be considered as an expression of individual psychopathologic vulnerability. Tobacco may have a central facilitating role in the use of caffeine, alcohol, and illegal drug.

  14. A decade of illegal fishing in Table Mountain National Park (2000 ...

    African Journals Online (AJOL)

    Illegal fishing activities are reported to be on the increase in South Africa, including in its marine protected areas (MPAs). Research is presented on the nature and the scale of illegal fishing in Table Mountain National Park (TMNP) by analysing the numbers of abalone Haliotis midae and West Coast rock lobster Jasus ...

  15. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  16. Cytoscape file of chemical networks

    Data.gov (United States)

    U.S. Environmental Protection Agency — The maximum connectivity scores of pairwise chemical conditions summarized from Cmap results in a file with Cytoscape format (http://www.cytoscape.org/). The figures...

  17. Global governance approaches to addressing illegal logging: uptake and lessons learnt

    Science.gov (United States)

    B. Cashore; K. McGinley; S. Leipold; P.O. Cerutti; G. Bueno; S. et al. Carodenuto

    2016-01-01

    This report presents the results of the fifth global scientific assessment undertaken by the GFEP initiative. The report set out to gain deeper understanding of the meaning of illegal logging and related timber trade, its scale, drivers and consequences. It provides a structured synthesis of available scientific and expert knowledge on illegal logging and associated...

  18. Illegal drug use and its correlates in San Juan, Puerto Rico.

    Science.gov (United States)

    Caetano, Raul; Vaeth, Patrice A C; Canino, Glorisa

    2018-04-01

    Data on the prevalence and correlates of illegal drug use in Puerto Rico are now almost 20 years old. This study sought to estimate the 12-month prevalence of illegal and non-prescribed medical drug use in San Juan, Puerto Rico and identify sociodemographic correlates of use. Data are from a random household sample of 1510 individuals, 18-64 years of age in San Juan, Puerto Rico. The 12-month prevalence of any illegal or non-prescribed drug use was 16.5%. Prevalence among men (20.7%) was higher than among women (12.9%; chi 2  = 16.308; df = 1; p  .05) were negatively associated with drug use compared to annual income up to $10,000. As in many other places in the U.S., drug use in San Juan, Puerto Rico is high, affecting about 1 in 6 adults in the population. The highest prevalence is for marijuana use, which cannot be medically prescribed and of which recreational use is illegal on the island. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. LOCAL GOVERNMENT ROLE IN THE SOLVING OF CATCHING FISH ILLEGALLY IN ACEH REGION

    Directory of Open Access Journals (Sweden)

    Adwani

    2016-01-01

    Full Text Available This study aimed to describe the shape of local government actions in tackling illegal fishing in Aceh, the handling of illegal fishing destructive fishery resources. The fundamental point is Law No. 45 Year 2009 concerning fisheries. This spesification of this research descriptive analysis, used both normative juridical approach and empirical. The results showed that the local government has made an effort preventive and repressive in the case of illegal fishing. To coordinate with relevant agencies and empower the role of traditional institutions of the sea to assist the role of government and law enforcement.Local governments should improve the coordination and supervision of the marine area, to monitor and evaluate the performance of local authorities in applying the law against this illegal fishing case.

  20. The global unified parallel file system (GUPFS) project: FY 2002 activities and results

    Energy Technology Data Exchange (ETDEWEB)

    Butler, Gregory F.; Lee, Rei Chi; Welcome, Michael L.

    2003-04-07

    The Global Unified Parallel File System (GUPFS) project is a multiple-phase, five-year project at the National Energy Research Scientific Computing (NERSC) Center to provide a scalable, high performance, high bandwidth, shared file system for all the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make it easier to conduct advanced scientific research using the NERSC systems. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is directly accessed by all the NERSC production computing and support systems. During its first year, FY 2002, the GUPFS project focused on identifying, testing, and evaluating existing and emerging shared/cluster file system, SAN fabric, and storage technologies; identifying NERSC user input/output (I/O) requirements, methods, and mechanisms; and developing appropriate benchmarking methodologies and benchmark codes for a parallel environment. This report presents the activities and progress of the GUPFS project during its first year, the results of the evaluations conducted, and plans for near-term and longer-term investigations.

  1. Efficient disk-to-disk copy through long-distance high-speed networks with background traffic

    International Nuclear Information System (INIS)

    Tanida, Naoki; Hiraki, Kei; Inaba, Mary

    2010-01-01

    We propose 'ICDC - InterContinental Disk Copy', a data sharing facility between distant places. ICDC aims to transfer huge amount of data files easily on Long Fat-pipe Networks with some background traffic. ICDC consists of commodity PCs and Solid State Drives and we apply Inter Packet Gap tuning technique to it. Using 'ICDC-1 Gbps model', we transferred data between Tokyo and Cadarache via New York. We attained about 860 Mbps, i.e., 86% usage of the network bottleneck bandwidth.

  2. Modelling of P2P-Based Video Sharing Performance for Content-Oriented Community-Based VoD Systems in Wireless Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shijie Jia

    2016-01-01

    Full Text Available The video sharing performance is a key factor for scalability and quality of service of P2P VoD systems in wireless mobile networks. There are some impact factors for the video sharing performance, such as available upload bandwidth, resource distribution in overlay networks, and mobility of mobile nodes. In this paper, we firstly model user behaviors: joining, playback, and departure for the content-oriented community-based VoD systems in wireless mobile networks and construct a resource assignment model by the analysis of transition of node state: suspend, wait, and playback. We analyze the influence of the above three factors: upload bandwidth, startup delay, and resource distribution for the sharing performance and QoS of systems. We further propose the improved resource sharing strategies from the perspectives of community architecture, resource distribution, and data transmission for the systems. Extensive tests show how the improved strategies achieve much better performance results in comparison with original strategies.

  3. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  4. Welfare impacts of the illegal wildlife trade in a cohort of confiscated greater slow lorises, Nycticebus coucang.

    Science.gov (United States)

    Fuller, Grace; Eggen, Wilhelmina Frederica; Wirdateti, Wirdateti; Nekaris, K A I

    2018-01-01

    Illegal harvesting and trade are major forces behind population declines of wild slow lorises (genus Nycticebus). The impacts of the wildlife trade on individual slow lorises have not been as well described. In this article, we describe quantitatively the consequences of the wildlife trade for 77 greater slow lorises, N. coucang, who were confiscated en masse and brought to Cikananga Wildlife Center in Indonesia. Medical records indicated that in total, 28.6% of the slow lorises died within the first 6 months, mostly due to traumatic injury, and all the infants died. The greatest sources of morbidity were external wounds (33.1% of 166 total medical events) and dental problems (19.3%). Of the surviving individuals, 25.4% displayed abnormal behavior. Behavioral observations indicated that healthy adults (n = 3) spent 48.2% of their active period performing stereotypies. These data illustrate the physical and behavioral impacts of the illegal wildlife trade on the welfare of slow lorises. We suggest that sharing these individual stories may help generate empathy and educate the public about the impacts of the exotic companion-animal (pet) trade on nonhuman animal welfare.

  5. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    KAUST Repository

    Khafagy, Mohammad Galal; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2015-01-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  6. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-06-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  7. The Illegal Immigration Reform and Immigrant Responsibility Act of 1996: an overview.

    Science.gov (United States)

    Fragomen, A T

    1997-01-01

    "On September 30, 1996, President Clinton signed the Illegal Immigration Reform and Immigrant Responsibility Act of 1996 (1996 Act), Pub. L. No. 104-208, 110 Stat. 3009. After an intense lobbying effort by the business community, most provisions relating to legal immigration were omitted from the final bill. Instead, the 1996 Act focuses on illegal immigration reform and includes some of the toughest measures ever taken against illegal immigration." Aspects considered include border enforcement, penalities against alien smuggling and document fraud, deportation and exclusion proceedings, employer sanctions, welfare provisions, and changes to existing refugee and asylum procedures. excerpt

  8. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    OpenAIRE

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-01-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US?Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3%...

  9. More than a Master: Developing, Sharing, and Using Knowledge in School-University Research Networks

    Science.gov (United States)

    Cornelissen, Frank; Daly, Alan J.; Liou, Yi-Hwa; van Swet, Jacqueline; Beijaard, Douwe; Bergen, Theo C. M.

    2014-01-01

    Postgraduate master's programs for in-service teachers may be a promising new avenue in developing research partnership networks that link schools and university and enable collaborative development, sharing and use of knowledge of teacher research. This study explores the way these knowledge processes originating from master's students' research…

  10. Sharing data for public health research by members of an international online diabetes social network.

    Directory of Open Access Journals (Sweden)

    Elissa R Weitzman

    2011-04-01

    Full Text Available Surveillance and response to diabetes may be accelerated through engaging online diabetes social networks (SNs in consented research. We tested the willingness of an online diabetes community to share data for public health research by providing members with a privacy-preserving social networking software application for rapid temporal-geographic surveillance of glycemic control.SN-mediated collection of cross-sectional, member-reported data from an international online diabetes SN entered into a software application we made available in a "Facebook-like" environment to enable reporting, charting and optional sharing of recent hemoglobin A1c values through a geographic display. Self-enrollment by 17% (n = 1,136 of n = 6,500 active members representing 32 countries and 50 US states. Data were current with 83.1% of most recent A1c values reported obtained within the past 90 days. Sharing was high with 81.4% of users permitting data donation to the community display. 34.1% of users also displayed their A1cs on their SN profile page. Users selecting the most permissive sharing options had a lower average A1c (6.8% than users not sharing with the community (7.1%, p = .038. 95% of users permitted re-contact. Unadjusted aggregate A1c reported by US users closely resembled aggregate 2007-2008 NHANES estimates (respectively, 6.9% and 6.9%, p = 0.85.Success within an early adopter community demonstrates that online SNs may comprise efficient platforms for bidirectional communication with and data acquisition from disease populations. Advancing this model for cohort and translational science and for use as a complementary surveillance approach will require understanding of inherent selection and publication (sharing biases in the data and a technology model that supports autonomy, anonymity and privacy.

  11. Sharing data for public health research by members of an international online diabetes social network.

    Science.gov (United States)

    Weitzman, Elissa R; Adida, Ben; Kelemen, Skyler; Mandl, Kenneth D

    2011-04-27

    Surveillance and response to diabetes may be accelerated through engaging online diabetes social networks (SNs) in consented research. We tested the willingness of an online diabetes community to share data for public health research by providing members with a privacy-preserving social networking software application for rapid temporal-geographic surveillance of glycemic control. SN-mediated collection of cross-sectional, member-reported data from an international online diabetes SN entered into a software application we made available in a "Facebook-like" environment to enable reporting, charting and optional sharing of recent hemoglobin A1c values through a geographic display. Self-enrollment by 17% (n = 1,136) of n = 6,500 active members representing 32 countries and 50 US states. Data were current with 83.1% of most recent A1c values reported obtained within the past 90 days. Sharing was high with 81.4% of users permitting data donation to the community display. 34.1% of users also displayed their A1cs on their SN profile page. Users selecting the most permissive sharing options had a lower average A1c (6.8%) than users not sharing with the community (7.1%, p = .038). 95% of users permitted re-contact. Unadjusted aggregate A1c reported by US users closely resembled aggregate 2007-2008 NHANES estimates (respectively, 6.9% and 6.9%, p = 0.85). Success within an early adopter community demonstrates that online SNs may comprise efficient platforms for bidirectional communication with and data acquisition from disease populations. Advancing this model for cohort and translational science and for use as a complementary surveillance approach will require understanding of inherent selection and publication (sharing) biases in the data and a technology model that supports autonomy, anonymity and privacy.

  12. Testing knowledge sharing effectiveness: trust, motivation, leadership style, workplace spirituality and social network embedded model

    Directory of Open Access Journals (Sweden)

    Rahman Muhammad Sabbir

    2015-12-01

    Full Text Available The aim of this inquiry is to investigate the relationships among the antecedents of knowledge sharing effectiveness under the position of non-academic staff of higher learning institutions through an empirical test of a conceptual model consisting of trust, extrinsic and intrinsic motivation, leadership style, workplace spirituality and online social network. This study used the respondents from the non-academic staff of higher learning institutions in Malaysia (n = 200, utilizing a self-administered survey questionnaire. The structural equation modeling approach was used to test the proposed hypotheses. The outcomes indicate that all the antecedents play a substantial function in knowledge sharing effectiveness. In addition, perceived risk plays a mediating role between trust and knowledge sharing effectiveness. On the other hand, this research also proved the communication skill also plays a mediating role between leadership style and knowledge sharing effectiveness. This study contributes to pioneering empirical findings on knowledge sharing literature under the scope of the non-academic staff perspective.

  13. Which psychoactive prescription drugs are illegally obtained and through which ways of acquisition? About OPPIDUM survey.

    Science.gov (United States)

    Frauger, Elisabeth; Nordmann, Sandra; Orleans, Veronica; Pradel, Vincent; Pauly, Vanessa; Thirion, Xavier; Micallef, Joëlle

    2012-08-01

    The objective of the study was to determine which psychoactive prescription drugs are illegally obtained and through which ways of acquisition. OPPIDUM is an annual national study. It is based on specialized care centers that included subjects presenting a drug dependency or under opiate maintenance treatment. All their psychoactive substances consumed are reported. This work focuses on the different ways of acquisition specially the illegal ways of acquisition (bought on the street, forged prescription, stolen, given, internet). For each medication illegally obtained, a ratio has been calculated (number of illegal acquisitions divided by the number of described acquisitions). In 2008, 5542 subjects have been included and have described the consumption of 11 027 substances including 63.8% of prescription drugs. Among them, 11% were illegally obtained. The different illegal acquisition ways were 'street market' (77.6%), 'gift' (16.6%), 'theft' (2.3%), 'forged prescription' (2.3%), and 'internet' (0.7%). The third first drugs illegally obtained were high dosage buprenorphine, methadone, and clonazepam. Some prescription drugs, less consumed, have an important ratio of illegal acquisition like ketamine, flunitrazepam, morphine, trihexyphenidyl, or methylphenidate. This study confirms that theft, forged prescription and internet are few used and permits to highlight diversion of prescription drugs. It is important to inform healthcare professionals on the different prescription drugs that are illegally obtained. © 2011 The Authors Fundamental and Clinical Pharmacology © 2011 Société Française de Pharmacologie et de Thérapeutique.

  14. Clinical features and treatment prognosis of pathological gamblers with and without recent gambling-related illegal behavior.

    Science.gov (United States)

    Ledgerwood, David M; Weinstock, Jeremiah; Morasco, Benjamin J; Petry, Nancy M

    2007-01-01

    A substantial proportion of pathological gamblers engage in gambling-related illegal behavior. We examined differences in baseline characteristics and treatment outcomes in two groups: pathological gamblers who did and did not commit gambling-related illegal acts in the year before treatment. Participants were 231 pathological gamblers enrolled in a randomized study of treatment that included cognitive behavior therapy and referral to Gamblers Anonymous (GA). Participants reporting recent illegal behavior (n = 63) endorsed more severe lifetime and recent (past-year) gambling disorder symptoms and higher gambling-related debt than did gamblers who denied illegal behavior (n = 168). Those who reported illegal behavior also maintained a significantly higher severity of gambling disorder throughout treatment, although both groups experienced similar improvements in gambling symptoms over time. While pathological gamblers with or without gambling-related illegal behavior appeared to improve at a similar rate regardless of the treatment provided, more intensive treatment may be warranted for individuals with gambling-related illegal behavior, as they demonstrated greater gambling severity throughout treatment and follow-up.

  15. MR-AFS: a global hierarchical file-system

    International Nuclear Information System (INIS)

    Reuter, H.

    2000-01-01

    The next generation of fusion experiments will use object-oriented technology creating the need for world wide sharing of an underlying hierarchical file-system. The Andrew file system (AFS) is a well known and widely spread global distributed file-system. Multiple-resident-AFS (MR-AFS) combines the features of AFS with hierarchical storage management systems. Files in MR-AFS therefore may be migrated on secondary storage, such as roboted tape libraries. MR-AFS is in use at IPP for the current experiments and data originating from super-computer applications. Experiences and scalability issues are discussed

  16. Analyzing negative ties in social networks

    Directory of Open Access Journals (Sweden)

    Mankirat Kaur

    2016-03-01

    Full Text Available Online social networks are a source of sharing information and maintaining personal contacts with other people through social interactions and thus forming virtual communities online. Social networks are crowded with positive and negative relations. Positive relations are formed by support, endorsement and friendship and thus, create a network of well-connected users whereas negative relations are a result of opposition, distrust and avoidance creating disconnected networks. Due to increase in illegal activities such as masquerading, conspiring and creating fake profiles on online social networks, exploring and analyzing these negative activities becomes the need of hour. Usually negative ties are treated in same way as positive ties in many theories such as balance theory and blockmodeling analysis. But the standard concepts of social network analysis do not yield same results in respect of each tie. This paper presents a survey on analyzing negative ties in social networks through various types of network analysis techniques that are used for examining ties such as status, centrality and power measures. Due to the difference in characteristics of flow in positive and negative tie networks some of these measures are not applicable on negative ties. This paper also discusses new methods that have been developed specifically for analyzing negative ties such as negative degree, and h∗ measure along with the measures based on mixture of positive and negative ties. The different types of social network analysis approaches have been reviewed and compared to determine the best approach that can appropriately identify the negative ties in online networks. It has been analyzed that only few measures such as Degree and PN centrality are applicable for identifying outsiders in network. For applicability in online networks, the performance of PN measure needs to be verified and further, new measures should be developed based upon negative clique concept.

  17. Network survivability performance (computer diskette)

    Science.gov (United States)

    1993-11-01

    File characteristics: Data file; 1 file. Physical description: 1 computer diskette; 3 1/2 in.; high density; 2.0MB. System requirements: Mac; Word. This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunication networks to user expectations for network survivability.

  18. ISA-TAB-Nano: A Specification for Sharing Nanomaterial Research Data in Spreadsheet-based Format

    Science.gov (United States)

    2013-01-01

    Background and motivation The high-throughput genomics communities have been successfully using standardized spreadsheet-based formats to capture and share data within labs and among public repositories. The nanomedicine community has yet to adopt similar standards to share the diverse and multi-dimensional types of data (including metadata) pertaining to the description and characterization of nanomaterials. Owing to the lack of standardization in representing and sharing nanomaterial data, most of the data currently shared via publications and data resources are incomplete, poorly-integrated, and not suitable for meaningful interpretation and re-use of the data. Specifically, in its current state, data cannot be effectively utilized for the development of predictive models that will inform the rational design of nanomaterials. Results We have developed a specification called ISA-TAB-Nano, which comprises four spreadsheet-based file formats for representing and integrating various types of nanomaterial data. Three file formats (Investigation, Study, and Assay files) have been adapted from the established ISA-TAB specification; while the Material file format was developed de novo to more readily describe the complexity of nanomaterials and associated small molecules. In this paper, we have discussed the main features of each file format and how to use them for sharing nanomaterial descriptions and assay metadata. Conclusion The ISA-TAB-Nano file formats provide a general and flexible framework to record and integrate nanomaterial descriptions, assay data (metadata and endpoint measurements) and protocol information. Like ISA-TAB, ISA-TAB-Nano supports the use of ontology terms to promote standardized descriptions and to facilitate search and integration of the data. The ISA-TAB-Nano specification has been submitted as an ASTM work item to obtain community feedback and to provide a nanotechnology data-sharing standard for public development and adoption. PMID

  19. Demographic evidence of illegal harvesting of an endangered asian turtle.

    Science.gov (United States)

    Sung, Yik-Hei; Karraker, Nancy E; Hau, Billy C H

    2013-12-01

    Harvesting pressure on Asian freshwater turtles is severe, and dramatic population declines of these turtles are being driven by unsustainable collection for food markets, pet trade, and traditional Chinese medicine. Populations of big-headed turtle (Platysternon megacephalum) have declined substantially across its distribution, particularly in China, because of overcollection. To understand the effects of chronic harvesting pressure on big-headed turtle populations, we examined the effects of illegal harvesting on the demography of populations in Hong Kong, where some populations still exist. We used mark-recapture methods to compare demographic characteristics between sites with harvesting histories and one site in a fully protected area. Sites with a history of illegal turtle harvesting were characterized by the absence of large adults and skewed ratios of juveniles to adults, which may have negative implications for the long-term viability of populations. These sites also had lower densities of adults and smaller adult body sizes than the protected site. Given that populations throughout most of the species' range are heavily harvested and individuals are increasingly difficult to find in mainland China, the illegal collection of turtles from populations in Hong Kong may increase over time. Long-term monitoring of populations is essential to track effects of illegal collection, and increased patrolling is needed to help control illegal harvesting of populations, particularly in national parks. Because few, if any, other completely protected populations remain in the region, our data on an unharvested population of big-headed turtles serve as an important reference for assessing the negative consequences of harvesting on populations of stream turtles. Evidencia Demográfica de la Captura Ilegal de una Tortuga Asiática en Peligro. © 2013 Society for Conservation Biology.

  20. Work related injuries: estimating the incidence among illegally employed immigrants

    Directory of Open Access Journals (Sweden)

    Fadda Emanuela

    2010-12-01

    Full Text Available Abstract Background Statistics on occupational accidents are based on data from registered employees. With the increasing number of immigrants employed illegally and/or without regular working visas in many developed countries, it is of interest to estimate the injury rate among such unregistered workers. Findings The current study was conducted in an area of North-Eastern Italy. The sources of information employed in the present study were the Accidents and Emergencies records of a hospital; the population data on foreign-born residents in the hospital catchment area (Health Care District 4, Primary Care Trust 20, Province of Verona, Veneto Region, North-Eastern Italy; and the estimated proportion of illegally employed workers in representative samples from the Province of Verona and the Veneto Region. Of the 419 A&E records collected between January and December 2004 among non European Union (non-EU immigrants, 146 aroused suspicion by reporting the home, rather than the workplace, as the site of the accident. These cases were the numerator of the rate. The number of illegally employed non-EU workers, denominator of the rate, was estimated according to different assumptions and ranged from between 537 to 1,338 individuals. The corresponding rates varied from 109.1 to 271.8 per 1,000 non-EU illegal employees, against 65 per 1,000 reported in Italy in 2004. Conclusions The results of this study suggest that there is an unrecorded burden of illegally employed immigrants suffering from work related injuries. Additional efforts for prevention of injuries in the workplace are required to decrease this number. It can be concluded that the Italian National Institute for the Insurance of Work Related Injuries (INAIL probably underestimates the incidence of these accidents in Italy.

  1. Work related injuries: estimating the incidence among illegally employed immigrants.

    Science.gov (United States)

    Mastrangelo, Giuseppe; Rylander, Ragnar; Buja, Alessandra; Marangi, Gianluca; Fadda, Emanuela; Fedeli, Ugo; Cegolon, Luca

    2010-12-08

    Statistics on occupational accidents are based on data from registered employees. With the increasing number of immigrants employed illegally and/or without regular working visas in many developed countries, it is of interest to estimate the injury rate among such unregistered workers. The current study was conducted in an area of North-Eastern Italy. The sources of information employed in the present study were the Accidents and Emergencies records of a hospital; the population data on foreign-born residents in the hospital catchment area (Health Care District 4, Primary Care Trust 20, Province of Verona, Veneto Region, North-Eastern Italy); and the estimated proportion of illegally employed workers in representative samples from the Province of Verona and the Veneto Region. Of the 419 A&E records collected between January and December 2004 among non European Union (non-EU) immigrants, 146 aroused suspicion by reporting the home, rather than the workplace, as the site of the accident. These cases were the numerator of the rate. The number of illegally employed non-EU workers, denominator of the rate, was estimated according to different assumptions and ranged from between 537 to 1,338 individuals. The corresponding rates varied from 109.1 to 271.8 per 1,000 non-EU illegal employees, against 65 per 1,000 reported in Italy in 2004. The results of this study suggest that there is an unrecorded burden of illegally employed immigrants suffering from work related injuries. Additional efforts for prevention of injuries in the workplace are required to decrease this number. It can be concluded that the Italian National Institute for the Insurance of Work Related Injuries (INAIL) probably underestimates the incidence of these accidents in Italy.

  2. A secure file manager for UNIX

    Energy Technology Data Exchange (ETDEWEB)

    DeVries, R.G.

    1990-12-31

    The development of a secure file management system for a UNIX-based computer facility with supercomputers and workstations is described. Specifically, UNIX in its usual form does not address: (1) Operation which would satisfy rigorous security requirements. (2) Online space management in an environment where total data demands would be many times the actual online capacity. (3) Making the file management system part of a computer network in which users of any computer in the local network could retrieve data generated on any other computer in the network. The characteristics of UNIX can be exploited to develop a portable, secure file manager which would operate on computer systems ranging from workstations to supercomputers. Implementation considerations making unusual use of UNIX features, rather than requiring extensive internal system changes, are described, and implementation using the Cray Research Inc. UNICOS operating system is outlined.

  3. C-share: Optical circuits sharing for software-defined data-centers [arXiv

    DEFF Research Database (Denmark)

    Ben-Itzhak, Yaniv; Caba, Cosmin Marius; Schour, Liran

    2016-01-01

    Integrating optical circuit switches in data-centers is an ongoing research challenge. In recent years, state-of-the-art solutions introduce hybrid packet/circuit architectures for different optical circuit switch technologies, control techniques, and traffic rerouting methods. These solutions...... are based on separated packet and circuit planes which do not have the ability to utilize an optical circuit with flows that do not arrive from or delivered to switches directly connected to the circuit’s end-points. Moreover, current SDN-based elephant flow rerouting methods require a forwarding rule...... for each flow, which raise scalability issues. In this paper, we present C-Share - a practical, scalable SDN-based circuit sharing solution for data center networks. C-Share inherently enable elephant flows to share optical circuits by exploiting a flat upper tier network topology. C-Share is based...

  4. 22 CFR 127.6 - Seizure and forfeiture in attempts at illegal exports.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Seizure and forfeiture in attempts at illegal... REGULATIONS VIOLATIONS AND PENALTIES § 127.6 Seizure and forfeiture in attempts at illegal exports. (a) An... vessel, vehicle or aircraft involved in such attempt is subject to seizure, forfeiture and disposition as...

  5. The Impacts on Illegal Farmland Conversion of Adopting Remote Sensing Technology for Land Inspection in China

    Directory of Open Access Journals (Sweden)

    Taiyang Zhong

    2014-07-01

    Full Text Available While China’s central government has adopted remote sensing technology in land inspection since 2000, little empirical research has been done on its effect. This study aims to measure the effect of satellite imagery-based land inspection (SIBI on illegal farmland conversion. The data used in this study were collected for the period from 1997 to 2010 at the province-level. The econometrics approach for panel data model was used in this research. The results showed that SIBI has a deterrent effect of approximately 2.42 ha for every increase of 1% in proportion to the area of prefecture-level regions inspected in a province-level region. The results also indicate land inspections with RS (Remote Sensing technology saved approximately 11,880 ha farmland from illegal conversion during 2000–2010 with an estimated contribution of reducing illegal farmland conversion by nearly 11%. Furthermore, the governance structure change for land inspection has also contributed to deterring illegal farmland conversion. The deterrent effects due to land inspection by the Supervisor of State Land (SSL are about 7332 ha during 2008–2010 with an estimated contribution of reducing illegal farmland conversion by nearly 33%. In conclusion, although SIBI has strengthened China’s central capacity to uncover illegal farmland conversion and weakened local governments’ abilities to hide illegal farmland conversion, it has limited impact on illegal farmland conversion since it is just a technical tool. Improvements in the land inspection governance structure have also helped to deter illegal farmland conversion.

  6. On financing the internal enforcement of illegal immigration policies.

    Science.gov (United States)

    Bucci, G A; Tenorio, R

    1996-02-01

    "We introduce a government budget constraint into an illegal immigration model, and show that the effect of increasing internal enforcement of immigration laws on the host country's disposable national income depends on the mix of employer fines and income taxation used to finance the added enforcement. These issues are addressed under alternative assumptions about (a) the ability of host country employers to discern between legal and illegal workers, and (b) host country labor market conditions. Empirical evidence for the United States indicates that the employer sanctions program may have had a negative impact on disposable national income." excerpt

  7. A Hybrid Energy Sharing Framework for Green Cellular Networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2016-12-09

    Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy selfreliance and minimize the network’s energy cost, the operator needs to efficiently exploit the RE generated across all BSs. In this paper, a hybrid energy sharing framework for cellular network is proposed, where a combination of physical power lines and energy trading with other BSs using smart grid is used. Algorithms for physical power lines deployment between BSs, based on average and complete statistics of the net RE available, are developed. Afterwards, an energy management framework is formulated to optimally determine the quantities of electricity and RE to be procured and exchanged among BSs, respectively, while considering battery capacities and real-time energy pricing. Three cases are investigated where RE generation is unknown, perfectly known, and partially known ahead of time. Results investigate the time varying energy management of BSs and demonstrate considerable reduction in average energy cost thanks to the hybrid energy sharing scheme.

  8. Insights into the illegal trade of feline derivatives in Costa Rica

    Directory of Open Access Journals (Sweden)

    Jennifer Rebecca Kelly, Ph.D.

    2018-01-01

    Full Text Available Research has given the illegal trade of feline derivatives in Mexico as well as Central and South America little attention. The purpose of this article is to: 1 Begin a dialogue among human dimensions of wildlife scholars about the economic and cultural values of feline derivatives throughout Mexico, Central and South America; 2 Present the range of economic values that emerged in my interview and participant observation data from Costa Rica; 3 Offer an explanation of how sociological concepts influence the buying and selling of dead jaguars (Panthera onca, pumas (Puma concolor, and ocelots (Leopardus pardalis in Costa Rica. The principal results are: 1 The sociological concepts of social status and masculine identity interlace with and motivate the illegal trade; 2 The value of feline parts in Costa Rica ranges from $25 to $5000; 3 This value differs by culture and geographic residency of the seller (urban versus rural and diverged from values discovered in other countries; 4 The men who adorn their homes with illegal trophies are not necessarily the poachers. The value of jaguar skin has been recorded for as little as $100 in a 1983 study conducted in Belize and for as high as $600 in a study done in Venezuela in approximately 2011. Because of cultural differences, Cabécar sell a feline skin for as little as $25 and up to $400 if it includes teeth and nails, but Ticos, who are non-indigenous Costa Ricans, sell the skins from $500-$5000. Non-indigenous, wealthy urban men indicate prestige by the display of feline parts. My findings align with existing research that jaguar skins are sold to people in larger cities and that adornment of feline derivatives is a masculine tradition that can be linked with Amerindian cultures and ancient times. Historically jaguars have been associated with elitist symbolism and evidence in this study suggests this continues in today's culture as a sign of social status. Results suggest that money alone does not

  9. Toward a new understanding of the links between poverty and illegal wildlife hunting

    NARCIS (Netherlands)

    Duffy, Rosaleen; St John, Freya A.V.; Büscher, Bram; Brockington, Dan

    2016-01-01

    Conservation organizations have increasingly raised concerns about escalating rates of illegal hunting and trade in wildlife. Previous studies have concluded that people hunt illegally because they are financially poor or lack alternative livelihood strategies. However, there has been little

  10. Forensic timber identification: It's time to integrate disciplines to combat illegal logging

    Science.gov (United States)

    Eleanor E. Dormontt; Markus Boner; Birgit Braun; Gerhard Breulmann; Bernd Degen; Edgard Espinoza; Shelley Gardner; Phil Guillery; John C. Hermanson; Gerald Koch; Soon Leong Lee; Milton Kanashiro; Anto Rimbawanto; Darren Thomas; Alex C. Wiedenhoeft; Yafang Yin; Johannes Zahnen; Andrew J. Lowe

    2015-01-01

    The prosecution of illegal logging crimes is hampered by a lack of available forensic timber identification tools, both for screening of suspectmaterial and definitive identification of illegally sourcedwood. Reputable timber traders are also struggling to police their own supply chains and comply with the growing requirement for due diligence with respect to timber...

  11. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-04-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  12. Logging concessions enable illegal logging crisis in the Peruvian Amazon.

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin

    2014-04-17

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  13. Request queues for interactive clients in a shared file system of a parallel computing system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin

    2015-08-18

    Interactive requests are processed from users of log-in nodes. A metadata server node is provided for use in a file system shared by one or more interactive nodes and one or more batch nodes. The interactive nodes comprise interactive clients to execute interactive tasks and the batch nodes execute batch jobs for one or more batch clients. The metadata server node comprises a virtual machine monitor; an interactive client proxy to store metadata requests from the interactive clients in an interactive client queue; a batch client proxy to store metadata requests from the batch clients in a batch client queue; and a metadata server to store the metadata requests from the interactive client queue and the batch client queue in a metadata queue based on an allocation of resources by the virtual machine monitor. The metadata requests can be prioritized, for example, based on one or more of a predefined policy and predefined rules.

  14. A Novel Intensive Distribution Logistics Network Design and Profit Allocation Problem considering Sharing Economy

    Directory of Open Access Journals (Sweden)

    Mi Gan

    2018-01-01

    Full Text Available The rapid growth of logistics distribution highlights the problems including the imperfect infrastructure of logistics distribution network, the serious shortage of distribution capacity of each individual enterprise, and the high cost of distribution in China. While the development of sharing economy makes it possible to achieve the integration of whole social logistic resources, big data technology can grasp customer’s logistics demand accurately on the basis of analyzing the customer’s logistics distribution preference, which contributes to the integration and optimization of the whole logistics resources. This paper proposes a kind of intensive distribution logistics network considering sharing economy, which assumes that all the social logistics suppliers build a strategic alliance, and individual idle logistics resources are also used to deal with distribution needs. Analyzing customer shopping behavior by the big data technology to determine customer’s logistics preference on the basis of dividing the customer’s logistics preference into high speed, low cost, and low pollution and then constructing the corresponding objective function model according to different logistics preferences, we obtain the intensive distribution logistics network model and solve it with heuristic algorithm. Furthermore, this paper analyzes the mechanism of interest distribution of the participants in the distribution network and puts forward an improved interval Shapley value method considering both satisfaction and contribution, with case verifying the feasibility and effectiveness of the model. The results showed that, compared with the traditional Shapley method, distribution coefficient calculated by the improved model could be fairer, improve stakeholder satisfaction, and promote the sustainable development of the alliance as well.

  15. Reality Television Programs Are Associated With Illegal Drug Use and Prescription Drug Misuse Among College Students.

    Science.gov (United States)

    Fogel, Joshua; Shlivko, Alexander

    2016-01-02

    Reality television watching and social media use are popular activities. Reality television can include mention of illegal drug use and prescription drug misuse. To determine if reality television and social media use of Twitter are associated with either illegal drug use or prescription drug misuse. Survey of 576 college students in 2011. Independent variables included watching reality television (social cognitive theory), parasocial interaction (parasocial interaction theory), television hours watched (cultivation theory), following a reality television character on Twitter, and demographics. Outcome variables were illegal drug use and prescription drug misuse. Watching reality television and also identifying with reality TV program characters were each associated with greater odds for illegal drug use. Also, following a reality TV character on Twitter had greater odds for illegal drug use and also in one analytical model for prescription drug misuse. No support was seen for cultivation theory. Those born in the United States had greater odds for illegal drug use and prescription drug misuse. Women and Asians had lower odds for illegal drug use. African Americans and Asians had lower odds for prescription drug misuse. Physicians, psychologists, and other healthcare practitioners may find it useful to include questions in their clinical interview about reality television watching and Twitter use. Physician and psychology groups, public health practitioners, and government health agencies should consider discussing with television broadcasting companies the potential negative impact of including content with illegal drugs and prescription drug misuse on reality television programs.

  16. Secure Real-Time Monitoring and Management of Smart Distribution Grid using Shared Cellular Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Ganem, Hervé; Jorguseski, Ljupco

    2017-01-01

    capabilities. Thanks to the advanced measurement devices, management framework, and secure communication infrastructure developed in the FP7 SUNSEED project, the Distribution System Operator (DSO) now has full observability of the energy flows at the medium/low voltage grid. Furthermore, the prosumers are able......, where the smart grid ICT solutions are provided through shared cellular LTE networks....

  17. 75 FR 1761 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-01-13

    .... Applicants: Cloud County Wind Farm, LLC, Pioneer Prairie Wind Farm I, LLC, Arlington Wind Power Project LLC... of the Localized Costs Sharing Agreement. Filed Date: 12/22/2009. Accession Number: 20091224-0002... Rate Schedule 1 effective 11/25/09. Filed Date: 12/22/2009. Accession Number: 20091224-0077. Comment...

  18. Illegal logging in the Northern Sierra Madre Natural Park, the Philippines

    Directory of Open Access Journals (Sweden)

    Jan van der Ploeg

    2011-01-01

    Full Text Available Illegal logging is a threat to biodiversity and rural livelihoods in the Northern Sierra Madre Natural Park, the largest protected area in the Philippines. Every year between 20,000 and 35,000 cu. m wood is extracted from the park. The forestry service and municipal governments tolerate illegal logging in the protected area; government officials argue that banning an important livelihood activity of households along the forest frontier will aggravate rural poverty. However this reasoning underestimates the scale of timber extraction, and masks resource capture and collusive corruption. Illegal logging in fact forms an obstacle for sustainable rural development in and around the protected area by destroying ecosystems, distorting markets, and subverting the rule of law. Strengthening law enforcement and controlling corruption are prerequisites for sustainable forest management in and around protected areas in insular southeast Asia.

  19. Prehospital Emergencies in Illegal Gold Mining Sites in French Guiana.

    Science.gov (United States)

    Egmann, Gérald; Tattevin, Pierre; Palancade, Renaud; Nacher, Matthieu

    2018-03-01

    Illegal gold mining is flourishing in French Guiana, existing outside the law due to both the high cost of gold mining permits and the challenges of law enforcement within the Amazon forest. We report the characteristics of, and the medical responses to, medical emergencies in illegal gold mining sites. We performed a retrospective study of all medical emergencies reported from illegal gold mining sites to the centralized call office of SAMU 973 from 1998 through 2000 and from 2008 through 2010. According to the national health care system, any medical emergency within the territory is handled by the prehospital emergency medical service (SAMU 973), irrespective of the patients' legal status. Data were extracted from the SAMU 973 notebook registry (1998-2000) or the SAMU 973 computerized database (2008-2010) and werre collected using a standardized questionnaire. Of 71,932 calls for medical emergencies in French Guiana during the study periods, 340 (0.5%) originated from illegal gold mining sites. Of these, 196 (58%) led to medical evacuation by helicopter, whereas the overall rate of evacuation by helicopter after placing a call to SAMU 973 was only 4% (3020/71,932; PAmazon forest mostly include infectious diseases, followed by trauma, and often require medical evacuation by helicopter. Our study suggests that implementation of preventive medicine within gold mining sites, irrespective of their legal status, could be cost-effective and reduce morbidity. Copyright © 2017 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  20. The composition of surrogate and illegal alcohol products in Estonia.

    Science.gov (United States)

    Lang, Katrin; Väli, Marika; Szucs, Sándor; Adány, Róza; McKee, Martin

    2006-01-01

    To identify the composition of illegal and surrogate alcohol products consumed in Estonia. The initial source of information was a series of visits made in August 2005 to a soup kitchen in central Tartu, Estonia. Individuals were asked for brief details of their personal circumstances, what they normally drank, and in addition they were asked to bring samples of the substances they usually consumed. In other cases, the substances identified were purchased by the investigators or from informal contacts in north-eastern part of Estonia, an area that is well known for illegal alcohol consumption. Samples were tested for chemical contents. We identified a range of alcohol-containing substances that are consumed, although, not intended for consumption. These comprised medicinal products, aftershaves, illegally produced spirits, and fire-lighting fuel. The medicinal compounds contained, on average, 67% ethanol by volume; the aftershaves contained slightly less. Both were typically pure, with a few containing detectable quantities of isoamyl alcohol. The illegally produced alcohol contained, on average, 43% ethanol by volume, ranging from 32 to 53%. However, many also contained detectable quantities of long chain alcohols. These substances are half the price or less of commercial vodka, with fire lighting fuels especially inexpensive. There is in Estonia a range of alcohol-containing substances easily available at low cost. Some contain substantially higher concentrations of ethanol than commercial spirits and others also contain toxic long chain alcohols.

  1. MOTIVASI, SIKAP, DAN INTENSI PENGGUNA MEDIA SOSIAL PADA KAMPANYE STOP ILLEGAL FISHING

    Directory of Open Access Journals (Sweden)

    La Moriansyah

    2016-11-01

    Full Text Available Social media is commonly used to promote social campaigns, one of which is Stop Illegal Fishing campaign. To achieve success in this campaign, some conditions have to be fulfilled i.e. positive attitudes of the social media users toward the campaigns and high intentions to provide recommendations (word of mouth to others. This study was conducted to analyze types of motivations affecting attitudes of users towards social campaigns (stop illegal fishing in social media. In addition, it also analyzed the influence of attitudes on users’ intentions in performing WOM. The method utilized to meet the objectives was Partial Least Square. The results showed that users’ motivation in using social media and towards the campaign messages are perceived to have significantly a positive effect on the attitude towards social campaigns in social media. Besides, the increase in the intention to perform WOM is positively influenced by the attitudes of social media users. There are differences identified in the motivation that affect the attitudes of social media users towards campaign of the two groups i.e. the social media users who have never seen the Stop Illegal Fishing campaign (151 samples and those who have seen the campaign in social media.    Keywords:  motivation, attitude, word of mouth, user experience, uses and gratification theory, digital campaigns, social campaigns, stop illegal fishingABSTRAKMedia sosial sering digunakan untuk mempromosikan kampanye sosial, contohnya adalah  kampanye Stop Illegal Fishing. Untuk meraih kesuksesan pada kampanye ini, beberapa hal yang harus diraih adalah sikap positif pengguna media sosial terhadap kampanye dan intensi yang tinggi untuk memberikan rekomendasi (word of mouth kepada orang lain. Penelitian ini dilakukan untuk menganalisis motivasi pengguna apa saja yang memengaruhi sikap pengguna media sosial terhadap kampanye sosial (stop illegal fishing di media sosial. Selain itu menganalisis sikap

  2. Social network community structure and the contact-mediated sharing of commensal E. coli among captive rhesus macaques (Macaca mulatta).

    Science.gov (United States)

    Balasubramaniam, Krishna; Beisner, Brianne; Guan, Jiahui; Vandeleest, Jessica; Fushing, Hsieh; Atwill, Edward; McCowan, Brenda

    2018-01-01

    In group-living animals, heterogeneity in individuals' social connections may mediate the sharing of microbial infectious agents. In this regard, the genetic relatedness of individuals' commensal gut bacterium Escherichia coli may be ideal to assess the potential for pathogen transmission through animal social networks. Here we use microbial phylogenetics and population genetics approaches, as well as host social network reconstruction, to assess evidence for the contact-mediated sharing of E. coli among three groups of captively housed rhesus macaques ( Macaca mulatta ), at multiple organizational scales. For each group, behavioral data on grooming, huddling, and aggressive interactions collected for a six-week period were used to reconstruct social network communities via the Data Cloud Geometry (DCG) clustering algorithm. Further, an E. coli isolate was biochemically confirmed and genotypically fingerprinted from fecal swabs collected from each macaque. Population genetics approaches revealed that Group Membership, in comparison to intrinsic attributes like age, sex, and/or matriline membership of individuals, accounted for the highest proportion of variance in E. coli genotypic similarity. Social network approaches revealed that such sharing was evident at the community-level rather than the dyadic level. Specifically, although we found no links between dyadic E. coli similarity and social contact frequencies, similarity was significantly greater among macaques within the same social network communities compared to those across different communities. Moreover, tests for one of our study-groups confirmed that E. coli isolated from macaque rectal swabs were more genotypically similar to each other than they were to isolates from environmentally deposited feces. In summary, our results suggest that among frequently interacting, spatially constrained macaques with complex social relationships, microbial sharing via fecal-oral, social contact-mediated routes may

  3. Tuning HDF5 subfiling performance on parallel file systems

    Energy Technology Data Exchange (ETDEWEB)

    Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chaarawi, Mohamad [Intel Corp. (United States); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Mainzer, John [The HDF Group (United States); Willmore, Frank [The HDF Group (United States)

    2017-05-12

    Subfiling is a technique used on parallel file systems to reduce locking and contention issues when multiple compute nodes interact with the same storage target node. Subfiling provides a compromise between the single shared file approach that instigates the lock contention problems on parallel file systems and having one file per process, which results in generating a massive and unmanageable number of files. In this paper, we evaluate and tune the performance of recently implemented subfiling feature in HDF5. In specific, we explain the implementation strategy of subfiling feature in HDF5, provide examples of using the feature, and evaluate and tune parallel I/O performance of this feature with parallel file systems of the Cray XC40 system at NERSC (Cori) that include a burst buffer storage and a Lustre disk-based storage. We also evaluate I/O performance on the Cray XC30 system, Edison, at NERSC. Our results show performance benefits of 1.2X to 6X performance advantage with subfiling compared to writing a single shared HDF5 file. We present our exploration of configurations, such as the number of subfiles and the number of Lustre storage targets to storing files, as optimization parameters to obtain superior I/O performance. Based on this exploration, we discuss recommendations for achieving good I/O performance as well as limitations with using the subfiling feature.

  4. An econometric study of illegal electricity connections in the urban favelas of Belo Horizonte, Brazil

    International Nuclear Information System (INIS)

    Mimmi, Luisa M.; Ecer, Sencer

    2010-01-01

    The data from the project 'Conviver,' launched in 2006 in Belo Horizonte (Brazil), provides a unique opportunity to study illegal electricity connections. Based on an original dataset of 15,279 low-income households, this paper studies the incidence and determinants of illegality in the context of low-income urban favelas. The probability of engaging in illegal behavior is explained not just by low income, but by a combination of concurring factors: sub-standard energy provision and equipment; inefficient/incorrect use of domestic electric appliances and running an informal in-house business. These recurrent issues in the urban favelas aggravate a sense of exclusion from growth, which is generally recognized as a trigger of illegality. The impact of energy demand on energy-related illegality is carefully analyzed, and different empirical strategies adopted to circumvent some simultaneity problem between both decision processes. The effectiveness of consumption-based energy subsidies is also explored. In spite of some contrary arguments in the literature, in the context of peri-urban slums, such measures may exert a positive impact in mitigating illegal access and use of energy. Effectiveness will be enhanced by accompanying measures such as: perceivable improvements of equipment, metering and maintenance, promotion of beneficiaries' awareness of energy usage, and energy-saving behaviors.

  5. An econometric study of illegal electricity connections in the urban favelas of Belo Horizonte, Brazil

    Energy Technology Data Exchange (ETDEWEB)

    Mimmi, Luisa M. [Global Partnership on Output-Based Aid (GPOBA), World Bank (United States); Ecer, Sencer [LECG, Georgetown University Public Policy Institute, Washington, DC (United States)

    2010-09-15

    The data from the project Conviver, launched in 2006 in Belo Horizonte (Brazil), provides a unique opportunity to study illegal electricity connections. Based on an original dataset of 15,279 low-income households, this paper studies the incidence and determinants of illegality in the context of low-income urban favelas. The probability of engaging in illegal behavior is explained not just by low income, but by a combination of concurring factors: sub-standard energy provision and equipment; inefficient/incorrect use of domestic electric appliances and running an informal in-house business. These recurrent issues in the urban favelas aggravate a sense of exclusion from growth, which is generally recognized as a trigger of illegality. The impact of energy demand on energy-related illegality is carefully analyzed, and different empirical strategies adopted to circumvent some simultaneity problem between both decision processes. The effectiveness of consumption-based energy subsidies is also explored. In spite of some contrary arguments in the literature, in the context of peri-urban slums, such measures may exert a positive impact in mitigating illegal access and use of energy. Effectiveness will be enhanced by accompanying measures such as: perceivable improvements of equipment, metering and maintenance, promotion of beneficiaries' awareness of energy usage, and energy-saving behaviors. (author)

  6. Effects of Knowledge Sharing and Social Presence on the Intention to Continuously Use Social Networking Sites: The Case of Twitter in Korea

    Science.gov (United States)

    Park, Bong-Won; Lee, Kun Chang

    Recent surge of social networking websites in the world supports a widely accepted assumption that people aspires to be recognized online by sharing information with others, perceive enjoyment and keeps to use their social networking site continuously. Different from traditional social networking sites (SNSs) like Cyworld and Facebook, Twitter is famous for its short message and ease of sharing knowledge with others in a prompt manner. Therefore, Twitter is preferred most by many people who seem innovative generically. In this sense, Twitter accumulates its fame as the most influential SNS media among users. However, there is no study to investigate why people holds continuous intention to use the Twitter from the perspective of knowledge-sharing and social presence. To resolve this research issue, this paper adopts six constructs such as personal innovativeness, knowledge-sharing intention, perceived ease of use, perceived enjoyment, social presence, and intention to continuously use. Empirical results with 105 valid questionnaires revealed that the proposed research model is statistically significant, and people's intention to use the Twitter continuously is influenced by social presence, perceived enjoyment, and perceived ease of use.

  7. Convergence of Internet and TV: The Commercial Viability of P2P Content Delivery

    Science.gov (United States)

    de Boever, Jorn

    The popularity of (illegal) P2P (peer-to-peer) file sharing has a disruptive impact on Internet traffic and business models of content providers. In addition, several studies have found an increasing demand for bandwidth consuming content, such as video, on the Internet. Although P2P systems have been put forward as a scalable and inexpensive model to deliver such content, there has been relatively little economic analysis of the potentials and obstacles of P2P systems as a legal and commercial content distribution model. Many content providers encounter uncertainties regarding the adoption or rejection of P2P networks to spread content over the Internet. The recent launch of several commercial, legal P2P content distribution platforms increases the importance of an integrated analysis of the Strengths, Weaknesses, Opportunities and Threats (SWOT).

  8. Health Topic XML File Description

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xmldescription.html Health Topic XML File Description: MedlinePlus To use the sharing ... information categories assigned. Example of a Full Health Topic Record A record for a MedlinePlus health topic ...

  9. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  10. Analysis of Swedish Forest Owners' Information and Knowledge-Sharing Networks for Decision-Making: Insights for Climate Change Communication and Adaptation

    Science.gov (United States)

    André, Karin; Baird, Julia; Gerger Swartling, Åsa; Vulturius, Gregor; Plummer, Ryan

    2017-06-01

    To further the understanding of climate change adaptation processes, more attention needs to be paid to the various contextual factors that shape whether and how climate-related knowledge and information is received and acted upon by actors involved. This study sets out to examine the characteristics of forest owners' in Sweden, the information and knowledge-sharing networks they draw upon for decision-making, and their perceptions of climate risks, their forests' resilience, the need for adaptation, and perceived adaptive capacity. By applying the concept of ego-network analysis, the empirical data was generated by a quantitative survey distributed to 3000 private forest owners' in Sweden in 2014 with a response rate of 31%. The results show that there is a positive correlation, even though it is generally weak, between forest owner climate perceptions and (i) network features, i.e. network size and heterogeneity, and (ii) presence of certain alter groups (i.e. network members or actors). Results indicate that forest owners' social networks currently serve only a minimal function of sharing knowledge of climate change and adaptation. Moreover, considering the fairly infrequent contact between respondents and alter groups, the timing of knowledge sharing is important. In conclusion we suggest those actors that forest owners' most frequently communicate with, especially forestry experts providing advisory services (e.g. forest owner associations, companies, and authorities) have a clear role to communicate both the risks of climate change and opportunities for adaptation. Peers are valuable in connecting information about climate risks and adaptation to the actual forest property.

  11. Experience and Lessons learnt from running High Availability Databases on Network Attached Storage

    CERN Document Server

    Guijarro, Manuel

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department supplies the Oracle Central Database services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been setup. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS (Network File System) as shared disk space for RAC purposes and Data hosting. It is composed of two private LANs (Local Area Network), one to provide access to the NAS filers and a second to implement the Oracle RAC private interconnect, both using Network Bonding. NAS filers are configured in partnership to prevent having single points of failure and to provide automatic NAS filer fail-over.

  12. Experience and lessons learnt from running high availability databases on network attached storage

    International Nuclear Information System (INIS)

    Guijarro, M; Gaspar, R

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department supplies the Oracle Central Database services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been setup. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS (Network File System) as shared disk space for RAC purposes and Data hosting. It is composed of two private LANs (Local Area Network), one to provide access to the NAS filers and a second to implement the Oracle RAC private interconnect, both using Network Bonding. NAS filers are configured in partnership to prevent having single points of failure and to provide automatic NAS filer fail-over

  13. The Impact of Resource Scarcity on Bonding and Bridging Social Capital: the Case of Fishers' Information-Sharing Networks in Loreto, BCS, Mexico

    Directory of Open Access Journals (Sweden)

    Saudiel Ramirez-Sanchez

    2009-06-01

    Full Text Available Fishers often rely on their social capital to cope with resource fluctuations by sharing information on the abundance and location of fish. Drawing on research in seven coastal fishing communities in Loreto, Baja California Sur, Mexico, we examine the effect of resource scarcity on the bonding, bridging, and linking social-capital patterns of fishers' information-sharing networks. We found that: (1 fishers' information sharing is activated in response to varying ecological conditions; (2 resource scarcity is an ambiguous indicator of the extent to which fishers share information on the abundance and location of fish within and between communities; (3 information sharing is based on trust and occurs through kinship, friendship, and acquaintance social relations; (4 friendship ties play a key and flexible role in fishers' social networks within and between communities; (5 overall, the composition of fishers' social networks follows a friendship>kinship>acquaintance order of importance; and (6 the function of social ties, internal conflict, and settlement histories moderate the effects of resource scarcity on fishers' social capital. We conclude by arguing that the livelihoods of fishers from Loreto have adaptive capacity for dealing with fish fluctuations but little or no proactive resilience to address resource-management issues.

  14. Library Information System Time-Sharing (LISTS) Project. Final Report.

    Science.gov (United States)

    Black, Donald V.

    The Library Information System Time-Sharing (LISTS) experiment was based on three innovations in data processing technology: (1) the advent of computer time-sharing on third-generation machines, (2) the development of general-purpose file-management software and (3) the introduction of large, library-oriented data bases. The main body of the…

  15. Využití Network marketingu ve vybrané firmě

    OpenAIRE

    SAIKO, Michaela

    2009-01-01

    In my work I appreciated and considered the particular advantages compared to classical network marketing business. In the theoretical part, I mainly focused on the definition of network marketing, network marketing history, abuse of the principle of NWM, advantages and disadvantages of network marketing, illegal system and calculation of remuneration in network marketing. The analysis was first carried out the characteristics of the selected company, followed by analysis of network marketing...

  16. Approaches in highly parameterized inversion-PESTCommander, a graphical user interface for file and run management across networks

    Science.gov (United States)

    Karanovic, Marinko; Muffels, Christopher T.; Tonkin, Matthew J.; Hunt, Randall J.

    2012-01-01

    Models of environmental systems have become increasingly complex, incorporating increasingly large numbers of parameters in an effort to represent physical processes on a scale approaching that at which they occur in nature. Consequently, the inverse problem of parameter estimation (specifically, model calibration) and subsequent uncertainty analysis have become increasingly computation-intensive endeavors. Fortunately, advances in computing have made computational power equivalent to that of dozens to hundreds of desktop computers accessible through a variety of alternate means: modelers have various possibilities, ranging from traditional Local Area Networks (LANs) to cloud computing. Commonly used parameter estimation software is well suited to take advantage of the availability of such increased computing power. Unfortunately, logistical issues become increasingly important as an increasing number and variety of computers are brought to bear on the inverse problem. To facilitate efficient access to disparate computer resources, the PESTCommander program documented herein has been developed to provide a Graphical User Interface (GUI) that facilitates the management of model files ("file management") and remote launching and termination of "slave" computers across a distributed network of computers ("run management"). In version 1.0 described here, PESTCommander can access and ascertain resources across traditional Windows LANs: however, the architecture of PESTCommander has been developed with the intent that future releases will be able to access computing resources (1) via trusted domains established in Wide Area Networks (WANs) in multiple remote locations and (2) via heterogeneous networks of Windows- and Unix-based operating systems. The design of PESTCommander also makes it suitable for extension to other computational resources, such as those that are available via cloud computing. Version 1.0 of PESTCommander was developed primarily to work with the

  17. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  18. The biomedicalisation of illegal abortion: the double life of misoprostol in Brazil

    Directory of Open Access Journals (Sweden)

    Silvia De Zordo

    Full Text Available Abstract This paper examines the double life of misoprostol in Brazil, where it is illegally used by women as an abortifacient and legally used in obstetric hospital wards. Based on my doctoral and post-doctoral anthropological research on contraception and abortion in Salvador, Bahia, this paper initially traces the “conversion” of misoprostol from a drug to treat ulcers to a self-administered abortifacient in Latin America, and its later conversion to aneclectic global obstetric tool. It then shows how, while reducing maternal mortality, its use as an illegal abortifacient has reinforced the double reproductive citizenship regime existing in countries with restrictive abortion laws and poor post-abortion care services, where poor women using it illegally are stigmatised, discriminated against and exposed to potentially severe health risks.

  19. Legal Drugs Are Good Drugs and Illegal Drugs Are Bad Drugs

    OpenAIRE

    Indrati, Dina; Prasetyo, Herry

    2011-01-01

    ABSTRACT : Labelling drugs are important issue nowadays in a modern society. Although it is generally believed that legal drugs are good drugs and illegal drugs are bad drugs, it is evident that some people do not aware about the side effects of drugs used. Therefore, a key contention of this philosophical essay is that explores harms minimisation policy, discuss whether legal drugs are good drugs and illegal drugs are bad drugs and explores relation of drugs misuse in a psychiatric nursing s...

  20. Use of econometric models to estimate expenditure shares.

    Science.gov (United States)

    Trogdon, Justin G; Finkelstein, Eric A; Hoerger, Thomas J

    2008-08-01

    To investigate the use of regression models to calculate disease-specific shares of medical expenditures. Medical Expenditure Panel Survey (MEPS), 2000-2003. Theoretical investigation and secondary data analysis. Condition files used to define the presence of 10 medical conditions. Incremental effects of conditions on expenditures, expressed as a fraction of total expenditures, cannot generally be interpreted as shares. When the presence of one condition increases treatment costs for another condition, summing condition-specific shares leads to double-counting of expenditures. Condition-specific shares generated from multiplicative models should not be summed. We provide an algorithm that allows estimates based on these models to be interpreted as shares and summed across conditions.

  1. Geo-spatial aspects of acceptance of illegal hunting of large carnivores in Scandinavia.

    Science.gov (United States)

    Gangaas, Kristin E; Kaltenborn, Bjørn P; Andreassen, Harry P

    2013-01-01

    Human-carnivore conflicts are complex and are influenced by: the spatial distribution of the conflict species; the organisation and intensity of management measures such as zoning; historical experience with wildlife; land use patterns; and local cultural traditions. We have used a geographically stratified sampling of social values and attitudes to provide a novel perspective to the human - wildlife conflict. We have focused on acceptance by and disagreements between residents (measured as Potential Conflict Index; PCI) towards illegal hunting of four species of large carnivores (bear, lynx, wolf, wolverine). The study is based on surveys of residents in every municipality in Sweden and Norway who were asked their opinion on illegal hunting. Our results show how certain social values are associated with acceptance of poaching, and how these values differ geographically independent of carnivore abundance. Our approach differs from traditional survey designs, which are often biased towards urban areas. Although these traditional designs intend to be representative of a region (i.e. a random sample from a country), they tend to receive relatively few respondents from rural areas that experience the majority of conflict with carnivores. Acceptance of poaching differed significantly between Norway (12.7-15.7% of respondents) and Sweden (3.3-4.1% of respondents). We found the highest acceptance of illegal hunting in rural areas with free-ranging sheep and strong hunting traditions. Disagreements between residents (as measured by PCI) were highest in areas with intermediate population density. There was no correlation between carnivore density and either acceptance of illegal hunting or PCI. A strong positive correlation between acceptance of illegal hunting and PCI showed that areas with high acceptance of illegal hunting are areas with high potential conflict between people. Our results show that spatially-stratified surveys are required to reveal the large scale

  2. Heterogeneous information sharing of sensor information in contested environments

    Science.gov (United States)

    Wampler, Jason A.; Hsieh, Chien; Toth, Andrew; Sheatsley, Ryan

    2017-05-01

    The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R and E) project, "Smoke Screen in Cyberspace", was demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. Recovery is only possible after recovering all fragments and attacking/denying one or more nodes does not limit the availability of other fragment copies in the network. This experiment proved the feasibility of redundant file fragmentation, and is the foundation for developing sophisticated methods to blacklist compromised nodes, move data fragments from risks of compromise, and forward stored data fragments closer to the anticipated retrieval point. This paper outlines initial results in scalability of node members, fragment size, file size, and performance in a heterogeneous network consisting of the Wireless Network after Next (WNaN) radio and Common Sensor Radio (CSR).

  3. Emerging Geospatial Sharing Technologies in Earth and Space Science Informatics

    Science.gov (United States)

    Singh, R.; Bermudez, L. E.

    2013-12-01

    Emerging Geospatial Sharing Technologies in Earth and Space Science Informatics The Open Geospatial Consortium (OGC) mission is to serve as a global forum for the collaboration of developers and users of spatial data products and services, and to advance the development of international standards for geospatial interoperability. The OGC coordinates with over 400 institutions in the development of geospatial standards. In the last years two main trends are making disruptions in geospatial applications: mobile and context sharing. People now have more and more mobile devices to support their work and personal life. Mobile devices are intermittently connected to the internet and have smaller computing capacity than a desktop computer. Based on this trend a new OGC file format standard called GeoPackage will enable greater geospatial data sharing on mobile devices. GeoPackage is perhaps best understood as the natural evolution of Shapefiles, which have been the predominant lightweight geodata sharing format for two decades. However the format is extremely limited. Four major shortcomings are that only vector points, lines, and polygons are supported; property names are constrained by the dBASE format; multiple files are required to encode a single data set; and multiple Shapefiles are required to encode multiple data sets. A more modern lingua franca for geospatial data is long overdue. GeoPackage fills this need with support for vector data, image tile matrices, and raster data. And it builds upon a database container - SQLite - that's self-contained, single-file, cross-platform, serverless, transactional, and open source. A GeoPackage, in essence, is a set of SQLite database tables whose content and layout is described in the candidate GeoPackage Implementation Specification available at https://portal.opengeospatial.org/files/?artifact_id=54838&version=1. The second trend is sharing client 'contexts'. When a user is looking into an article or a product on the web

  4. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  5. Optimizing End-to-End Big Data Transfers over Terabits Network Infrastructure

    International Nuclear Information System (INIS)

    Kim, Youngjae; Vallee, Geoffroy R.; Lee, Sangkeun; Shipman, Galen M.

    2016-01-01

    While future terabit networks hold the promise of significantly improving big-data motion among geographically distributed data centers, significant challenges must be overcome even on today's 100 gigabit networks to realize end-to-end performance. Multiple bottlenecks exist along the end-to-end path from source to sink, for instance, the data storage infrastructure at both the source and sink and its interplay with the wide-area network are increasingly the bottleneck to achieving high performance. In this study, we identify the issues that lead to congestion on the path of an end-to-end data transfer in the terabit network environment, and we present a new bulk data movement framework for terabit networks, called LADS. LADS exploits the underlying storage layout at each endpoint to maximize throughput without negatively impacting the performance of shared storage resources for other users. LADS also uses the Common Communication Interface (CCI) in lieu of the sockets interface to benefit from hardware-level zero-copy, and operating system bypass capabilities when available. It can further improve data transfer performance under congestion on the end systems using buffering at the source using flash storage. With our evaluations, we show that LADS can avoid congested storage elements within the shared storage resource, improving input/output bandwidth, and data transfer rates across the high speed networks. We also investigate the performance degradation problems of LADS due to I/O contention on the parallel file system (PFS), when multiple LADS tools share the PFS. We design and evaluate a meta-scheduler to coordinate multiple I/O streams while sharing the PFS, to minimize the I/O contention on the PFS. Finally, with our evaluations, we observe that LADS with meta-scheduling can further improve the performance by up to 14 percent relative to LADS without meta-scheduling.

  6. Reclamation of the illegal dump for sustainable development the environment in Sverdlovo of Leningrad Oblast’, Russia

    Directory of Open Access Journals (Sweden)

    Bukova Maria

    2016-01-01

    Full Text Available Illegal dumping is dumping of any waste such as oil, furniture, appliances, trash, litter or landscaping cuttings, upon any land of state, city, village or private ownership without consent of the owner. Illegal dumping has a great negative and fatal impact on our environment and all living organisms both fauna and flora. It also exposes people to various risks of chemicals (fluids or dust and is a big threat to all under-ground and surface water resources. Illegal dumps also attract all kinds of bugs such as rodents and insects. For example, illegal dumps with waste tires provide a practically perfect place for mosquitoes to breed. Mosquitoes can multiply 100 times faster than normal in the warm, stagnant water in waste tires. Exemplary for the illegal dump in Sverdlovo of Leningrad Oblast’ the main purpose of this article is to offer a possible option for the remediation of contaminated area.

  7. KEJAHATAN KERAH PUTIH (WHITE COLLAR CRIME TERHADAP ILLEGAL LOGGING DI SUMATERA UTARA

    Directory of Open Access Journals (Sweden)

    Muhammad R. Dayan

    2017-08-01

    Full Text Available Pemerintah membuat kebijakan terhadap tindak pidana Illegal logging disebabkan kegiatan illegal logging merupakan serangkaian tindakan penyimpangan perilaku yang berdampak kepada ekosistem secara berkelanjutan yang pada akhirnya berakibat dan membahayakan keberlangsungan hidup manusia. Sebagai suatu patokann (standar untuk menilai dan dikenakan sanksi pidana. Oleh karenya memerlukan penanggulangan baik secara preventif maupun represif. Pertanggungjawaban pelaku kejahatan kerah putih terhadap illegal logging adalah penerapan atas hukum yang meminta pertanggungjawaban pelaku tanpa membuktikan adanya unsur kesalahn atau adanya unsur kesalahan pada si pelaku tindak pidana. Hal ini disebabkan KUH Pidana mengandung unsur adanya asas mens rea (asas kesalahan dan tentang pertanggungjawbana pidana berorientasi kepada manusia atau orang bukan korporasi istilah “daad-dader straftrecht” artinya hukum pidana yang memperlihatkan segi-segi objektif dari “perbuatan” (daad dan juga segi-segi subjektif dari orang/pembuat (dader. Sifat hukum demikian akan menggambarkan keseimbangan antara kepentingan masyarakat dan kepentingan individu. Upaya penegakan hukum untuk menanggulangi kejahatan illegal logging adalah menggunakan perangkat undang-undang money laundering, hal ini disebabkan perangkat hukum memungkinkan actor intelektual yang mendanai kegiatan tersebut dapat terjerat oleh hukum. Oleh karenanya dalam tindak pidana pencucian uang adanya kerja sama antara Lembaga Penyedia Jasa Keuangan atas indikasi pencucian uang dan Pusat Pelapor dan Analisis Transaksi Keuangan (PPATK serta Penyidik (kepolisian dan Penuntut Umum.

  8. The Illegal Employment in Ukraine: What More Is to Be Done to Overcome It?

    Directory of Open Access Journals (Sweden)

    Shchetinina Ludmila V.

    2017-03-01

    Full Text Available The article considers consequences of proliferation of the illegal employment in Ukraine, which are classified by the levels of administration – international, macro, meso, micro, and personal level, further by the public institutions – the State employment service, system of compulsory social insurance, pension system, judiciary, trade unions etc. The article analyzes the legislative documents as to their contribution to unshadowing the employment and legalization of wages. It has been determined that employers that provide illegal employment can be subject to administrative responsibility, criminal liability, and penalties. But, despite the available demotivators towards the illegal employment in the national legislation, its volume remains significant. Therefore we suggest the following activities to be necessary: informing citizens about the legal liability for illegal employment, activation of bodies of the State supervision and monitoring of violations of labor laws as well as working groups on legalization of the payment of wages and employment.

  9. Peer-to-Peer Service Sharing Platforms

    DEFF Research Database (Denmark)

    Andersson, Magnus; Hjalmarsson, Anders; Avital, Michel

    2013-01-01

    The sharing economy has been growing continuously in the last decade thanks to the proliferation of internet-based platforms that allow people to disintermediate the traditional commercial channels and to share excess resources and trade with one another effectively at a reasonably low transaction...... cost. Whereas early peer-to-peer platforms were designed to enable file sharing and goods trading, we recently witness the emergence of a new breed of peer-to-peer platforms that are designed for ordinary service sharing. Ordinary services entail intangible provisions and are defined as an economic...... activity that generates immaterial benefits and does not result in ownership of material goods. Based on a structured analysis of 41 internet-based rideshare platforms, we explore and layout the unique characteristics of peer-to-peer service sharing platforms based on three distinct temporal patterns...

  10. “Don’t Let the Illegals Vote!”: The Myths of Illegal Latino Voters and Voter Fraud in Contested Local Immigrant Integration

    Directory of Open Access Journals (Sweden)

    Robert Courtney Smith

    2017-07-01

    Full Text Available This paper analyzes how the belief and fear by mostly older, white voters, politicians, and poll workers that “illegal” Latino immigrants were seeking to vote in local elections led to stigmatization of and discrimination against some Latino citizen voters in Port Chester, New York. Stoked by and closely echoing national voter ID law rhetoric, this fear fueled an “illegal Latino voter threat” narrative. This article documents how Port Chester’s leaders and citizens repeated this narrative in public life, sometimes enacting it in politics, including in voting. The resultant stigma denies Latino voters the presumed legitimacy other citizens enjoy, discrediting them in one word: illegal. Such processes harm democracy in Port Chester and America, and were on display in the 2016 presidential election.

  11. Spectrum Sharing Based on a Bertrand Game in Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Biqing Zeng

    2017-01-01

    Full Text Available In the study of power control and allocation based on pricing, the utility of secondary users is usually studied from the perspective of the signal to noise ratio. The study of secondary user utility from the perspective of communication demand can not only promote the secondary users to meet the maximum communication needs, but also to maximize the utilization of spectrum resources, however, research in this area is lacking, so from the viewpoint of meeting the demand of network communication, this paper designs a two stage model to solve spectrum leasing and allocation problem in cognitive radio sensor networks (CRSNs. In the first stage, the secondary base station collects the secondary network communication requirements, and rents spectrum resources from several primary base stations using the Bertrand game to model the transaction behavior of the primary base station and secondary base station. The second stage, the subcarriers and power allocation problem of secondary base stations is defined as a nonlinear programming problem to be solved based on Nash bargaining. The simulation results show that the proposed model can satisfy the communication requirements of each user in a fair and efficient way compared to other spectrum sharing schemes.

  12. Coyotes, Concessions and Construction Companies: Illegal Water Markets and Legally Constructed Water Scarcity in Central Mexico

    Directory of Open Access Journals (Sweden)

    Nadine Reis

    2014-10-01

    Full Text Available Many regions of (semiarid Mexico, such as the Valley of Toluca, face challenges due to rapid growth and the simultaneous overexploitation of groundwater. The water reform of the 1990s introduced individual water rights concessions granted through the National Water Commission (Comisión Nacional del Agua, or CONAGUA. Since then, acquiring new water rights in officially 'water-scarce' aquifers is only possible through official rights transmissions from users ceding their rights. With the law prohibiting the sale of water rights, a profitable illegal market for these rights has emerged. The key actor in the water rights allocation network is the coyote, functioning as a broker between a people wanting to cede water rights and those needing them, and b the formal and informal spheres of water rights allocation. Actors benefitting from water rights trading include the coyote and his 'working brigades', water users selling surplus rights, and (senior and lower-level staff in the water bureaucracy. The paper concludes that legally constructed water scarcity is key to the reproduction of illegal water rights trading. This has important implications regarding the current push for expanding regularisation of groundwater extraction in Mexico. Currently, regularisation does not counter overexploitation, while possibly leading to a de facto privatisation of groundwater.

  13. Conflict free network coding for distributed storage networks

    KAUST Repository

    Al-Habob, Ahmed A.; Sorour, Sameh; Aboutorab, Neda; Sadeghi, Parastoo

    2015-01-01

    © 2015 IEEE. In this paper, we design a conflict free instantly decodable network coding (IDNC) solution for file download from distributed storage servers. Considering previously downloaded files at the clients from these servers as side

  14. Remote Sensing Analysis Techniques and Sensor Requirements to Support the Mapping of Illegal Domestic Waste Disposal Sites in Queensland, Australia

    Directory of Open Access Journals (Sweden)

    Katharine Glanville

    2015-10-01

    Full Text Available Illegal disposal of waste is a significant management issue for contemporary governments with waste posing an economic, social, and environmental risk. An improved understanding of the distribution of illegal waste disposal sites is critical to enhance the cost-effectiveness and efficiency of waste management efforts. Remotely sensed data has the potential to address this knowledge gap. However, the literature regarding the use of remote sensing to map illegal waste disposal sites is incomplete. This paper aims to analyze existing remote sensing methods and sensors used to monitor and map illegal waste disposal sites. The purpose of this paper is to support the evaluation of existing remote sensing methods for mapping illegal domestic waste sites in Queensland, Australia. Recent advances in technology and the acquisition of very high-resolution remote sensing imagery provide an important opportunity to (1 revisit established analysis techniques for identifying illegal waste disposal sites, (2 examine the applicability of different remote sensors for illegal waste disposal detection, and (3 identify opportunities for future research to increase the accuracy of any illegal waste disposal mapping products.

  15. Energy economy: Federal network agency to the request of EnBW Trading for transformation of interruptible network use capacities into firm network use capacities; Energiewirtschaft: Bundesnetzagentur zum Antrag von EnBW Trading auf Umwandlung unterbrechbarer in feste Netznutzungskapazitaeten

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2006-07-15

    In the so-called ministerial permission from July / September 2002 the E.ON AG is permitted to adopt shares of the former Ruhrgas AG (today E.ON Ruhrgas AG, ERAG). The transformation of the duties in this ministerial permission led to law suites. Recently, the federal network agency had to decide on a petition of EnBW Trading GmbH (EnBW) against the E.ON Ruhrgas Transport AG and Co. KG (ERT). EnBW had requested a transformation interruptible network use capacities into firm network use capacities. The federal network agency has permitted this petition of EnBW with resolution from 5 May 2006 (file reference: BK7-06-008). In the following, the author describes the reasons of this decision in detail. However, this decision is not be valid in law. Therefore, ERT has appealed a complaint at the higher regional court Duesseldorf.

  16. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    Science.gov (United States)

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  17. Modeling Pedestrian’s Conformity Violation Behavior: A Complex Network Based Approach

    Directory of Open Access Journals (Sweden)

    Zhuping Zhou

    2014-01-01

    Full Text Available Pedestrian injuries and fatalities present a problem all over the world. Pedestrian conformity violation behaviors, which lead to many pedestrian crashes, are common phenomena at the signalized intersections in China. The concepts and metrics of complex networks are applied to analyze the structural characteristics and evolution rules of pedestrian network about the conformity violation crossings. First, a network of pedestrians crossing the street is established, and the network’s degree distributions are analyzed. Then, by using the basic idea of SI model, a spreading model of pedestrian illegal crossing behavior is proposed. Finally, through simulation analysis, pedestrian’s illegal crossing behavior trends are obtained in different network structures and different spreading rates. Some conclusions are drawn: as the waiting time increases, more pedestrians will join in the violation crossing once a pedestrian crosses on red firstly. And pedestrian’s conformity violation behavior will increase as the spreading rate increases.

  18. A framework to approach problems of forensic anthropology using complex networks

    Science.gov (United States)

    Caridi, Inés; Dorso, Claudio O.; Gallo, Pablo; Somigliana, Carlos

    2011-05-01

    We have developed a method to analyze and interpret emerging structures in a set of data which lacks some information. It has been conceived to be applied to the problem of getting information about people who disappeared in the Argentine state of Tucumán from 1974 to 1981. Even if the military dictatorship formally started in Argentina had begun in 1976 and lasted until 1983, the disappearance and assassination of people began some months earlier. During this period several circuits of Illegal Detention Centres (IDC) were set up in different locations all over the country. In these secret centres, disappeared people were illegally kept without any sort of constitutional guarantees, and later assassinated. Even today, the final destination of most of the disappeared people’s remains is still unknown. The fundamental hypothesis in this work is that a group of people with the same political affiliation whose disappearances were closely related in time and space shared the same place of captivity (the same IDC or circuit of IDCs). This hypothesis makes sense when applied to the systematic method of repression and disappearances which was actually launched in Tucumán, Argentina (2007) [11]. In this work, the missing individuals are identified as nodes on a network and connections are established among them based on the individuals’ attributes while they were alive, by using rules to link them. In order to determine which rules are the most effective in defining the network, we use other kind of knowledge available in this problem: previous results from the anthropological point of view (based on other sources of information, both oral and written, historical and anthropological data, etc.); and information about the place (one or more IDCs) where some people were kept during their captivity. For these best rules, a prediction about these people’s possible destination is assigned (one or more IDCs where they could have been kept), and the success of the

  19. IDENTITY FRAUD: Prevalence and Links to Alien Illegal Activities

    National Research Council Canada - National Science Library

    2002-01-01

    To discuss the significance of "identity fraud"-a term that encompasses a broad range of illegal activities based on fraudulent use of identifying information of a real person or of a fictitious person...

  20. Feathered Detectives: Real-Time GPS Tracking of Scavenging Gulls Pinpoints Illegal Waste Dumping.

    Directory of Open Access Journals (Sweden)

    Joan Navarro

    Full Text Available Urban waste impacts human and environmental health, and waste management has become one of the major challenges of humanity. Concurrently with new directives due to manage this human by-product, illegal dumping has become one of the most lucrative activities of organized crime. Beyond economic fraud, illegal waste disposal strongly enhances uncontrolled dissemination of human pathogens, pollutants and invasive species. Here, we demonstrate the potential of novel real-time GPS tracking of scavenging species to detect environmental crime. Specifically, we were able to detect illegal activities at an officially closed dump, which was visited recurrently by 5 of 19 GPS-tracked yellow-legged gulls (Larus michahellis. In comparison with conventional land-based surveys, GPS tracking allows a much wider and cost-efficient spatiotemporal coverage, even of the most hazardous sites, while GPS data accessibility through the internet enables rapid intervention. Our results suggest that multi-species guilds of feathered detectives equipped with GPS and cameras could help fight illegal dumping at continental scales. We encourage further experimental studies, to infer waste detection thresholds in gulls and other scavenging species exploiting human waste dumps.

  1. A system to build distributed multivariate models and manage disparate data sharing policies: implementation in the scalable national network for effectiveness research.

    Science.gov (United States)

    Meeker, Daniella; Jiang, Xiaoqian; Matheny, Michael E; Farcas, Claudiu; D'Arcy, Michel; Pearlman, Laura; Nookala, Lavanya; Day, Michele E; Kim, Katherine K; Kim, Hyeoneui; Boxwala, Aziz; El-Kareh, Robert; Kuo, Grace M; Resnic, Frederic S; Kesselman, Carl; Ohno-Machado, Lucila

    2015-11-01

    Centralized and federated models for sharing data in research networks currently exist. To build multivariate data analysis for centralized networks, transfer of patient-level data to a central computation resource is necessary. The authors implemented distributed multivariate models for federated networks in which patient-level data is kept at each site and data exchange policies are managed in a study-centric manner. The objective was to implement infrastructure that supports the functionality of some existing research networks (e.g., cohort discovery, workflow management, and estimation of multivariate analytic models on centralized data) while adding additional important new features, such as algorithms for distributed iterative multivariate models, a graphical interface for multivariate model specification, synchronous and asynchronous response to network queries, investigator-initiated studies, and study-based control of staff, protocols, and data sharing policies. Based on the requirements gathered from statisticians, administrators, and investigators from multiple institutions, the authors developed infrastructure and tools to support multisite comparative effectiveness studies using web services for multivariate statistical estimation in the SCANNER federated network. The authors implemented massively parallel (map-reduce) computation methods and a new policy management system to enable each study initiated by network participants to define the ways in which data may be processed, managed, queried, and shared. The authors illustrated the use of these systems among institutions with highly different policies and operating under different state laws. Federated research networks need not limit distributed query functionality to count queries, cohort discovery, or independently estimated analytic models. Multivariate analyses can be efficiently and securely conducted without patient-level data transport, allowing institutions with strict local data storage

  2. Applications of Coding in Network Communications

    Science.gov (United States)

    Chang, Christopher SungWook

    2012-01-01

    This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…

  3. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    4 KB of data is read or written, data is copied back and forth using trampoline buffers — pages that are shared during proxy initialization — because...in 2008. CIO Magazine. 104 · File system virtual appliances [64] Megiddo, N. and Modha, D. S. 2003. ARC: A Self-Tuning, Low Over- head Replacement

  4. Sharing clinical decisions for multimorbidity case management using social network and open-source tools.

    Science.gov (United States)

    Martínez-García, Alicia; Moreno-Conde, Alberto; Jódar-Sánchez, Francisco; Leal, Sandra; Parra, Carlos

    2013-12-01

    Social networks applied through Web 2.0 tools have gained importance in health domain, because they produce improvements on the communication and coordination capabilities among health professionals. This is highly relevant for multimorbidity patients care because there is a large number of health professionals in charge of patient care, and this requires to obtain clinical consensus in their decisions. Our objective is to develop a tool for collaborative work among health professionals for multimorbidity patient care. We describe the architecture to incorporate decision support functionalities in a social network tool to enable the adoption of shared decisions among health professionals from different care levels. As part of the first stage of the project, this paper describes the results obtained in a pilot study about acceptance and use of the social network component in our healthcare setting. At Virgen del Rocío University Hospital we have designed and developed the Shared Care Platform (SCP) to provide support in the continuity of care for multimorbidity patients. The SCP has two consecutively developed components: social network component, called Clinical Wall, and Clinical Decision Support (CDS) system. The Clinical Wall contains a record where health professionals are able to debate and define shared decisions. We conducted a pilot study to assess the use and acceptance of the SCP by healthcare professionals through questionnaire based on the theory of the Technology Acceptance Model. In March 2012 we released and deployed the SCP, but only with the social network component. The pilot project lasted 6 months in the hospital and 2 primary care centers. From March to September 2012 we created 16 records in the Clinical Wall, all with a high priority. A total of 10 professionals took part in the exchange of messages: 3 internists and 7 general practitioners generated 33 messages. 12 of the 16 record (75%) were answered by the destination health professionals

  5. Network node for peripheral sharing

    International Nuclear Information System (INIS)

    Bobbitt, J.; Johnson, M.

    1977-01-01

    A module which enables several independent computer systems to share the peripherals (graphics display and line printer) of a PDP-11 computer is described. The module requires no software support in the PDP-11

  6. Illegal trade of regulated and protected aquatic species in the Philippines detected by DNA barcoding.

    Science.gov (United States)

    Asis, Angelli Marie Jacynth M; Lacsamana, Joanne Krisha M; Santos, Mudjekeewis D

    2016-01-01

    Illegal trade has greatly affected marine fish stocks, decreasing fish populations worldwide. Despite having a number of aquatic species being regulated, illegal trade still persists through the transport of dried or processed products and juvenile species trafficking. In this regard, accurate species identification of illegally traded marine fish stocks by DNA barcoding is deemed to be a more efficient method in regulating and monitoring trade than by morphological means which is very difficult due to the absence of key morphological characters in juveniles and processed products. Here, live juvenile eels (elvers) and dried products of sharks and rays confiscated for illegal trade were identified. Twenty out of 23 (87%) randomly selected "elvers" were identified as Anguilla bicolor pacifica and 3 (13%) samples as Anguilla marmorata. On the other hand, 4 out of 11 (36%) of the randomly selected dried samples of sharks and rays were Manta birostris. The rest of the samples were identified as Alopias pelagicus, Taeniura meyeni, Carcharhinus falciformis, Himantura fai and Mobula japonica. These results confirm that wild juvenile eels and species of manta rays are still being caught in the country regardless of its protected status under Philippine and international laws. It is evident that the illegal trade of protected aquatic species is happening in the guise of dried or processed products thus the need to put emphasis on strengthening conservation measures. This study aims to underscore the importance of accurate species identification in such cases of illegal trade and the effectivity of DNA barcoding as a tool to do this.

  7. 10 CFR 707.13 - Medical review of results of tests for illegal drug use.

    Science.gov (United States)

    2010-01-01

    ... another test, performed by the gas chromatography/mass spectrometry method (GC/MS). This procedure is... 10 Energy 4 2010-01-01 2010-01-01 false Medical review of results of tests for illegal drug use... Procedures § 707.13 Medical review of results of tests for illegal drug use. (a) All test results shall be...

  8. Deceit: A flexible distributed file system

    Science.gov (United States)

    Siegel, Alex; Birman, Kenneth; Marzullo, Keith

    1989-01-01

    Deceit, a distributed file system (DFS) being developed at Cornell, focuses on flexible file semantics in relation to efficiency, scalability, and reliability. Deceit servers are interchangeable and collectively provide the illusion of a single, large server machine to any clients of the Deceit service. Non-volatile replicas of each file are stored on a subset of the file servers. The user is able to set parameters on a file to achieve different levels of availability, performance, and one-copy serializability. Deceit also supports a file version control mechanism. In contrast with many recent DFS efforts, Deceit can behave like a plain Sun Network File System (NFS) server and can be used by any NFS client without modifying any client software. The current Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management, an approach that reduces system complexity and increases system robustness.

  9. Network analysis for the visualization and analysis of qualitative data.

    Science.gov (United States)

    Pokorny, Jennifer J; Norman, Alex; Zanesco, Anthony P; Bauer-Wu, Susan; Sahdra, Baljinder K; Saron, Clifford D

    2018-03-01

    We present a novel manner in which to visualize the coding of qualitative data that enables representation and analysis of connections between codes using graph theory and network analysis. Network graphs are created from codes applied to a transcript or audio file using the code names and their chronological location. The resulting network is a representation of the coding data that characterizes the interrelations of codes. This approach enables quantification of qualitative codes using network analysis and facilitates examination of associations of network indices with other quantitative variables using common statistical procedures. Here, as a proof of concept, we applied this method to a set of interview transcripts that had been coded in 2 different ways and the resultant network graphs were examined. The creation of network graphs allows researchers an opportunity to view and share their qualitative data in an innovative way that may provide new insights and enhance transparency of the analytical process by which they reach their conclusions. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  10. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  11. Illegal Immigration: Is It a Threat To National Security

    National Research Council Canada - National Science Library

    Smith, III, Luther B

    2006-01-01

    .... borders without benefit of government oversight or control. On the positive side illegal immigrants provided pools of unskilled and semi-skilled labor to fuel growth in the American service-based economy over the last fifteen years...

  12. "Graduated Response Policy and the Behavior of Digital Pirates: Evidence from the French Three-Strike (Hadopi) Law"

    OpenAIRE

    MICHAEL ARNOLD; ERIC DARMON; SYLVAIN DEJEAN; THIERRY PENARD

    2014-01-01

    Most developed countries have tried to restrain digital piracy by strength- ening laws against copyright infringement. In 2009, France implemented the Hadopi law. Under this law individuals receive a warning the first two times they are detected illegally sharing content through peer to peer (P2P) networks. Legal action is only taken when a third violation is detected. We analyze the impact of this law on individual behavior. Our theoretical model of illegal be- havior under a graduated respo...

  13. The development and achievement of a healthy cities network in Taiwan: sharing leadership and partnership building.

    Science.gov (United States)

    Hu, Susan C; Kuo, Hsien-Wen

    2016-03-01

    The World Health Organization (WHO) Healthy Cities (HC) projects are the best known of the settings-based approaches to health promotion. They engage local governments in health development through a process of political commitment, institutional change, capacity-building, partnership-based planning and innovative projects. Many cities have promoted HC projects in Taiwan since 2002. In 2008, the Taiwan Alliance for Healthy Cities (TAHC) was launched to assist local governments in effectively establishing, operating and promoting HC projects. In this article, we share our experiences of establishing a platform and network to promote the HC program in Taiwan. Based on individual city profiles and governance in Taiwan, the TAHC developed a well-organized framework and model to encourage strong leadership in local governments and to promote participation and engagement in their communities. In the last 6 years, leaders from Taiwan's local governments in HC networks have integrated the HC concepts into their governance models, actively engaging and combining various resources with practical expertise and private sectors. The network of health in Taiwan allows each city to develop its unique perspective on the HC projects. Using this method, not only local government meets its needs, but also increases governance efficiency and effectiveness, resulting in the promotion of its citizens' overall sustainable urban health development. This HC network in Taiwan has partnerships with government and non-governmental organizations (NGOs), with academic support and citizen involvement, a dynamic data collection system and demonstrated leadership in the sharing of information in the Asian region. © The Author(s) 2016.

  14. Microsoft Office SharePoint Designer 2007 Step by Step

    CERN Document Server

    Coventry, Penelope

    2008-01-01

    The smart way to learn Office SharePoint Designer 2007-one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting tips to master the fundamentals of building customized SharePoint sites and applications. You'll learn how to work with Windows® SharePoint Services 3.0 and Office SharePoint Server 2007 to create Web pages complete with Cascading Style Sheets, Lists, Libraries, and customized Web parts. Then, make your site really work for you by adding data sources, including databases, XML data and Web services, and RSS fe

  15. Illegal dumping and crime prevention: A case study of Ash Road, Liverpool Council

    OpenAIRE

    Crofts, Penny; Morris, Tara; Wells, Kim; Powell, Alicia

    2010-01-01

    Illegal waste disposal is an increasingly significant and costly problem. This paper considers a specific hot-spot for illegal dumping in Sydney, Australia from criminological perspectives. We contribute to the developing criminological literature that considers environmental harms as a crime. This draws upon the symbolic aspect of criminal law, contributing to the notion of environmental harms as wrongs worthy of sanction, and facilitates analysis through the prism of criminological literatu...

  16. Computer Security: a plea to Santa Claus

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    Running pirated software or illegal licences, using cracking tools to bypass software activation measures, sharing music and films – these are problems that academic environments unfortunately have to deal with. All violate the copyright of the software/music/film owners, and copyright owners are not Santa Claus...    CERN, like other research organisations and universities, regularly receives allegations from external companies complaining about laptops or PCs running illegal software or sharing their films, videos or music with peers – and thus violating copyright.  Usually, we then contact the owners of the corresponding devices in order to understand whether these allegations are true. Very often such allegations boil down to a laptop whose owner replies “I confirm that a torrent client was left up and running on my device by mistake” or “This is a file that is stored on my personal hard disk.” As if those allegatio...

  17. Sharing Keynote Slideshows

    CERN Document Server

    Clark, Josh

    2010-01-01

    Slideshows have come a long way since overhead projectors were your only option. You can show share your ideas with the world via email, DVD, PDF, YouTube, iPhone, or kiosk. Once your show is polished to perfection, this thorough, accessible guide shows you how to export and deliver it all possible ways-even as a PowerPoint file, QuickTime movie, or web site. As a bonus, you'll find advice on setting up your equipment and delivering an effective presentation.

  18. Client and clinician-rated characteristics of problem gamblers with and without history of gambling-related illegal behaviors.

    Science.gov (United States)

    Ellis, Jennifer D; Lister, Jamey J; Struble, Cara A; Cairncross, Molly; Carr, Meagan M; Ledgerwood, David M

    2018-03-12

    Individuals with gambling disorder are at an elevated risk for engaging in gambling-related illegal behaviors. The present study examined client (N = 88) and clinician ratings (N = 30) of client characteristics associated with a history of gambling-related illegal behaviors. We also examined client characteristics associated with history of arrest for a gambling-related crime. Gambling-related illegal behaviors and arrest were common (57.3% and 23.9%, respectively) in the present sample. Clients of younger age, and those with greater gambling-related financial consequences, lifetime alcohol problems, impulsivity, mood symptoms, and daily living role difficulties were more likely to report gambling-related illegal behaviors. Clients who had been arrested for a gambling-related crime were more likely to report daily living and role functioning difficulties and lifetime alcohol problems. Clinicians rated clients with a history of gambling-related illegal behaviors and/or gambling-related arrests as more impulsive, and clinicians also endorsed higher rates of treatment failure among these clients. Both client and clinician report suggested that clients with a history of illegal behaviors may have a variety of comorbid problems that may be a focus of clinical intervention. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. The Immigration Challenge: The Use of U.S. Military Force to Control Illegal Immigration from Mexico

    National Research Council Canada - National Science Library

    Grissom, Bruce

    1997-01-01

    Controlling illegal immigration into the United States has become a major issue in U.S. politics. A February 1997 report released by the INS estimates that there are currently 5 million illegal aliens in the United States...

  20. United Network for Organ Sharing

    Science.gov (United States)

    ... donor families & recipients Organ donation facts Policy Policy development Policy brochures Membership Data Transplant trends Data resources Technology Get Involved EDUCATE Become a UNOS Ambassador Promote organ donation Share through social media VISIT Attend a UNOS event Tour the National ...

  1. Economics of Illegal Work and Illegal Workers (Immigrants: Are They Protected under South African Labour Law and the Constitution, 1996?

    Directory of Open Access Journals (Sweden)

    Mashele Rapatsa

    2015-12-01

    Full Text Available This article analyses whether prostitution (illegal work and illegal immigrants have access to the protective ambits of statutory framework regulating employment relations. Its objective is to examine the scope of labour law, considerate of ever changing trends in the modern world of work. It utilizes the two notable precedents founded in Kylie v CCMA and Discovery Health v CCMA. This is considerate of inherent dynamics in contemporary labour relations where the majority of workers have been displaced into grey areas that offer little or no protection, thus rendering workers vulnerable to exploitation. The article highlights a rising tension arising out of exploitative labour practices and socio-economic factors, and the need for labour law to respond. It has been found that courts have creatively invented strategic methods that have successfully aided efforts of protecting vulnerable workers engaged in economic activities under precarious circumstances. This is to the extent that the Constitution, 1996 and the Labour Relations Act 66 of 1995 have been interpreted in a manner that enhances worker protection, which fulfils the purpose for which labour law was enacted.

  2. The Value Added Tax Implications of Illegal Transactions

    African Journals Online (AJOL)

    user

    that "enterprises" conducting their business by illegal means should register as VAT vendors? ..... The issue confronting the courts was the maxim ex turpi causa non oritur actio in ...... Applying the principles of tax neutrality creating a moral dilemma? .... William Collins and Sons Co Ltd Collins English Dictionary 6 th ed.

  3. Monkey business : the illegal trade in Barbary macaques

    NARCIS (Netherlands)

    van Uhm, D.P.|info:eu-repo/dai/nl/380477025

    2016-01-01

    This article focuses on the organization, modus operandi and trade route of the illegal trade in Barbary macaques. The Barbary macaque is the most seized CITES mammal in the EU, accounting for almost 25% of live mammalrelated seizures. It is estimated that as few as 5,000-6,000 Barbary macaques

  4. Shared genetic regulatory networks for cardiovascular disease and type 2 diabetes in multiple populations of diverse ethnicities in the United States.

    Directory of Open Access Journals (Sweden)

    Le Shu

    2017-09-01

    Full Text Available Cardiovascular diseases (CVD and type 2 diabetes (T2D are closely interrelated complex diseases likely sharing overlapping pathogenesis driven by aberrant activities in gene networks. However, the molecular circuitries underlying the pathogenic commonalities remain poorly understood. We sought to identify the shared gene networks and their key intervening drivers for both CVD and T2D by conducting a comprehensive integrative analysis driven by five multi-ethnic genome-wide association studies (GWAS for CVD and T2D, expression quantitative trait loci (eQTLs, ENCODE, and tissue-specific gene network models (both co-expression and graphical models from CVD and T2D relevant tissues. We identified pathways regulating the metabolism of lipids, glucose, and branched-chain amino acids, along with those governing oxidation, extracellular matrix, immune response, and neuronal system as shared pathogenic processes for both diseases. Further, we uncovered 15 key drivers including HMGCR, CAV1, IGF1 and PCOLCE, whose network neighbors collectively account for approximately 35% of known GWAS hits for CVD and 22% for T2D. Finally, we cross-validated the regulatory role of the top key drivers using in vitro siRNA knockdown, in vivo gene knockout, and two Hybrid Mouse Diversity Panels each comprised of >100 strains. Findings from this in-depth assessment of genetic and functional data from multiple human cohorts provide strong support that common sets of tissue-specific molecular networks drive the pathogenesis of both CVD and T2D across ethnicities and help prioritize new therapeutic avenues for both CVD and T2D.

  5. Regulating the sharing economy

    OpenAIRE

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  6. Knowledge sharing in infection prevention in routine and outbreak situations: a survey of the Society for Healthcare Epidemiology of America Research Network

    Directory of Open Access Journals (Sweden)

    Rami Sommerstein

    2017-08-01

    Full Text Available Abstract In this cross-sectional Society for Healthcare Epidemiology of America Research Network survey on knowledge sharing in infection prevention we identified a rudimentary understanding of how to communicate and share knowledge within healthcare institutions. Our data support the need of further research in this important field.

  7. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  8. MUNICIPAL SOLID WASTE ILLEGAL DUMPING AND IT’S SPATIAL AUTOREGRESSION: THE CASE OF THE REPUBLIC OF KOREA

    Directory of Open Access Journals (Sweden)

    Youngjae Chang

    2016-11-01

    Full Text Available We reviewed the data pertaining to the illegal dumping of municipal solid waste in the Republic of Korea for the year 2011 to check for the presence of spatial autoregression of illegal dumping among 224 basic autonomous units with reference to the “Broken Windows Theory.” We found that a pure neighborhood effect exists even after controlling for conventional variables that explain illegal dumping behavior. Interestingly, however, the neighborhood effect is largely offset by so-called relative price effect such that the number of illegal dumping reported in one region is in fact decreased as the price of vinyl bag for MSW in neighboring regions increases, which is seemingly against the implication of the “Broken Windows Theory.”

  9. 32 CFR 228.9 - Prohibition on narcotics and illegal substances.

    Science.gov (United States)

    2010-07-01

    ... DEFENSE (CONTINUED) MISCELLANEOUS SECURITY PROTECTIVE FORCE § 228.9 Prohibition on narcotics and illegal... cases where the drug is being used as prescribed for a patient by a licensed physician. ...

  10. Image File - TP Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available ption of data contents Network diagrams (in PNG format) for each project. One project has one pathway file o...List Contact us TP Atlas Image File Data detail Data name Image File DOI 10.18908/lsdba.nbdc01161-004 Descri

  11. Wilhelm Reich's self-censorship after his arrest as an enemy alien: the chilling effect of an illegal imprisonment.

    Science.gov (United States)

    Bennett, Philip W

    2014-04-01

    After discussing Wilhelm Reich's place in psychoanalysis, the article explores his arrest as an 'enemy alien' in December 1941. Reich's emotional responses to his imprisonment (which was illegal and which lasted nearly a month) are explored. A number of scholars have suggested that many European radical psychoanalysts refrained from sharing their former political ideas once they emigrated to the United States. Following a brief discussion of this pattern of 'silencing,' it is argued that Reich's withholding certain documents from publication was due to a self-imposed censorship, motivated in part by the fear of further governmental interference with his life and work. This fear, however, did not extend to his discussion of his newly developed theory of orgone energy. Copyright © 2014 Institute of Psychoanalysis.

  12. Cross-layer shared protection strategy towards data plane in software defined optical networks

    Science.gov (United States)

    Xiong, Yu; Li, Zhiqiang; Zhou, Bin; Dong, Xiancun

    2018-04-01

    In order to ensure reliable data transmission on the data plane and minimize resource consumption, a novel protection strategy towards data plane is proposed in software defined optical networks (SDON). Firstly, we establish a SDON architecture with hierarchical structure of data plane, which divides the data plane into four layers for getting fine-grained bandwidth resource. Then, we design the cross-layer routing and resource allocation based on this network architecture. Through jointly considering the bandwidth resource on all the layers, the SDN controller could allocate bandwidth resource to working path and backup path in an economical manner. Next, we construct auxiliary graphs and transform the shared protection problem into the graph vertex coloring problem. Therefore, the resource consumption on backup paths can be reduced further. The simulation results demonstrate that the proposed protection strategy can achieve lower protection overhead and higher resource utilization ratio.

  13. A Comparative Analysis of Social Media Marketing by Transportation Network Companies in the Sharing Economy

    OpenAIRE

    Heymans, Alice

    2017-01-01

    The sharing economy is a new business model rapidly expanding. In transportation, many people use innovative services proposed by ride-hailing mobile applications. These technological platforms, operated by networking companies, rely extensively on social media to promote their services, and reach new customers (riders) and providers (drivers). This dissertation focuses on e-marketing communication. It makes a comparative analysis of the information published on several social media (Facebook...

  14. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  15. Distributing File-Based Data to Remote Sites Within the BABAR Collaboration

    International Nuclear Information System (INIS)

    Gowdy, Stephen J.

    2002-01-01

    BABAR [1] uses two formats for its data: Objectivity database and root [2] files. This poster concerns the distribution of the latter--for Objectivity data see [3]. The BABAR analysis data is stored in root files--one per physics run and analysis selection channel--maintained in a large directory tree. Currently BABAR has more than 4.5 TBytes in 200,000 root files. This data is (mostly) produced at SLAC, but is required for analysis at universities and research centers throughout the us and Europe. Two basic problems confront us when we seek to import bulk data from slac to an institute's local storage via the network. We must determine which files must be imported (depending on the local site requirements and which files have already been imported), and we must make the optimum use of the network when transferring the data. Basic ftp-like tools (ftp, scp, etc) do not attempt to solve the first problem. More sophisticated tools like rsync [4], the widely-used mirror/synchronization program, compare local and remote file systems, checking for changes (based on file date, size and, if desired, an elaborate checksum) in order to only copy new or modified files. However rsync allows for only limited file selection. Also when, as in BABAR, an extremely large directory structure must be scanned, rsync can take several hours just to determine which files need to be copied. Although rsync (and scp) provides on-the-fly compression, it does not allow us to optimize the network transfer by using multiple streams, adjusting the tcp window size, or separating encrypted authentication from unencrypted data channels

  16. Distributing file-based data to remote sites within the BABAR collaboration

    International Nuclear Information System (INIS)

    Adye, T.; Dorigo, A.; Forti, A.; Leonardi, E.

    2001-01-01

    BABAR uses two formats for its data: Objectivity database and ROOT files. This poster concerns the distribution of the latter--for Objectivity data see. The BABAR analysis data is stored in ROOT files--one per physics run and analysis selection channel-maintained in a large directory tree. Currently BABAR has more than 4.5 TBytes in 200,00- ROOT files. This data is (mostly) produced at SLAC, but is required for analysis at universities and research centres throughout the US and Europe. Two basic problems confront us when we seek to import bulk data from SLAC to an institute's local storage via the network. We must determine which files must be imported (depending on the local site requirements and which files have already been imported), and the authors must make the optimum use of the network when transferring the data. Basic ftp-like tools (ftp, scp, etc) do not attempt to solve the first problem. More sophisticated tools like rsync, the widely-used mirror/synchronisation program, compare local and remote file systems, checking for changes (based on file date, size and, if desired, an elaborate checksum) in order to only copy new or modified files. However rsync allows for only limited file selection. Also when, as in BABAR, an extremely large directory structure must be scanned, rsync can take several hours just to determine which files need to be copied. Although rsync (and scp) provides on-the-fly compression, it does not allow us to optimise the network transfer by using multiple streams, adjusting the TCP window size, or separating encrypted authentication from unencrypted data channels

  17. Shared-resource computing for small research labs.

    Science.gov (United States)

    Ackerman, M J

    1982-04-01

    A real time laboratory computer network is described. This network is composed of four real-time laboratory minicomputers located in each of four division laboratories and a larger minicomputer in a centrally located computer room. Off the shelf hardware and software were used with no customization. The network is configured for resource sharing using DECnet communications software and the RSX-11-M multi-user real-time operating system. The cost effectiveness of the shared resource network and multiple real-time processing using priority scheduling is discussed. Examples of utilization within a medical research department are given.

  18. Integrating market share models with network optimizing models for strategic planning in an oil pipeline company

    International Nuclear Information System (INIS)

    Smith, L.D.; Moses, S.W.

    1991-01-01

    Mathematical models of market share are constructed to describe the distribution of petroleum products from pipeline terminals, water terminals and refineries in the midcontinental United States. Network distribution models are developed to analyse the constraints and economics of alternative distribution systems. This paper describes how the two types of models were integrated for strategic planning in an oil pipeline company

  19. 78 FR 28210 - Combined Notice of Filings #1

    Science.gov (United States)

    2013-05-14

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings 1 Take notice... Company of New Mexico. Description: City of Gallup Network Integration Transmission Service Agreement to..., Section III--Distribution of Revenues to be effective 7/1/2013. Filed Date: 4/30/13. Accession Number...

  20. Games of corruption: how to suppress illegal logging.

    Science.gov (United States)

    Lee, Joung-Hun; Sigmund, Karl; Dieckmann, Ulf; Iwasa, Yoh

    2015-02-21

    Corruption is one of the most serious obstacles for ecosystem management and biodiversity conservation. In particular, more than half of the loss of forested area in many tropical countries is due to illegal logging, with corruption implicated in a lack of enforcement. Here we study an evolutionary game model to analyze the illegal harvesting of forest trees, coupled with the corruption of rule enforcers. We consider several types of harvesters, who may or may not be committed towards supporting an enforcer service, and who may cooperate (log legally) or defect (log illegally). We also consider two types of rule enforcers, honest and corrupt: while honest enforcers fulfill their function, corrupt enforcers accept bribes from defecting harvesters and refrain from fining them. We report three key findings. First, in the absence of strategy exploration, the harvester-enforcer dynamics are bistable: one continuum of equilibria consists of defecting harvesters and a low fraction of honest enforcers, while another consists of cooperating harvesters and a high fraction of honest enforcers. Both continua attract nearby strategy mixtures. Second, even a small rate of strategy exploration removes this bistability, rendering one of the outcomes globally stable. It is the relative rate of exploration among enforcers that then determines whether most harvesters cooperate or defect and most enforcers are honest or corrupt, respectively. This suggests that the education of enforcers, causing their more frequent trialing of honest conduct, can be a potent means of curbing corruption. Third, if information on corrupt enforcers is available, and players react opportunistically to it, the domain of attraction of cooperative outcomes widens considerably. We conclude by discussing policy implications of our results. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Understanding today’s music acquisition mix: a latent class analysis of consumers’ combined use of music platforms

    OpenAIRE

    Weijters, Bert; Goedertier, Frank

    2016-01-01

    In response to diversifying music delivery modes, consumers increasingly combine various music platforms, both online and offline, legal and illegal, and free or paying. Based on survey data (N = 685), the current study segments consumers in terms of the combination of music delivery modes they use. We identify four latent classes based on their usage frequency of purchasing CDs, copying CDs, streaming music, streaming music videos, peer-to-peer file sharing, and purchased downloading. All-ro...

  2. A creative industry in transition: the rise of digitally driven independent music production

    OpenAIRE

    Hracs, B.J.

    2012-01-01

    This paper nuances our understanding of the ongoing transition within the North American music industry. It extends the existing analysis of the so-called “MP3 Crisis” by exploring the ways in which digital technologies have challenged the entrenched power of the major record labels. In particular, new insights are offered based on interviews with music industry executives who have been active in shaping the industry's response to illegal file sharing. The paper also uses interview data from ...

  3. RAMA: A file system for massively parallel computers

    Science.gov (United States)

    Miller, Ethan L.; Katz, Randy H.

    1993-01-01

    This paper describes a file system design for massively parallel computers which makes very efficient use of a few disks per processor. This overcomes the traditional I/O bottleneck of massively parallel machines by storing the data on disks within the high-speed interconnection network. In addition, the file system, called RAMA, requires little inter-node synchronization, removing another common bottleneck in parallel processor file systems. Support for a large tertiary storage system can easily be integrated in lo the file system; in fact, RAMA runs most efficiently when tertiary storage is used.

  4. Adaptive multi-channel downlink assignment for overloaded spectrum-shared multi-antenna overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud

    2012-10-19

    Overlaid cellular technology has been considered as a promising candidate to enhance the capacity and extend the coverage of cellular networks, particularly indoors. The deployment of small cells (e.g. femtocells and/or picocells) in an overlaid setup is expected to reduce the operational power and to function satisfactorily with the existing cellular architecture. Among the possible deployments of small-cell access points is to manage many of them to serve specific spatial locations, while reusing the available spectrum universally. This contribution considers the aforementioned scenario with the objective to serve as many active users as possible when the available downlink spectrum is overloaded. The case study is motivated by the importance of realizing universal resource sharing in overlaid networks, while reducing the load of distributing available resources, satisfying downlink multi-channel assignment, controlling the aggregate level of interference, and maintaining desired design/operation requirements. These objectives need to be achieved in distributed manner in each spatial space with as low processing load as possible when the feedback links are capacity-limited, multiple small-cell access points can be shared, and data exchange between access points can not be coordinated. This contribution is summarized as follows. An adaptive downlink multi-channel assignment scheme when multiple co-channel and shared small-cell access points are allocated to serve active users is proposed. It is assumed that the deployed access points employ isotropic antenna arrays of arbitrary sizes, operate using the open-access strategy, and transmit on shared physical channels simultaneously. Moreover, each active user can be served by a single transmit channel per each access point at a time, and can sense the concurrent interference level associated with each transmit antenna channel non-coherently. The proposed scheme aims to identify a suitable subset of transmit channels

  5. Challenges to Participation in the Sharing Economy: The Case of Local Online Peer-to-Peer Exchange in a Single Parents’ Network

    Directory of Open Access Journals (Sweden)

    Airi Lampinen

    2015-05-01

    Full Text Available This paper depicts an initiative to deploy an online peer-to-peer exchange system for a community network of single parents – a group of people in need of goods, services, and social support in their local neighborhoods. We apply participant observation and semi-structured interviews to uncover key issues that can hinder the emergence of sharing practices in local community networks of this type. Our study illustrates how pressures related to single parenthood can impede opportunities to engage in peer-to-peer exchange, even when community members view the social and material benefits of participation as desirable and necessary. This complicates the prevalent narrative that local peer-to-peer exchange systems are an accessible and convenient alternative to traditional markets. Moreover, we discuss our collaboration with the community as well as the developers of the sharing platform, highlighting the challenges of user-centered design in the sharing economy.

  6. Nontargeted Screening Method for Illegal Additives Based on Ultrahigh-Performance Liquid Chromatography-High-Resolution Mass Spectrometry.

    Science.gov (United States)

    Fu, Yanqing; Zhou, Zhihui; Kong, Hongwei; Lu, Xin; Zhao, Xinjie; Chen, Yihui; Chen, Jia; Wu, Zeming; Xu, Zhiliang; Zhao, Chunxia; Xu, Guowang

    2016-09-06

    Identification of illegal additives in complex matrixes is important in the food safety field. In this study a nontargeted screening strategy was developed to find illegal additives based on ultrahigh-performance liquid chromatography-high-resolution mass spectrometry (UHPLC-HRMS). First, an analytical method for possible illegal additives in complex matrixes was established including fast sample pretreatment, accurate UHPLC separation, and HRMS detection. Second, efficient data processing and differential analysis workflow were suggested and applied to find potential risk compounds. Third, structure elucidation of risk compounds was performed by (1) searching online databases [Metlin and the Human Metabolome Database (HMDB)] and an in-house database which was established at the above-defined conditions of UHPLC-HRMS analysis and contains information on retention time, mass spectra (MS), and tandem mass spectra (MS/MS) of 475 illegal additives, (2) analyzing fragment ions, and (3) referring to fragmentation rules. Fish was taken as an example to show the usefulness of the nontargeted screening strategy, and six additives were found in suspected fish samples. Quantitative analysis was further carried out to determine the contents of these compounds. The satisfactory application of this strategy in fish samples means that it can also be used in the screening of illegal additives in other kinds of food samples.

  7. Connecting Pills and People

    DEFF Research Database (Denmark)

    Seeberg, Jens

    2012-01-01

    aggressively, including through illegal channels. Discussion: The private health market is organized in small “network molecules” that maximize profit at the cost of health. The large private share of health care in India and stiff competition are detrimental for primary care in urban India. Free government...

  8. Music2Share - Copyright-Compliant Music Sharing in P2P Systems

    NARCIS (Netherlands)

    Kalker, Ton; Epema, Dick H.J.; Hartel, Pieter H.; Lagendijk, R. (Inald) L.; van Steen, Martinus Richardus; van Steen, Maarten

    Peer-to-Peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  9. Music2Share --- Copyright-Compliant Music Sharing in P2P Systems

    NARCIS (Netherlands)

    Kalker, T.; Epema, D.; Hartel, P.; Lagendijk, I.; van Steen, M.R.

    2004-01-01

    Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  10. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  11. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  12. PowerPivot for Business Intelligence Using Excel and SharePoint

    CERN Document Server

    Ralston, Barry

    2011-01-01

    PowerPivot comprises a set of technologies for easy access to data mining and business intelligence analysis from Microsoft Excel and SharePoint. Power users and developers alike can create sophisticated, online analytic processing (OLAP) solutions using PowerPivot for Excel, and then share those solutions with other users via PowerPivot for SharePoint. Data can be pulled in from any of the leading database platforms, as well as from spreadsheets and flat files. PowerPivot for Business Intelligence Using Excel and SharePoint is your key to mastering PowerPivot. The book takes a scenario-based

  13. Entropy based file type identification and partitioning

    Science.gov (United States)

    2017-06-01

    energy spectrum,” Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, pp. 288–293, 2016...ABBREVIATIONS AES Advanced Encryption Standard ANN Artificial Neural Network ASCII American Standard Code for Information Interchange CWT...the identification of file types and file partitioning. This approach has applications in cybersecurity as it allows for a quick determination of

  14. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  15. Implementing an SMB2 Server in the Vortex Operating System

    OpenAIRE

    Sandengen, Vegard

    2015-01-01

    With the advent of computer networks, the ability for sharing and accessing files across the network between multiple workstations and remote servers was sought after. In the nineteen eighties, prominent networked file systems were developed and reached widespread adoption among enterprise businesses and institutions. A few of these, notably Networked File System (NFS) and Server Message Block (SMB), survived the transition into the Internet era and the successors of these protocols remain th...

  16. The role of the illegality factor in the taxation of income. Part II

    OpenAIRE

    Čerka, Paulius; Gudynienė, Lina

    2012-01-01

    The taxation of illegal income is quite common in many foreign countries, but this practice is not yet applicable in Lithuania, though the recent movements of Lithuania’s Finance Minister, when she admitted that all income should be taxed despite it’s source show her positive attitude towards the taxation of illegal income. The article promotes the idea that all personal income, despite its source, should be taxed.The article is divided into two parts: the first one, which is not published he...

  17. Discursive Representations of Asylum Seekers and Illegal Immigrants in Ireland

    Directory of Open Access Journals (Sweden)

    Elaine Burroughs

    2013-12-01

    Full Text Available Migrants are often referred to as an all encompassing group of people and the “many faces of migration”, the variety of people, legalities and complexities involved, can be overlooked. The same can be said for non-EU migrants in the Irish context. Non-EU migrants (or those that are not Caucasian are generally viewed to be a distinct cohort of comparable migrants. Indeed, these migrants are often portrayed in a broadly negative way by key Irish institutions (such as the parliament or the media, and these representations impact upon how Irish society views non-EU migration and indeed migration in general. While Ireland is by no means the only European country in which this type of practice occurs, this paper aims to draw attention to generalized, inaccurate and misleading representations of non-EU migrants in Ireland, by specifically examining representations of asylum seekers and illegal immigrants. There can be an overlap in how these “types” of migrants are conceptualized and this paper therefore aims to develop an understanding of the implications involved for migrants categorized as an “asylum seeker” or an “illegal immigrant.” Furthermore, these topics are under-researched within the Irish context, yet they receive much political and public attention. At the same time however, this paper aims to challenge the labels assigned to non-EU migrants and the terminology that is used to define their identity so concretely. In the Irish context there is much confusion in relation to the multiple “faces” of non-EU migration, as a range of terminology is used to refer to them. This terminology is often used in an interchangeable manner, in an array of societal contexts. There is a consistent (whether this happens intentionally or unintentionally is debatable misuse of categories and migration terminology in Irish institutional discourses. Quite often those seeking asylum are referred to as illegal immigrants and vice versa

  18. Fair-share scheduling algorithm for a tertiary storage system

    International Nuclear Information System (INIS)

    Jakl, Pavel; Sumbera, Michal; Lauret, Jerome

    2010-01-01

    Any experiment facing Peta bytes scale problems is in need for a highly scalable mass storage system (MSS) to keep a permanent copy of their valuable data. But beyond the permanent storage aspects, the sheer amount of data makes complete data-set availability onto live storage (centralized or aggregated space such as the one provided by Scalla/Xrootd) cost prohibitive implying that a dynamic population from MSS to faster storage is needed. One of the most challenging aspects of dealing with MSS is the robotic tape component. If a robotic system is used as the primary storage solution, the intrinsically long access times (latencies) can dramatically affect the overall performance. To speed the retrieval of such data, one could organize the requests according to criterion with an aim to deliver maximal data throughput. However, such approaches are often orthogonal to fair resource allocation and a trade-off between quality of service, responsiveness and throughput is necessary for achieving an optimal and practical implementation of a truly faire-share oriented file restore policy. Starting from an explanation of the key criterion of such a policy, we will present evaluations and comparisons of three different MSS file restoration algorithms which meet fair-share requirements, and discuss their respective merits. We will quantify their impact on a typical file restoration cycle for the RHIC/STAR experimental setup and this, within a development, analysis and production environment relying on a shared MSS service [1].

  19. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  20. 25 CFR 166.814 - How will the BIA determine the value of the products or property illegally used or removed?

    Science.gov (United States)

    2010-04-01

    ... the BIA determine the value of the products or property illegally used or removed? We will determine the value of the products or property illegally used or removed based upon a valuation of similar... property illegally used or removed? 166.814 Section 166.814 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF...

  1. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  2. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  3. Network traffic anomaly prediction using Artificial Neural Network

    Science.gov (United States)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  4. 24 CFR 266.626 - Notice of default and filing an insurance claim.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Notice of default and filing an... AND OTHER AUTHORITIES HOUSING FINANCE AGENCY RISK-SHARING PROGRAM FOR INSURED AFFORDABLE MULTIFAMILY PROJECT LOANS Contract Rights and Obligations Claim Procedures § 266.626 Notice of default and filing an...

  5. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  6. The Role of Family Experiences for Adolescents' Readiness to Use and Participate in Illegal Political Activity

    Science.gov (United States)

    Glatz, Terese; Dahl, Viktor

    2016-01-01

    This study used reactance theory as a starting point to explain what role a perceived undemocratic and controlling family has for adolescents' readiness to use illegal political activity. Additionally, we examined whether adolescents' readiness to use illegal political means was related to actual political behaviour, which has been lacking in…

  7. DataSync - sharing data via filesystem

    Science.gov (United States)

    Ulbricht, Damian; Klump, Jens

    2014-05-01

    Usually research work is a cycle of to hypothesize, to collect data, to corroborate the hypothesis, and finally to publish the results. In this sequence there are possibilities to base the own work on the work of others. Maybe there are candidates of physical samples listed in the IGSN-Registry and there is no need to go on excursion to acquire physical samples. Hopefully the DataCite catalogue lists already metadata of datasets that meet the constraints of the hypothesis and that are now open for reappraisal. After all, working with the measured data to corroborate the hypothesis involves new methods, and proven methods as well as different software tools. A cohort of intermediate data is created that can be shared with colleagues to discuss the research progress and receive a first evaluation. In consequence, the intermediate data should be versioned to easily get back to valid intermediate data, when you notice you get on the wrong track. Things are different for project managers. They want to know what is currently done, what has been done, and what is the last valid data, if somebody has to continue the work. To make life of members of small science projects easier we developed Datasync [1] as a software for sharing and versioning data. Datasync is designed to synchronize directory trees between different computers of a research team over the internet. The software is developed as JAVA application and watches a local directory tree for changes that are replicated as eSciDoc-objects into an eSciDoc-infrastructure [2] using the eSciDoc REST API. Modifications to the local filesystem automatically create a new version of an eSciDoc-object inside the eSciDoc-infrastructure. This way individual folders can be shared between team members while project managers can get a general idea of current status by synchronizing whole project inventories. Additionally XML metadata from separate files can be managed together with data files inside the eSciDoc-objects. While

  8. SharePoint 2010 Six-in-One

    CERN Document Server

    Geier, Chris; Bertram, Becky

    2011-01-01

    A team of SharePoint authorities addresses the six most essential areas of SharePoint 2010. SharePoint enables Web sites to host shared workspaces and is a leading solution for Enterprise Content Management. This book serves as one-stop shopping for concise coverage on six key areas that you need to know in order to get up and running with SharePoint 2010 quickly. After an introduction to the new features of SharePoint 2010, the author team of SharePoint experts walk you through branding and customization, workflow, business connectivity services, social networking and tools, the search functi

  9. 78 FR 11258 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-02-15

    ....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68894; File No. SR-CHX-2013-06] Self-Regulatory...

  10. Danish cadres in the Comintern

    DEFF Research Database (Denmark)

    Larsen, Chris Holmsted

    caught the attention of the Comintern. A further category consisted of scientists. One example was a case file on the physicist Niels Bohr, who also was part of the British team of physicists working on the Manhattan Project. As for the communists, we were positively surprised by the fact, that the files......, and halfway expected disappointment, was that the collected material did not include much information on the secret and illegal work of the Comintern, or more specifically the OMS. For example the prewar acts of bombing and sabotage, committed by the so called Wollweber Network, in Denmark, and Danish...

  11. Assessing Guinea Bissau's Legal and Illegal Unreported and Unregulated Fisheries and the Surveillance Efforts to Tackle Them

    Directory of Open Access Journals (Sweden)

    Jeremias Francisco Intchama

    2018-04-01

    Full Text Available Fisheries in Guinea Bissau contribute greatly to the economy and food security of its people. Yet, as the ability of the country to monitor its fisheries is at most weak, and confronted with a heavy foreign fleet presence, the impact of industrial foreign fleets on fisheries catches is unaccounted for in the region. However, their footprint in terms of catch and value on the small-scale sector is heavily felt, through declining availability of fish. Fisheries in Guinea Bissau are operated by both legal (small-scale and industrial, and illegal (foreign unauthorized fleets, whose catches are barely recorded. In this paper, we assess catches by both the legal and illegal sector, and the economic loss generated by illegal fisheries in the country, then attempt to evaluate the effectiveness of Monitoring Control and Surveillance (MCS of Guinea Bissau's fisheries. Two main sectors were identified through official reports and a literature review, the large-scale (industrial sector, which between 2011 and 2017 included exclusively catches by foreign owned and flagged vessels, and catches by the small-scale sector, which remain largely unmonitored in official statistics. We use the available data on the number of legal and illegal vessels and/or fishers, and their respective catch per unit of effort to estimate catches, and we analyze monitoring outcomes against the registered industrial and artisanal fleets. We find that of the legal industrial vessels, 20% were linked to criminal activities in the past 7 years. These activities range widely from using an illegal mesh size, to fishing in a prohibited area, to labor abuse. Overall, total small-scale and industrial catches were estimated at 370,000 t/year in 2017, of which less than 2% is ever reported to the FAO. Small-scale catches represented 8% of the total catch, and this contribution was found to be declining. Industrial fisheries generate over $458 million US, or which $75 million US is taken

  12. The marketing and economic implications of the manipulation of share prices: Nigeria stock exchange experience

    OpenAIRE

    Ajayi Ezekiel Oluwole; Omolekan Olushola Joshua

    2012-01-01

    This paper examined the marketing and economic effects of the manipulation of share prices in the Nigerian Stock Exchange. The survey research design was adopted. Data collected was analyzed using the regression analysis. Student t- test was used to test the two hypotheses formulated at 0.05 level of significance. The findings of the study revealed that capital market infractions such as fraudulent disposal of investor assets, illegal fund management and the wonder bank syndrome, others are i...

  13. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  14. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  15. Design of shared unit-dose drug distribution network using multi-level particle swarm optimization.

    Science.gov (United States)

    Chen, Linjie; Monteiro, Thibaud; Wang, Tao; Marcon, Eric

    2018-03-01

    Unit-dose drug distribution systems provide optimal choices in terms of medication security and efficiency for organizing the drug-use process in large hospitals. As small hospitals have to share such automatic systems for economic reasons, the structure of their logistic organization becomes a very sensitive issue. In the research reported here, we develop a generalized multi-level optimization method - multi-level particle swarm optimization (MLPSO) - to design a shared unit-dose drug distribution network. Structurally, the problem studied can be considered as a type of capacitated location-routing problem (CLRP) with new constraints related to specific production planning. This kind of problem implies that a multi-level optimization should be performed in order to minimize logistic operating costs. Our results show that with the proposed algorithm, a more suitable modeling framework, as well as computational time savings and better optimization performance are obtained than that reported in the literature on this subject.

  16. A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

    OpenAIRE

    Atul Patel; Ruchi Kansara; Dr. Paresh Virparia

    2011-01-01

    Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an importa...

  17. Identifying areas under potential risk of illegal construction and demolition waste dumping using GIS tools.

    Science.gov (United States)

    Seror, Nissim; Portnov, Boris A

    2018-05-01

    Construction and demolition (C&D) waste, dumped illegally in ravines and open areas, contaminates soil and can cause underground water pollution and forests fires. Yet, effective monitoring of illegal C&D waste dumping and enforcing legislation against the offenders are often a difficult task due to the large size of geographic areas that need to be monitored, and limited human and financial resources available to environmental law enforcement agencies. In this study, we use Geographic Information System (GIS) tools and geo-statistical modelling to identify the areas under potentially elevated risk of illegal C&D waste dumping in the Haifa district of Israel. As our analysis shows, locational factors, significantly associated with the accumulated amount of waste in the existing illegal C&D waste sites, include: distance to the nearest main road, depth of the ravine present at the site (pwaste dumping for future monitoring. As we suggest, the proposed approach may be useful for environmental law enforcement authorities, by helping them to focus on specific sites for inspection, save resources, and act against the offenders more efficiently. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Switch/router architectures shared-bus and shared-memory based systems

    CERN Document Server

    Aweya, James

    2018-01-01

    A practicing engineer's inclusive review of communication systems based on shared-bus and shared-memory switch/router architectures. This book delves into the inner workings of router and switch design in a comprehensive manner that is accessible to a broad audience. It begins by describing the role of switch/routers in a network, then moves on to the functional composition of a switch/router. A comparison of centralized versus distributed design of the architecture is also presented. The author discusses use of bus versus shared-memory for communication within a design, and also covers Quality of Service (QoS) mechanisms and configuration tools. Written in a simple style and language to allow readers to easily understand and appreciate the material presented, Switch/Router Architectures: Shared-Bus and Shared-Memory Based Systems discusses the design of multilayer switches—starting with the basic concepts and on to the basic architectures. It describes the evolution of multilayer switch designs and highli...

  19. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  20. Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Yilei Wang

    2015-01-01

    Full Text Available With the rapid development of mobile devices and wireless technologies, mobile social networks become increasingly available. People can implement many applications on the basis of mobile social networks. Secure computation, like exchanging information and file sharing, is one of such applications. Fairness in secure computation, which means that either all parties implement the application or none of them does, is deemed as an impossible task in traditional secure computation without mobile social networks. Here we regard the applications in mobile social networks as specific functions and stress on the achievement of fairness on these functions within mobile social networks in the presence of two rational parties. Rational parties value their utilities when they participate in secure computation protocol in mobile social networks. Therefore, we introduce reputation derived from mobile social networks into the utility definition such that rational parties have incentives to implement the applications for a higher utility. To the best of our knowledge, the protocol is the first fair secure computation in mobile social networks. Furthermore, it finishes within constant rounds and allows both parties to know the terminal round.

  1. The War on Illegal Drug Production and Trafficking: An Economic Evaluation of Plan Colombia

    OpenAIRE

    Daniel Mejía; Pascual Restrepo

    2008-01-01

    This paper provides a thorough economic evaluation of the anti-drug policies implemented in Colombia between 2000 and 2006 under the so-called Plan Colombia. The paper develops a game theory model of the war against illegal drugs in producer countries. We explicitly model illegal drug markets, which allows us to account for the feedback effects between policies and market outcomes that are potentially important when evaluating large scale policy interventions such as Plan Colombia. We use ava...

  2. Madagascar rosewood, illegal logging and the tropical timber trade ...

    African Journals Online (AJOL)

    Although deforestation rates in the tropics are reportedly slowing, the loss of both forest area and forest quality remains a significant issue for many countries. This is particularly true of Madagascar, where recent government instability has enabled a significant increase in the incidence of illegal logging of Dalbergia species ...

  3. Analysis on typical illegal events for nuclear safety class 1 valve

    International Nuclear Information System (INIS)

    Tian Dongqing; Gao Runsheng; Jiao Dianhui; Yang Lili; Chen Peng

    2014-01-01

    Illegal welding events of nuclear safety class l valve forging occurred to the manufacturer, while the valve was returned to be repaired. Illegal nondestructive test event of nuclear safety class valve occurred also to the manufacturer in the manufacturing process. The two events have resulted in quality incipient fault for the installed valves and the valves in the manufacturing process. It was reflected that operation of the factory quality assurance system isn't activated, and nuclear power engineering and operating company have insufficient supervision. The event-related parties should strengthen quality management and process control, get rid of the quality incipient fault, and experience feedback should be done well to guarantee quality of equipment in nuclear power plant. (authors)

  4. Individual- and area-level disparities in access to the road network, subway system and a public bicycle share program on the Island of Montreal, Canada.

    Science.gov (United States)

    Fuller, Daniel; Gauvin, Lise; Kestens, Yan

    2013-02-01

    Few studies have examined potential disparities in access to transportation infrastructures, an important determinant of population health. To examine individual- and area-level disparities in access to the road network, public transportation system, and a public bicycle share program in Montreal, Canada. Examining associations between sociodemographic variables and access to the road network, public transportation system, and a public bicycle share program, 6,495 adult respondents (mean age, 48.7 years; 59.0 % female) nested in 33 areas were included in a multilevel analysis. Individuals with lower incomes lived significantly closer to public transportation and the bicycle share program. At the area level, the interaction between low-education and low-income neighborhoods showed that these areas were significantly closer to public transportation and the bicycle share program controlling for individual and urbanicity variables. More deprived areas of the Island of Montreal have better access to transportation infrastructure than less-deprived areas.

  5. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  6. Temporal Patterns of Pedophile Activity in a P2P Network: First Insights about User Profiles from Big Data

    OpenAIRE

    Fournier , Raphaël; Latapy , Matthieu

    2015-01-01

    International audience; Recent studies have shown that child abuse material is shared through peer-to-peer (P2P) networks, which allow users to exchange files without a central server. Obtaining knowledge on the extent of this activity has major consequences for child protection, policy making and Internet regulation. Previous works have developed tools and analyses to provide overall figures in temporally-limited measurements. Offenders' behavior is mostly studied through small-scale intervi...

  7. Experimental Analysis of File Transfer Rates over Wide-Area Dedicated Connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Liu, Qiang [ORNL; Sen, Satyabrata [ORNL; Hinkel, Gregory Carl [ORNL; Imam, Neena [ORNL; Foster, Ian [University of Chicago; Kettimuthu, R. [Argonne National Laboratory (ANL); Settlemyer, Bradley [Los Alamos National Laboratory (LANL); Wu, Qishi [University of Memphis; Yun, Daqing [Harrisburg University

    2016-12-01

    File transfers over dedicated connections, supported by large parallel file systems, have become increasingly important in high-performance computing and big data workflows. It remains a challenge to achieve peak rates for such transfers due to the complexities of file I/O, host, and network transport subsystems, and equally importantly, their interactions. We present extensive measurements of disk-to-disk file transfers using Lustre and XFS file systems mounted on multi-core servers over a suite of 10 Gbps emulated connections with 0-366 ms round trip times. Our results indicate that large buffer sizes and many parallel flows do not always guarantee high transfer rates. Furthermore, large variations in the measured rates necessitate repeated measurements to ensure confidence in inferences based on them. We propose a new method to efficiently identify the optimal joint file I/O and network transport parameters using a small number of measurements. We show that for XFS and Lustre with direct I/O, this method identifies configurations achieving 97% of the peak transfer rate while probing only 12% of the parameter space.

  8. NUMA-Aware Thread Scheduling for Big Data Transfers over Terabits Network Infrastructure

    Directory of Open Access Journals (Sweden)

    Taeuk Kim

    2018-01-01

    Full Text Available The evergrowing trend of big data has led scientists to share and transfer the simulation and analytical data across the geodistributed research and computing facilities. However, the existing data transfer frameworks used for data sharing lack the capability to adopt the attributes of the underlying parallel file systems (PFS. LADS (Layout-Aware Data Scheduling is an end-to-end data transfer tool optimized for terabit network using a layout-aware data scheduling via PFS. However, it does not consider the NUMA (Nonuniform Memory Access architecture. In this paper, we propose a NUMA-aware thread and resource scheduling for optimized data transfer in terabit network. First, we propose distributed RMA buffers to reduce memory controller contention in CPU sockets and then schedule the threads based on CPU socket and NUMA nodes inside CPU socket to reduce memory access latency. We design and implement the proposed resource and thread scheduling in the existing LADS framework. Experimental results showed from 21.7% to 44% improvement with memory-level optimizations in the LADS framework as compared to the baseline without any optimization.

  9. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  10. Illegal aliens, unemployment and immigration policy.

    Science.gov (United States)

    Djajic, S

    1987-02-01

    "This paper develops a simple two-country model of illegal immigration in an attempt to examine the interaction among variables such as the stock of migrant labor, the unemployment rates of the two economies, and the rate of spending by the host country on the enforcement of its immigration restrictions. The focus of the analysis is on the dynamics of immigration policy and on its role in determining the nature of the mechanism by which disturbances to the labor market of one country are transmitted to that of the other in the short run and in the long run." excerpt

  11. Exploring differences in stakeholders' perceptions of illegal bird trapping in Cyprus.

    Science.gov (United States)

    Jenkins, Heather M; Mammides, Christos; Keane, Aidan

    2017-11-28

    Cyprus is recognised as a hotspot for illegal bird trapping in the Mediterranean basin. A consumer demand for the Eurasian blackcap (Sylvia atricapilla) is driving the use of non-selective trapping methods, resulting in the indiscriminate killing of millions of migratory birds. Efforts to tackle the issue have so far been characterised mostly by a top-down approach, focusing on legislation and enforcement. However, trapping levels are not decreasing and conflict between stakeholder groups is intensifying. To understand why efforts to stop illegal bird trapping have not been effective, we used semi-structured interviews to interview 18 local bird trappers and nine representatives from the pertinent environmental non-governmental organisations (NGOs) and the governmental agencies responsible for enforcing the legislation. We found distinct differences between the views of the local trapping community and the environmental NGOs, particularly on why trapping is occurring and its impact on the avifauna. This disparity has contributed to misrepresentations of both sides and a high degree of conflict, which is potentially proving counterproductive to conservation interventions. In addition, it appears that trappers are a heterogeneous group, likely driven by various motivations besides profit. We argue that stakeholders interested in reducing illegal bird trapping need to develop anti-poaching strategies that aim at minimising the disparity in the views, and subsequently the conflict, acknowledging also that trappers are not a homogenous group, as often treated.

  12. Environmental impact of illegal refineries on the vegetation of the ...

    African Journals Online (AJOL)

    ... aesthetic scenery of the forest, regeneration of plant species and destruction of wildlife habitat, disruption of water cycle and loss of medicinal plant species. Youth empowerment, through vocational training and environmental education can ameliorate the situation. Keywords: Environmental degradation, Illegal Refineries, ...

  13. Automatic detection of potentially illegal online sales of elephant ivory via data mining

    Directory of Open Access Journals (Sweden)

    Julio Hernandez-Castro

    2015-07-01

    Full Text Available In this work, we developed an automated system to detect potentially illegal elephant ivory items for sale on eBay. Two law enforcement experts, with specific knowledge of elephant ivory identification, manually classified items on sale in the Antiques section of eBay UK over an 8 week period. This set the “Gold Standard” that we aim to emulate using data-mining. We achieved close to 93% accuracy with less data than the experts, as we relied entirely on metadata, but did not employ item descriptions or associated images, thus proving the potential and generality of our approach. The reported accuracy may be improved with the addition of text mining techniques for the analysis of the item description, and by applying image classification for the detection of Schreger lines, indicative of elephant ivory. However, any solution relying on images or text description could not be employed on other wildlife illegal markets where pictures can be missing or misleading and text absent (e.g., Instagram. In our setting, we gave human experts all available information while only using minimal information for our analysis. Despite this, we succeeded at achieving a very high accuracy. This work is an important first step in speeding up the laborious, tedious and expensive task of expert discovery of illegal trade over the internet. It will also allow for faster reporting to law enforcement and better accountability. We hope this will also contribute to reducing poaching, by making this illegal trade harder and riskier for those involved.

  14. Likelihood of illegal alcohol sales at professional sport stadiums.

    Science.gov (United States)

    Toomey, Traci L; Erickson, Darin J; Lenk, Kathleen M; Kilian, Gunna R

    2008-11-01

    Several studies have assessed the propensity for illegal alcohol sales at licensed alcohol establishments and community festivals, but no previous studies examined the propensity for these sales at professional sport stadiums. In this study, we assessed the likelihood of alcohol sales to both underage youth and obviously intoxicated patrons at professional sports stadiums across the United States, and assessed the factors related to likelihood of both types of alcohol sales. We conducted pseudo-underage (i.e., persons age 21 or older who appear under 21) and pseudo-intoxicated (i.e., persons feigning intoxication) alcohol purchase attempts at stadiums that house professional hockey, basketball, baseball, and football teams. We conducted the purchase attempts at 16 sport stadiums located in 5 states. We measured 2 outcome variables: pseudo-underage sale (yes, no) and pseudo-intoxicated sale (yes, no), and 3 types of independent variables: (1) seller characteristics, (2) purchase attempt characteristics, and (3) event characteristics. Following univariate and bivariate analyses, we a separate series of logistic generalized mixed regression models for each outcome variable. The overall sales rates to the pseudo-underage and pseudo-intoxicated buyers were 18% and 74%, respectively. In the multivariate logistic analyses, we found that the odds of a sale to a pseudo-underage buyer in the stands was 2.9 as large as the odds of a sale at the concession booths (30% vs. 13%; p = 0.01). The odds of a sale to an obviously intoxicated buyer in the stands was 2.9 as large as the odds of a sale at the concession booths (89% vs. 73%; p = 0.02). Similar to studies assessing illegal alcohol sales at licensed alcohol establishments and community festivals, findings from this study shows the need for interventions specifically focused on illegal alcohol sales at professional sporting events.

  15. Cost sharing in production situations and network exploitation

    NARCIS (Netherlands)

    Koster, M.A.L.

    1999-01-01

    In many real-life situations where individuals work together in a joint project, joint costs (or profits) occur which have to be shared. The central problem of cost sharing is the allocation of costs in a 'just' way among the participants. Examples are numerous and range from setting fees for the

  16. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    KAUST Repository

    Khan, Fahd Ahmed

    2014-03-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent but not identically distributed (i.n.i.d.) and has Nakagami-m fading. A constraint on the peak transmit power of the secondary-user transmitter (SU-Tx) is considered, in addition to the peak interference power constraint. The SU-Tx is assumed to be equipped with a buffer and is modeled using the M/G/1 queueing model. The performance of this system is analyzed for two scenarios: 1) P2M-SN does not experience interference from the primary network (denoted by P2M-SN-NI), and 2) P2M-SN does experience interference from the primary network (denoted by P2M-SN-WI). The performance of both P2M-SN-NI and P2M-SN-WI is analyzed in terms of the packet transmission time, and the closed-form cumulative density function (cdf) of the packet transmission time is derived for both scenarios. Furthermore, by utilizing the concept of timeout, an exact closed-form expression for the outage probability of the P2M-SN-NI is obtained. In addition, an accurate approximation for the outage probability of the P2M-SN-WI is also derived. Furthermore, for the P2M-SN-NI, the analytic expressions for the total average waiting time (TAW-time) of packets and the average number of packets waiting in the buffer of the SU-Tx are also derived. Numerical simulations are also performed to validate the derived analytical results. © 1967-2012 IEEE.

  17. Enhancing traffic performance in hierarchical DHT system by exploiting network proximity

    Science.gov (United States)

    Zhong, Haifeng; Wu, Wei; Pei, Canhao; Zhang, Chengfeng

    2009-08-01

    Nowadays P2P systems have become increasingly popular for object distribution and file sharing, and the majority of Internet traffic is generated by P2P file sharing applications. However, those applications usually ignored the underlying proximity of physical nodes and regionalization of file accessing. As a result, they generate a large amount of unnecessary interdomain transit traffic and increase response latency. In this paper, we proposed a new traffic control approach to enhance p2p traffic locality and reduce the cross-group transfer. Using analysis, we show that the method substantially improves node transfer efficiency and significantly reduces file access latency compared with native P2P applications.

  18. Outcomes of the international forum. Illegal nuclear traffic: Risks, safeguards and countermeasures

    International Nuclear Information System (INIS)

    Martellini, M.; Cotta-Ramusino, P.

    1998-01-01

    Two important meetings were held in Como, Italy, at the Centre for Scientific Culture A.Volta on illegal nuclear traffic from research of military and civilian nuclear installations around the world, technologies suitable to detect it and counter measures. This paper summarizes the outcome of these meetings which discussed obstacles existing in control of illegal nuclear material trafficking and indicated specific measures to overcome some of these obstacles. These measures include working out standardised procedures and methodology of analysis of nuclear materials, setting up a civilian world data bank to collect information on the type, features and isotopic composition of stolen materials, development and application of highly sensitive stationary and field detectors and distance monitoring systems

  19. Behavioral Indicators of Legal and Illegal Gun Carrying

    Science.gov (United States)

    2015-05-01

    foundation to develop training for law enforcement and security personnel to utilize behavioral indicators in a safe, legal, and effective manner...hope to develop more efficient and effective means of assisting the police to identify and safely interdict persons carrying illegal firearms. This...by Velcro hook and loop fastener tape. Attached to the elastic wrap is a pocket with a security strap that holds the gun in place. When fastened to

  20. Design of Detection and Prevention System of Unauthorized Data Sending from the Local Network

    Directory of Open Access Journals (Sweden)

    D. A. Moskvin

    2010-03-01

    Full Text Available Malware often aims at breaking confidentiality. A malicious program gets inside the local network, finds out necessary data and then illegally transfers this data to the intruder. Prevention of unauthorized data transfer requires development of a special software product, which will detect and prevent leak of information from the local network.

  1. The role of social networks for combating money laundering

    NARCIS (Netherlands)

    Imanpour, M.

    2017-01-01

    Money laundering is the disguising of the illegal origin of money by bringing it back into the legal financial circuit. Therefore, in this dissertation I try to establish a theoretical framework to understand the role of social networks, and the link between criminals and legal actors in the money

  2. Economic consequences of legal and illegal drugs: The case of social costs in Belgium.

    Science.gov (United States)

    Lievens, Delfine; Vander Laenen, Freya; Verhaeghe, Nick; Putman, Koen; Pauwels, Lieven; Hardyns, Wim; Annemans, Lieven

    2017-06-01

    Legal and illegal drugs impose a considerable burden to the individual and to society. The misuse of addictive substances results in healthcare and law enforcement costs, loss of productivity and reduced quality of life. A social cost study was conducted to estimate the substance-attributable costs of alcohol, tobacco, illegal drugs and psychoactive medication to Belgian society in 2012. The cost-of-illness framework with prevalence-based and human capital approach was applied. Three cost components were considered: direct, indirect and intangible costs related to substance misuse. The direct and indirect cost of addictive substances was estimated at 4.6 billion euros in Belgium (419 euros per capita or 1.19% of the GDP) and more than 515,000 healthy years are lost due to substance misuse. The Belgian social cost study reaffirms that alcohol and tobacco impose the highest cost to society compared to illegal drugs. Health problems are the main driver of the social cost of legal drugs. Law enforcement expenditure exceed the healthcare costs but only in the case of illegal drugs. Estimating social costs of addictive substances is complex because it is difficult to determine to what extent the societal harm is caused by substances. It can be argued that social cost studies take only a 'snapshot' of the monetary consequences of substance misuse. Nevertheless, the current study offers the most comprehensive analysis thus far of the social costs of substance misuse in Belgium. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. An analysis of illegal mining on the Offin shelterbelt forest reserve, Ghana: Implications on community livelihood

    Directory of Open Access Journals (Sweden)

    Samuel Boadi

    2016-01-01

    Full Text Available Mining in tropical countries contributes significantly to the global minerals supplies but unregulated mining activities in reserved forests is associated with destruction, loss of habitats and loss of biodiversity. This study determined the area of the Offin shelterbelt forest reserve, Ghana, degraded through illegal mining (galamsey and the impacts on the livelihoods of fringe communities. Thirty-two (32 coordinates were recorded around the peripheries of disturbed site in the reserve using hand-held Global Positioning System and were then imported into a geodatabase in ArcGIS which was used to estimate the area degraded. Data was obtained from 60 purposively sampled respondents from two communities fringing the reserve and 10 key informant interviews. Increased income (13%, employment opportunities (6.7% and increased market activities (2% were some benefits of the illegal mining activities identified by the respondents. Eight respondents associated their employment with of the advent of illegal mining activities out which 6 (70% were engaged directly in mining activities, while 2 (30% were into trading. The miners earned cash income range of US $ 2.9–22.9 daily. Within 5 years, illegal mining had degraded 2.5 km2 (4.4% of the total area of the reserve and the destruction of cocoa farms and water sources (31. Farming among respondents reduced from 90% to 76% after illegal mining. The relatively high cost (US$ 6424.1 involved in flushing out and the subsequent return of such miners poses a threat to sustainable forest management and requires a more holistic approach in tackling such a problem.

  4. Mastering Microsoft SharePoint Foundation 2010

    CERN Document Server

    Callahan, C A

    2011-01-01

    Everything IT professionals need to create collaborative solutions. SharePoint Foundation 2010 is the newest version of a powerful collaboration tool used in many Exchange-enabled organizations. This book gets network professionals and business application administrators up to speed on the updates, features, and installation procedures, preparing them to create powerful collaboration structures for their companies.: Microsoft SharePoint Foundation 2010 is the successor to Windows SharePoint Services 3.0 and is used with Microsoft Office SharePoint Server to enable collaboration; this guide pre

  5. Illegal Serbian Structures in the Republic of Kosovo Why these structures are illegal and not paralel?

    Directory of Open Access Journals (Sweden)

    Behar Selimi

    2015-11-01

    Full Text Available This paper argues that Serb structures, operating in Kosovo after the forced withdrawal under NATO intervention of Serb-Yugoslav mechanisms of power from Kosovo in June 1999 which marks the end of the war and at the same time the beginning of a new process of peace building, do not represent parallel structures, rather they represent illegal structures. This paper argues that these kinds of structures achieved to be established and being continuesly strengthened due to multi-dimensional support of the Republic of Serbia which for its interest needed them to undermine the establishment of functional governance overall in Kosovo but predominantly in the Serb enclaves, and also due to UN Interim Administration in Kosovo which’s main interest was peace and stability not functionality of governance. In this paper, it is also argued that these Serb structures do not represent the majority of Serbs living in Kosovo because they are incorporated into the constitutional institutions of the Rrepublic of Kosovo. Through comparing main domestic and international documents by which UN Interim Administration and National Institutions of Governance were established and also data gathered in the field through different reports, this paper concludes that: these structures are unconstitutional structures, and therefore illegal, rather than parallel structures; consideration of them as parallel by UN Interim Administration was a mistake which negatively affected integration, development, and democratization of a part of the Serbian community in Kosovo’s northern municipalities; they are also supported by criminal structures which seriously impede the exercise of state power, the legal system, and the development of democracy predominantly in the northern part of Kosovo; and beside of political and diplomatic efforts, a state organized force with an international support is the only answer to criminal structures.

  6. Download this PDF file

    African Journals Online (AJOL)

    telecommunication network were highly essential if Nigerian universities are to take full advantage of ... communicate and share project data. Today the .edu ... the world would, to a large extent, depend on the availability of enabling infrastructure .... providers (ISPs) connect their networks in order to exchange Internet traffic;.

  7. Piracy and Product Differentiation in the Market of Digital Goods

    OpenAIRE

    Alvisi Matteo; Argentesi Elena; Carbonara Emanuela

    2003-01-01

    We analyse how piracy affects the choice of quality of a monopolist producing a digital good. A digital good is a special kind of information good, for example a music CD, a DVD or an electronic magazine available online. An important feature of digital goods is that they can be copied without a decline in the copy's quality. We define piracy as both the production and the sale of illegal copies and the practice of file sharing through the Internet. Recently, the introduction of fast Internet...

  8. Active Market Share: measuring competitiveness in retail energy markets

    International Nuclear Information System (INIS)

    Loomis, D.; Malm, E.

    1999-01-01

    As retail electric and gas markets deregulate, market share measurement becomes critical for marketers, regulators, and incumbent utilities. Yet traditional market share measures miss important features of these network industries. In this paper we model provider choice in network industries and develop two alternate market share measures - The Active Market Share (AMS) and the New Mover Market Share (NMMS), that are based on 'active demand'. These measures are shown to provide more accurate real-time measures of market activity. The NMMS is a special case of the AMS which is easy to measure empirically. Numerical simulations are used to provide comparisons between each measure over time. Both the AMS and NMMS will be important tools for anyone interested in measuring the competitiveness of deregulating markets. (author)

  9. Ensuring Freedoms and Protecting Rights in the Governance of the Internet: A Comparative Analysis on Blocking Measures and Internet Providers’ Removal of Illegal Internet Content

    Directory of Open Access Journals (Sweden)

    Katalin Parti

    2013-02-01

    Full Text Available Removing illegal or harmful material from the internet has been pursued for more than two decades. The advent of Web 2.0, with the prominent increase and diffusion of user-generated content, amplifies the necessity for technical and legal frameworks enabling the removal of illegal material from the network. This study deals with different levels and methods of Internet ‘cleansing’ measures, comparing government regulated and Internet service provider based removals of illegal Internet content. The paper aims at putting the regulatory option of internet blocking measures into the broader perspective of the legal framework regulating the (exemption from liability of Intermediary Service Providers (ISPs for user-generated contents. In addition, the paper suggests proposals on which regulatory options can better ensure the respect of freedoms and the protection of rights. The paper introduces several significant cases of blocking online copyright infringing materials. Copyright related blocking techniques have been devised for business reasons – by copyright holders’ associations. It must be recalled, however, that these blocking actions cannot be enforced without the states’ intervention. These business-level actions become isolated if they are not supported by both the European Union and its Member States. Conversely, state-centred initiatives cannot work out without the private sector’s cooperation. Internet service providers play a crucial role in this cooperative framework because of their task of providing access to the Internet and hosting web contents.

  10. Drivers of illegal livelihoods in remote transboundary regions: the case of the Trans-Fly region of Papua New Guinea

    Directory of Open Access Journals (Sweden)

    Sara Busilacchi

    2018-03-01

    Full Text Available Remote transboundary regions in developing countries often contain abundant natural resources. Many of these resources are being overexploited to supply an ever-increasing demand from Asia, often via illegal cross-border trade. Understanding the systemic issues that drive households to engage in illegal activities in transboundary regions is a prerequisite for designing effective interventions and diverting livelihoods toward sustainable trajectories, but is rarely applied. This study analyzed the drivers of illegal trade in marine products, e.g. sea cucumber, shark fin, and fish bladders, among coastal villages in Papua New Guinea that border Indonesia and Australia in the Trans-Fly region. Mixed-methods (household questionnaire surveys, focus group discussions, and key informant interviews were applied to triangulate results and minimize denial bias, which is a challenge when studying illegality. Results indicated that distance from markets and economic centers was the main driver for engagement in illegal activity, and distance from a center was also the main driver of poverty. Contrary to studies elsewhere, we found that poverty did not generally drive households' engagement in illegal trade. Only in Daru, the primary economic hub, where immigrants from the areas impacted by the Ok Tedi mine operations have resettled, were the poorest households likely to be involved in illegal trade, because they had no alternative sources of livelihood. Weak governance exacerbates the situation, which includes corruption, a lack of enforcement, and poor coordination among government levels, and a breakdown of traditional resource management systems. Respondents highlighted that current bilateral border agreements are outdated and cannot account for modernization, a globalizing economy, and communities' rapid transition to a cash economy. Our findings emphasize the need to find innovative governance solutions to manage this stressed social

  11. Social costs of illegal drugs, alcohol and tobacco in the European Union: A systematic review.

    Science.gov (United States)

    Barrio, Pablo; Reynolds, Jillian; García-Altés, Anna; Gual, Antoni; Anderson, Peter

    2017-09-01

    Drug use accounts for one of the main disease groups in Europe, with relevant consequences to society. There is an increasing need to evaluate the economic consequences of drug use in order to develop appropriate policies. Here, we review the social costs of illegal drugs, alcohol and tobacco in the European Union. A systematic search of relevant databases was conducted. Grey literature and previous systematic reviews were also searched. Studies reporting on social costs of illegal drugs, alcohol and tobacco were included. Methodology, cost components as well as costs were assessed from individual studies. To compare across studies, final costs were transformed to 2014 Euros. Forty-five studies reported in 43 papers met the inclusion criteria (11 for illegal drugs, 26 for alcohol and 8 for tobacco). While there was a constant inclusion of direct costs related to treatment of substance use and comorbidities, there was a high variability for the rest of cost components. Total costs showed also a great variability. Price per capita for the year 2014 ranged from €0.38 to €78 for illegal drugs, from €26 to €1500 for alcohol and from €10.55 to €391 for tobacco. Drug use imposes a heavy economic burden to Europe. However, given the high existing heterogeneity in methodologies, and in order to better assess the burden and thus to develop adequate policies, standardised methodological guidance is needed. [Barrio P, Reynolds J, García-Altés A, Gual A, Anderson P. Social costs of illegal drugs, alcohol and tobacco in the European Union: A systematic review. Drug Alcohol Rev 2017;00:000-000]. © 2017 Australasian Professional Society on Alcohol and other Drugs.

  12. Diagnostic overview of the illegal trade in primates and law enforcement in Peru.

    Science.gov (United States)

    Shanee, Noga; Mendoza, A Patricia; Shanee, Sam

    2017-11-01

    Peru has one of the richest primate faunas of any country. The illegal trade in wild primates is one of the largest threats to this fauna in Peru. We characterize the illegal trade in primates through empirical and ethnographic data. We collected data from traffic routes and centers throughout Peru and evaluate current efforts to combat this traffic. Based on our findings from 2,070 instances of wildlife crime involving 6,872 primates, we estimate the domestic trade in primates for pets and bushmeat in Peru in the hundreds of thousands per year, with the larger bodied Atelidae facing the highest direct consequences. We found that government authorities lack sufficient staff, capacity, resources, infrastructure, and protocols to efficiently combat illegal trade in primates. Also, the complicated legal framework and lack of cooperation and antagonism with the public further limit these efforts. Wildlife authorities in Peru are able to confiscate only a fraction of primates traded and mostly intervene in cases of private pet owners rather than traffickers. We estimate that the current rate of illegal trade in primates is comparable to levels of trade prior to the 1973 ban on primates' exportation. The combination of direct observations on primate trade and ethnographic data allows a comprehensive look at primate trade in Peru. We call upon decision makers and international funders to channel their efforts toward "on the ground" actions such as increasing the ability of the authorities to act, giving them "in action" training in law enforcement and establishing strict control measures against corruption. Am. J. Primatol. 79:e22516, 2017. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  13. Anti-leptospiral agglutinins in marmosets (Saguinus oedipus and Saguinus leucopus from illegal trade

    Directory of Open Access Journals (Sweden)

    Viviana Gonzalez-Astudillo

    2015-09-01

    Full Text Available Objective. Determine the infection status with pathogenic Leptospira of one Saguinus oedipus and nine Saguinus leucopus at the Cali Zoo that had been confiscated in Colombia from illegal trade. Materials and methods. A full physical examination, blood work, urinalysis were conducted in all individuals during the reception health check-up, in addition to running the microagglutination test with a pool of 19 serovars, with a starting dilution of 1:50. Results. A high positive titer (≥1:3200 to Leptospira alexanderi serovar manhao in an asymptomatic S. oedipus was detected. All S. leucopus tested negative or less than 1:50. Conclusions. Captive locations have been documented to artificially enhance opportunities to come into contact with contaminated bodily fluids from peridomestic rodents. However, infectious diseases acquired during the illegal transport of wildlife to major metropolitan centers are rarely considered a wildlife conservation or public health threat. Infection with zoonotic pathogens should also be considered an additional threat to endangered wild primates involved in illegal trade, which could hamper reintroduction efforts or other population management procedures for primate species with restricted and fragmented distributions.

  14. The marketing and economic implications of the manipulation of share prices: Nigeria stock exchange experience

    Directory of Open Access Journals (Sweden)

    Ajayi Ezekiel Oluwole

    2012-12-01

    Full Text Available This paper examined the marketing and economic effects of the manipulation of share prices in the Nigerian Stock Exchange. The survey research design was adopted. Data collected was analyzed using the regression analysis. Student t- test was used to test the two hypotheses formulated at 0.05 level of significance. The findings of the study revealed that capital market infractions such as fraudulent disposal of investor assets, illegal fund management and the wonder bank syndrome, others are insider dealings, corporate accounting fraud and share price manipulations affects the capital market and the economy .The study concluded that share prices manipulation actually influences the marketing and economic values of the shares being manipulated. It was recommended that the Nigerian government must put in place strong regulatory measures and punish the entire offender that has been found guilty. It was also recommended that for the market to rebound, stockbrokers that accessed margin facility from banks should be provided with certain percentage of their contributions to the loan as cushion to help them move on with their business.

  15. The Dark Side of Illegal Immigration: Cause for National Concern

    Science.gov (United States)

    2007-02-28

    was officially terminated in 1964. However, illegal aliens were recruited in large numbers well after the Bracero program .24 For almost ten years...Mexico has its official roots in the demise of the Bracero program . Employers had become accustomed to cheap Mexican labor and were willing to ignore

  16. Legal and Illegal Colours

    DEFF Research Database (Denmark)

    Larsen, John Christian

    2008-01-01

    opinions on food additives, including colours, and on the bioavailability and safety of nutrient sources. The WG ADD consists of several members from the AFC Panel together with selected external experts. The draft opinions go forward to the AFC Panel for discussion and final adoption. The adopted opinions......://www.efsa.europa.eu/EFSA/efsa_locale-1178620753812_1178620761956.htm. Accessed 12.05.08.] this paper only deals with some of the major issues that the Panel has faced in relation to the use of food colours. The three topics to be dealt with are (1) evaluation of illegal colours in food in the EU (EFSA, 2005), (2) re-evaluation of the authorised...... food colours in the EU (ongoing, but one opinion on Red 2G has been published; EFSA, 2007), and (3) evaluation of 'the Southampton study' on hyperactivity in children after intake of food colours (and sodium benzoate) (ongoing at the time of this presentation, but an opinion has now been published...

  17. Understanding Interdependency Through Complex Information Sharing

    Directory of Open Access Journals (Sweden)

    Fernando Rosas

    2016-01-01

    Full Text Available The interactions between three or more random variables are often nontrivial, poorly understood and, yet, are paramount for future advances in fields such as network information theory, neuroscience and genetics. In this work, we analyze these interactions as different modes of information sharing. Towards this end, and in contrast to most of the literature that focuses on analyzing the mutual information, we introduce an axiomatic framework for decomposing the joint entropy that characterizes the various ways in which random variables can share information. Our framework distinguishes between interdependencies where the information is shared redundantly and synergistic interdependencies where the sharing structure exists in the whole, but not between the parts. The key contribution of our approach is to focus on symmetric properties of this sharing, which do not depend on a specific point of view for differentiating roles between its components. We show that our axioms determine unique formulas for all of the terms of the proposed decomposition for systems of three variables in several cases of interest. Moreover, we show how these results can be applied to several network information theory problems, providing a more intuitive understanding of their fundamental limits.

  18. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  19. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  20. HOKES/POKES : Light-weight resource sharing

    NARCIS (Netherlands)

    Bos, Herbert; Samwel, Bart

    2003-01-01

    In this paper, we explain mechanisms for providing embedded network processors and other low-level programming environments with light-weight support for safe resource sharing. The solution consists of a host part, known as HOKES, and a network processor part, known as POKES. As common operating