WorldWideScience

Sample records for network issue number

  1. Broadband network selection issues

    Science.gov (United States)

    Leimer, Michael E.

    1996-01-01

    Selecting the best network for a given cable or telephone company provider is not as obvious as it appears. The cost and performance trades between Hybrid Fiber Coax (HFC), Fiber to the Curb (FTTC) and Asymmetric Digital Subscriber Line networks lead to very different choices based on the existing plant and the expected interactive subscriber usage model. This paper presents some of the issues and trades that drive network selection. The majority of the Interactive Television trials currently underway or planned are based on HFC networks. As a throw away market trial or a short term strategic incursion into a cable market, HFC may make sense. In the long run, if interactive services see high demand, HFC costs per node and an ever shrinking neighborhood node size to service large numbers of subscribers make FTTC appear attractive. For example, thirty-three 64-QAM modulators are required to fill the 550 MHz to 750 MHz spectrum with compressed video streams in 6 MHz channels. This large amount of hardware at each node drives not only initial build-out costs, but operations and maintenance costs as well. FTTC, with its potential for digitally switching large amounts of bandwidth to an given home, offers the potential to grow with the interactive subscriber base with less downstream cost. Integrated telephony on these networks is an issue that appears to be an afterthought for most of the networks being selected at the present time. The major players seem to be videocentric and include telephony as a simple add-on later. This may be a reasonable view point for the telephone companies that plan to leave their existing phone networks untouched. However, a phone company planning a network upgrade or a cable company jumping into the telephony business needs to carefully weigh the cost and performance issues of the various network choices. Each network type provides varying capability in both upstream and downstream bandwidth for voice channels. The noise characteristics

  2. Policy issues in interconnecting networks

    Science.gov (United States)

    Leiner, Barry M.

    1989-01-01

    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented.

  3. Special issue on network coding

    Science.gov (United States)

    Monteiro, Francisco A.; Burr, Alister; Chatzigeorgiou, Ioannis; Hollanti, Camilla; Krikidis, Ioannis; Seferoglu, Hulya; Skachek, Vitaly

    2017-12-01

    Future networks are expected to depart from traditional routing schemes in order to embrace network coding (NC)-based schemes. These have created a lot of interest both in academia and industry in recent years. Under the NC paradigm, symbols are transported through the network by combining several information streams originating from the same or different sources. This special issue contains thirteen papers, some dealing with design aspects of NC and related concepts (e.g., fountain codes) and some showcasing the application of NC to new services and technologies, such as data multi-view streaming of video or underwater sensor networks. One can find papers that show how NC turns data transmission more robust to packet losses, faster to decode, and more resilient to network changes, such as dynamic topologies and different user options, and how NC can improve the overall throughput. This issue also includes papers showing that NC principles can be used at different layers of the networks (including the physical layer) and how the same fundamental principles can lead to new distributed storage systems. Some of the papers in this issue have a theoretical nature, including code design, while others describe hardware testbeds and prototypes.

  4. COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS

    OpenAIRE

    Sumant Ku Mohapatra; Biswa Ranjan Swain; Pravanjan Das

    2015-01-01

    This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8- security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manage...

  5. Issue Professionals in Transnational Networks

    DEFF Research Database (Denmark)

    Henriksen, Lasse Folke; Seabrooke, Leonard

    Professionals and organizations both seek to exploit and cooperate with each other. Professionals seek alliances in their own peer networks while organizations do the same. These networks carry not only information that inform incentives but norms about appropriate forms of governance and practices...

  6. Engineering Issues for an Adaptive Defense Network

    National Research Council Canada - National Science Library

    Piszcz, Alan; Orlans, Nicholas; Eyler-Walker, Zachary; Moore, David

    2001-01-01

    .... The primary issue was the capability to detect and defend against DDoS. Experimentation was performed with a packet filtering firewall, a network Quality of Service manager, multiple DDoS tools, and traffic generation tools...

  7. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  8. The Issue Network as a Deliberative Space

    DEFF Research Database (Denmark)

    Ørmen, Jacob

    2012-01-01

    to identify relevant political issues online, but it does not manage to bring together the various antagonistic actors in one deliberative space online. In a triangulation of the results from the two separate analyses, the study further finds evidence, which suggests that the relationship between hyperlinks......Through an analysis of the Danish asylum issue network on the Internet, this article discusses the possibilities of the online sphere as a deliberative space, where politics is happening. By assessing the hyperlink structure of the issue network and a subsequent content analysis of the claims...

  9. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  10. Multiplex congruence network of natural numbers.

    Science.gov (United States)

    Yan, Xiao-Yong; Wang, Wen-Xu; Chen, Guan-Rong; Shi, Ding-Hua

    2016-03-31

    Congruence theory has many applications in physical, social, biological and technological systems. Congruence arithmetic has been a fundamental tool for data security and computer algebra. However, much less attention was devoted to the topological features of congruence relations among natural numbers. Here, we explore the congruence relations in the setting of a multiplex network and unveil some unique and outstanding properties of the multiplex congruence network. Analytical results show that every layer therein is a sparse and heterogeneous subnetwork with a scale-free topology. Counterintuitively, every layer has an extremely strong controllability in spite of its scale-free structure that is usually difficult to control. Another amazing feature is that the controllability is robust against targeted attacks to critical nodes but vulnerable to random failures, which also differs from ordinary scale-free networks. The multi-chain structure with a small number of chain roots arising from each layer accounts for the strong controllability and the abnormal feature. The multiplex congruence network offers a graphical solution to the simultaneous congruences problem, which may have implication in cryptography based on simultaneous congruences. Our work also gains insight into the design of networks integrating advantages of both heterogeneous and homogeneous networks without inheriting their limitations.

  11. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  12. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  13. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  14. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  15. Online social networking issues within academia and pharmacy education.

    Science.gov (United States)

    Cain, Jeff

    2008-02-15

    Online social networking sites such as Facebook and MySpace are extremely popular as indicated by the numbers of members and visits to the sites. They allow students to connect with users with similar interests, build and maintain relationships with friends, and feel more connected with their campus. The foremost criticisms of online social networking are that students may open themselves to public scrutiny of their online personas and risk physical safety by revealing excessive personal information. This review outlines issues of online social networking in higher education by drawing upon articles in both the lay press and academic publications. New points for pharmacy educators to consider include the possible emergence of an "e-professionalism" concept; legal and ethical implications of using online postings in admission, discipline, and student safety decisions; how online personas may blend into professional life; and the responsibility for educating students about the risks of online social networking.

  16. Defense Acquisition Research Journal. Volume 21, Number 1, Issue 68

    Science.gov (United States)

    2014-01-01

    Manual of the American Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th...language. Format Please submit your manuscript with references in APA format (author- date-page number form of citation) as outlined in the Publication ...January 2014 Vol. 21 No. 1 | ISSUE 68 Challenging Conventional Wisdom REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public

  17. Biased trapping issue on weighted hierarchical networks

    Indian Academy of Sciences (India)

    archical networks which are based on the classic scale-free hierarchical networks. ... Weighted hierarchical networks; weight-dependent walks; mean first passage ..... The weighted networks can mimic some real-world natural and social systems to ... the Priority Academic Program Development of Jiangsu Higher Education ...

  18. Value-Creating Networks: Organizational Issues and Challenges

    Science.gov (United States)

    Allee, Verna

    2009-01-01

    Purpose: The purpose of this paper is to provide examples of evaluating value-creating networks and to address the organizational issues and challenges of a network orientation. Design/methodology/approach: Value network analysis was first developed in 1993 and was adapted in 1997 for intangible asset management. It has been applied from shopfloor…

  19. Expected number of quantum channels in quantum networks

    Science.gov (United States)

    Chen, Xi; Wang, He-Ming; Ji, Dan-Tong; Mu, Liang-Zhu; Fan, Heng

    2015-07-01

    Quantum communication between nodes in quantum networks plays an important role in quantum information processing. Here, we proposed the use of the expected number of quantum channels as a measure of the efficiency of quantum communication for quantum networks. This measure quantified the amount of quantum information that can be teleported between nodes in a quantum network, which differs from classical case in that the quantum channels will be consumed if teleportation is performed. We further demonstrated that the expected number of quantum channels represents local correlations depicted by effective circles. Significantly, capacity of quantum communication of quantum networks quantified by ENQC is independent of distance for the communicating nodes, if the effective circles of communication nodes are not overlapped. The expected number of quantum channels can be enhanced through transformations of the lattice configurations of quantum networks via entanglement swapping. Our results can shed lights on the study of quantum communication in quantum networks.

  20. Divisibility patterns of natural numbers on a complex network.

    Science.gov (United States)

    Shekatkar, Snehal M; Bhagwat, Chandrasheel; Ambika, G

    2015-09-16

    Investigation of divisibility properties of natural numbers is one of the most important themes in the theory of numbers. Various tools have been developed over the centuries to discover and study the various patterns in the sequence of natural numbers in the context of divisibility. In the present paper, we study the divisibility of natural numbers using the framework of a growing complex network. In particular, using tools from the field of statistical inference, we show that the network is scale-free but has a non-stationary degree distribution. Along with this, we report a new kind of similarity pattern for the local clustering, which we call "stretching similarity", in this network. We also show that the various characteristics like average degree, global clustering coefficient and assortativity coefficient of the network vary smoothly with the size of the network. Using analytical arguments we estimate the asymptotic behavior of global clustering and average degree which is validated using numerical analysis.

  1. Transnational organizing: Issue professionals in environmental sustainability networks.

    Science.gov (United States)

    Henriksen, Lasse Folke; Seabrooke, Leonard

    2016-09-01

    An ongoing question for institutional theory is how organizing occurs transnationally, where institution building occurs in a highly ambiguous environment. This article suggests that at the core of transnational organizing is competition and coordination within professional and organizational networks over who controls issues. Transnational issues are commonly organized through professional battles over how issues are treated and what tasks are involved. These professional struggles are often more important than what organization has a formal mandate over an issue. We highlight how 'issue professionals' operate in two-level professional and organizational networks to control issues. This two-level network provides the context for action in which professionals do their institutional work. The two-level network carries information about professional incentives and also norms about how issues should be treated and governed by organizations. Using network and career sequences methods, we provide a case of transnational organizing through professionals who attempt issue control and network management on transnational environmental sustainability certification. The article questions how transnational organizing happens, and how we can best identify attempts at issue control.

  2. Characterizing the sustainable forestry issue network in thc United States

    Science.gov (United States)

    Steverson O. Moffat; Frederick W. Cubbage; Thomas P. Holmes; Elizabethann O' Sullivan

    2001-01-01

    Issue network analysis techniques were applied to the issue sustainable forestry in the United States to identify potential public and private outcomes for the issue. A quantitative approach based on work by Laumann and Knoke [(The Organizational State (1987)] was utilized in conjunction with the Delphi method. Results suggest that the parity in the distribution of...

  3. Effect of mean network coordination number on dispersivity characteristics

    NARCIS (Netherlands)

    Vasilyev, L.; Raoof, A.; Nordbotten, J.M.

    2012-01-01

    In this study, we investigate the role of topology on the macroscopic (centimeter scale) dispersion characteristics derived from pore-network models.We consider 3D random porous networks extracted from a regular cubic lattice with coordination number distributed in accordance with real porous

  4. THE VALUE OF SOCIAL NETWORK AS FUNCTION OF NUMBER OFUSERS

    Directory of Open Access Journals (Sweden)

    Petras Lickus

    2012-07-01

    Full Text Available At the presence of network externality, the value of a product or service isdependent on the number of others using it.This meansthatthemore socialnetworkhas subscribers, the greateritsvalue. Metcalfe’slaw states that networkvalue is proportional to the number of users in square. Reed's law takes intoaccount the possibility of groups’formation. In this case,networkvalue scalesexponentially with the size of the network. Odlyzko ismuchmore moderate. Heargues that the incremental value of adding one person to network ofnpeople isapproximately then-thharmonic number. From early ages of television Sarnoffstated that the value of a broadcast network is proportional to the number ofviewers.This paper deals with the problem of determining the value of such socialnetworks as Facebook, Twitter,LinkedInetc. asfunction of thenumber of usersand other parameters

  5. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  6. Coverage and Connectivity Issue in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rachit Trivedi

    2013-04-01

    Full Text Available Wireless sensor networks (WSNs are an emerging area of interest in research and development. It finds use in military surveillance, health care, environmental monitoring, forest fire detection and smart environments. An important research issue in WSNs is the coverage since cost, area and lifetime are directly validated to it.In this paper we present an overview of WSNs and try to refine the coverage and connectivity issues in wireless sensor networks.

  7. Unresolved safety issues summary. Volume 3, Number 3. Aqua book

    International Nuclear Information System (INIS)

    1981-01-01

    The 'Unresolved Safety Issues' summary is designed to provide the management of the Nuclear Regulatory Commission with a quarterly overview of the progress and plans for completion of generic tasks addressing Unresolved Safety Issues reported to Congress pursuant to section 210 of The Energy Reorganization Act of 1974 as amended. This summary utilizes data collected from the Office of Nuclear Reactor Regulation, Office of Nuclear Regulatory Research, and the National Laboratories and is prepared by the office of Management and Program Analysis. The definition of what constitutes completion of an unresolved safety issue (USI) has recently been expanded to include the implementation of the technical resolution. This is in acknowledgement of the fact that real safety benefits occur only after the implementation has taken place. The schedules in this book include a milestone at the end of each action plan which represents the initiation of the implementation process both with respect to incorporation of the technical resolution in the NRC official guidance or requirements and also the application of changes to individual operating plants. The schedule for implementation will not normally be included in the task action plan(s) for the resolution of a USI since the nature and extent of the activities necessary to accomplish the implementation cannot normally be reasonably determined prior to the determination of a technical resolution. The progress and status for implementation of unresolved safety issues for which a technical resolution has been completed are reported specifically in a separate table provided in this summary

  8. School Discipline: Special Issues. School Management Handbook Number 2.

    Science.gov (United States)

    National Association of Elementary School Principals, Arlington, VA.

    This part of the School Management Handbook provides the elementary school administrator with an overview of civil rights issues affecting school discipline policy. The first section treats the requirements for providing due process and avoiding discrimination against minority groups when following disciplinary procedures. Section 2 covers…

  9. Defense Acquisition Research Journal. Volume 21, Number 3, Issue 70

    Science.gov (United States)

    2014-07-01

    affecting the behavioral change beyond issuing a memorandum. Exhortations are no way to develop a sound business process ( Deming , 1982, pp. 65–70), much...Acquisition University Press. Deming , W. E. (1982). Out of the crisis: Quality, productivity and competitive position. New York, NY: Cambridge University

  10. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  11. Learning as Issue Framing in Agricultural Innovation Networks

    Science.gov (United States)

    Tisenkopfs, Talis; Kunda, Ilona; Šumane, Sandra

    2014-01-01

    Purpose: Networks are increasingly viewed as entities of learning and innovation in agriculture. In this article we explore learning as issue framing in two agricultural innovation networks. Design/methodology/approach: We combine frame analysis and social learning theories to analyse the processes and factors contributing to frame convergence and…

  12. Classification framework of knowledge transfer issues across value networks

    NARCIS (Netherlands)

    Bagheri, S.; Kusters, R.J.; Trienekens, J.J.M.; van der Zandt, Hugo; Cavalieri, S.; Ceretti, E.; Tolio, T.; Pezzotta, G.

    2016-01-01

    Co-creating integrated solutions with customers requires collaboration of different partners within a value network. In this emerging context, knowledge is considered as a foundation for value co-creation. Therefore, identifying different types of issues, with which value network actors in knowledge

  13. Social Networks in the workplace - some data protection issues

    OpenAIRE

    Haynes, D.

    2011-01-01

    There are many benefits to be gained from using social networks in the workplace but there is a downside – a growing concern about privacy and misuse of personal information. Using the results from a survey he conducted to highlight the issues, David Haynes puts forward an approach to managing social networks through the introduction of organisational policy.

  14. Issues related to social network advertising

    Directory of Open Access Journals (Sweden)

    Tecău, A. S.

    2012-01-01

    Full Text Available The promotional activity is currently marked by major transformations due to the coming out and extremely fast development of certain new media of promotion much more suitable for the interaction with consumers, much more appropriate in developing long term relationships with them as compared to classic media. The most edifying example is the Internet with all that it provides, becoming an important part of everyone’s everyday life. Within the Internet, the social networking is constantly developing, becoming increasingly important.

  15. Defense Acquisition Review Journal. Volume 16, Number 3, Issue 52

    Science.gov (United States)

    2009-10-01

    Journal (ARJ) print year. FROM THE EDITOR I am excited to announce the lineup of research articles for Issue 52 of the Defense Acquisition Review... identification and causality, and to prevent the variety generated by EA from reducing total product performance. From Amorphous to Defined: Balancing Risks...possible in this environment, and will allow better flow of strategic-level acquisition advice, including the identification of existing and

  16. Networked publics: multi-disciplinary perspectives on big policy issues

    OpenAIRE

    William H. Dutton

    2018-01-01

    This special issue of Internet Policy Review is the first to bring together the best policy-oriented papers presented at the annual conference of the Association of Internet Researchers (AoIR). This issue is anchored in the 2017 conference in Tartu, Estonia, which was organised around the theme of networked publics. The seven papers span issues concerning whether and how technology and policy are reshaping access to information, perspectives on privacy and security online, and social and lega...

  17. From networked publics to issue publics

    DEFF Research Database (Denmark)

    Birkbak, Andreas

    2013-01-01

    As an increasing part of everyday life becomes connected with the web in many areas of the globe, the question of how the web mediates political processes becomes still more urgent. Several scholars have started to address this question by thinking about the web in terms of a public space....... In this paper, we aim to make a twofold contribution towards the development of the concept of publics in web science. First, we propose that although the notion of publics raises a variety of issues, two major concerns continue to be user privacy and democratic citizenship on the web. Well-known arguments hold......, this paper points towards an alternative way to think about publics by proposing a pragmatist reorientation of the public/private distinction in web science, away from seeing two spheres that needs to be kept separate, towards seeing the public and the private as something that is continuously connected...

  18. Defense Acquisition Research Journal. Volume 22, Number 1, Issue 72.

    Science.gov (United States)

    2015-01-01

    references in APA format (author-date-page number form of citation) as outlined in the Publication Manual of the American Psychological Association [ 6th ... Edition ]). For all other style questions, please refer to the Chicago Manual of Style (16th Edition ). Contributors are encouraged to seek the advice of...reference to government works. Helpful guidance is also available in The Complete Guide to Citing Government Documents (Revised Edition ): A Manual

  19. Defense Acquisition Research Journal. Volume 21, Number 2, Issue 69

    Science.gov (United States)

    2014-04-01

    Manual of the American Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th...Graphic Designer Technical Editor Editorial Assistant Proofreader Multimedia Assistant Editing , Design, and Layout A Publication of the Defense...language. Format Please submit your manuscript with references in APA format (author-date-page number form of citation) as outlined in the Publication

  20. Defense AR Journal. Volume 18, Number 1, Issue 57

    Science.gov (United States)

    2011-01-01

    Manual of the American Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th Edition ...112 Format Please submit your manuscript with references in APA format (author- date-page number form of citation) as outlined in the Publication ...Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  1. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  2. ID card number detection algorithm based on convolutional neural network

    Science.gov (United States)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  3. A large number of stepping motor network construction by PLC

    Science.gov (United States)

    Mei, Lin; Zhang, Kai; Hongqiang, Guo

    2017-11-01

    In the flexible automatic line, the equipment is complex, the control mode is flexible, how to realize the large number of step and servo motor information interaction, the orderly control become a difficult control. Based on the existing flexible production line, this paper makes a comparative study of its network strategy. After research, an Ethernet + PROFIBUSE communication configuration based on PROFINET IO and profibus was proposed, which can effectively improve the data interaction efficiency of the equipment and stable data interaction information.

  4. Introduction to focus issue: quantitative approaches to genetic networks.

    Science.gov (United States)

    Albert, Réka; Collins, James J; Glass, Leon

    2013-06-01

    All cells of living organisms contain similar genetic instructions encoded in the organism's DNA. In any particular cell, the control of the expression of each different gene is regulated, in part, by binding of molecular complexes to specific regions of the DNA. The molecular complexes are composed of protein molecules, called transcription factors, combined with various other molecules such as hormones and drugs. Since transcription factors are coded by genes, cellular function is partially determined by genetic networks. Recent research is making large strides to understand both the structure and the function of these networks. Further, the emerging discipline of synthetic biology is engineering novel gene circuits with specific dynamic properties to advance both basic science and potential practical applications. Although there is not yet a universally accepted mathematical framework for studying the properties of genetic networks, the strong analogies between the activation and inhibition of gene expression and electric circuits suggest frameworks based on logical switching circuits. This focus issue provides a selection of papers reflecting current research directions in the quantitative analysis of genetic networks. The work extends from molecular models for the binding of proteins, to realistic detailed models of cellular metabolism. Between these extremes are simplified models in which genetic dynamics are modeled using classical methods of systems engineering, Boolean switching networks, differential equations that are continuous analogues of Boolean switching networks, and differential equations in which control is based on power law functions. The mathematical techniques are applied to study: (i) naturally occurring gene networks in living organisms including: cyanobacteria, Mycoplasma genitalium, fruit flies, immune cells in mammals; (ii) synthetic gene circuits in Escherichia coli and yeast; and (iii) electronic circuits modeling genetic networks

  5. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  6. Introduction to Focus Issue: Complex network perspectives on flow systems.

    Science.gov (United States)

    Donner, Reik V; Hernández-García, Emilio; Ser-Giacomi, Enrico

    2017-03-01

    During the last few years, complex network approaches have demonstrated their great potentials as versatile tools for exploring the structural as well as dynamical properties of dynamical systems from a variety of different fields. Among others, recent successful examples include (i) functional (correlation) network approaches to infer hidden statistical interrelationships between macroscopic regions of the human brain or the Earth's climate system, (ii) Lagrangian flow networks allowing to trace dynamically relevant fluid-flow structures in atmosphere, ocean or, more general, the phase space of complex systems, and (iii) time series networks unveiling fundamental organization principles of dynamical systems. In this spirit, complex network approaches have proven useful for data-driven learning of dynamical processes (like those acting within and between sub-components of the Earth's climate system) that are hidden to other analysis techniques. This Focus Issue presents a collection of contributions addressing the description of flows and associated transport processes from the network point of view and its relationship to other approaches which deal with fluid transport and mixing and/or use complex network techniques.

  7. Estimation of the number of extreme pathways for metabolic networks

    Directory of Open Access Journals (Sweden)

    Thiele Ines

    2007-09-01

    Full Text Available Abstract Background The set of extreme pathways (ExPa, {pi}, defines the convex basis vectors used for the mathematical characterization of the null space of the stoichiometric matrix for biochemical reaction networks. ExPa analysis has been used for a number of studies to determine properties of metabolic networks as well as to obtain insight into their physiological and functional states in silico. However, the number of ExPas, p = |{pi}|, grows with the size and complexity of the network being studied, and this poses a computational challenge. For this study, we investigated the relationship between the number of extreme pathways and simple network properties. Results We established an estimating function for the number of ExPas using these easily obtainable network measurements. In particular, it was found that log [p] had an exponential relationship with log⁡[∑i=1Rd−id+ici] MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacyGGSbaBcqGGVbWBcqGGNbWzdaWadaqaamaaqadabaGaemizaq2aaSbaaSqaaiabgkHiTmaaBaaameaacqWGPbqAaeqaaaWcbeaakiabdsgaKnaaBaaaleaacqGHRaWkdaWgaaadbaGaemyAaKgabeaaaSqabaGccqWGJbWydaWgaaWcbaGaemyAaKgabeaaaeaacqWGPbqAcqGH9aqpcqaIXaqmaeaacqWGsbGua0GaeyyeIuoaaOGaay5waiaaw2faaaaa@4414@, where R = |Reff| is the number of active reactions in a network, d−i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacqWGKbazdaWgaaWcbaGaeyOeI0YaaSbaaWqaaiabdMgaPbqabaaaleqaaaaa@30A9@ and d+i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb

  8. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  9. Safety in numbers? Tackling domestic abuse in couples and network therapies.

    Science.gov (United States)

    Galvani, Sarah A

    2007-03-01

    Family, network or couples-based therapies have been helping to support people with substance problems for decades. Their value in supporting a person to change their alcohol or drug use is clear. However, as links between substance use and domestic abuse are increasingly recognised, these approaches need to reflect on the potential safety risks they present to people taking part. The prevalence of domestic abuse among people receiving drug and alcohol services is considerably higher than general population estimates, yet this does not appear to have been adequately addressed in network therapies. This article suggests that this needs to change and that safety of service users needs to be at least as important as the intervention itself. It offers for debate a number of potential safety issues raised by network therapies where there is evidence of domestic abuse; it provides examples of three approaches used to marshal social and network support in substance interventions; and offers a number of suggestions for how network therapies can ensure their use remains safe and supportive where there is domestic abuse.

  10. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  11. Neural Networks and Fault Probability Evaluation for Diagnosis Issues

    Science.gov (United States)

    Lefebvre, Dimitri; Guersi, Noureddine

    2014-01-01

    This paper presents a new FDI technique for fault detection and isolation in unknown nonlinear systems. The objective of the research is to construct and analyze residuals by means of artificial intelligence and probabilistic methods. Artificial neural networks are first used for modeling issues. Neural networks models are designed for learning the fault-free and the faulty behaviors of the considered systems. Once the residuals generated, an evaluation using probabilistic criteria is applied to them to determine what is the most likely fault among a set of candidate faults. The study also includes a comparison between the contributions of these tools and their limitations, particularly through the establishment of quantitative indicators to assess their performance. According to the computation of a confidence factor, the proposed method is suitable to evaluate the reliability of the FDI decision. The approach is applied to detect and isolate 19 fault candidates in the DAMADICS benchmark. The results obtained with the proposed scheme are compared with the results obtained according to a usual thresholding method. PMID:25132845

  12. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    The Internet has provided advancement in the areas of network and networking facilities. Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of ...

  13. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  14. Decomposition of Rotor Hopfield Neural Networks Using Complex Numbers.

    Science.gov (United States)

    Kobayashi, Masaki

    2018-04-01

    A complex-valued Hopfield neural network (CHNN) is a multistate model of a Hopfield neural network. It has the disadvantage of low noise tolerance. Meanwhile, a symmetric CHNN (SCHNN) is a modification of a CHNN that improves noise tolerance. Furthermore, a rotor Hopfield neural network (RHNN) is an extension of a CHNN. It has twice the storage capacity of CHNNs and SCHNNs, and much better noise tolerance than CHNNs, although it requires twice many connection parameters. In this brief, we investigate the relations between CHNN, SCHNN, and RHNN; an RHNN is uniquely decomposed into a CHNN and SCHNN. In addition, the Hebbian learning rule for RHNNs is decomposed into those for CHNNs and SCHNNs.

  15. Expected Number of Fixed Points in Boolean Networks with Arbitrary Topology.

    Science.gov (United States)

    Mori, Fumito; Mochizuki, Atsushi

    2017-07-14

    Boolean network models describe genetic, neural, and social dynamics in complex networks, where the dynamics depend generally on network topology. Fixed points in a genetic regulatory network are typically considered to correspond to cell types in an organism. We prove that the expected number of fixed points in a Boolean network, with Boolean functions drawn from probability distributions that are not required to be uniform or identical, is one, and is independent of network topology if only a feedback arc set satisfies a stochastic neutrality condition. We also demonstrate that the expected number is increased by the predominance of positive feedback in a cycle.

  16. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of the newest technologies which only few companies, such as mobile companies and ...

  17. A Review on Sensor Network Issues and Robotics

    Directory of Open Access Journals (Sweden)

    Ji Hyoung Ryu

    2015-01-01

    Full Text Available The interaction of distributed robotics and wireless sensor networks has led to the creation of mobile sensor networks. There has been an increasing interest in building mobile sensor networks and they are the favored class of WSNs in which mobility plays a key role in the execution of an application. More and more researches focus on development of mobile wireless sensor networks (MWSNs due to its favorable advantages and applications. In WSNs robotics can play a crucial role, and integrating static nodes with mobile robots enhances the capabilities of both types of devices and enables new applications. In this paper we present an overview on mobile sensor networks in robotics and vice versa and robotic sensor network applications.

  18. Algebraic Number Precoded OFDM Transmission for Asynchronous Cooperative Multirelay Networks

    Directory of Open Access Journals (Sweden)

    Hua Jiang

    2014-01-01

    Full Text Available This paper proposes a space-time block coding (STBC transmission scheme for asynchronous cooperative systems. By combination of rotated complex constellations and Hadamard transform, these constructed codes are capable of achieving full cooperative diversity with the analysis of the pairwise error probability (PEP. Due to the asynchronous characteristic of cooperative systems, orthogonal frequency division multiplexing (OFDM technique with cyclic prefix (CP is adopted for combating timing delays from relay nodes. The total transmit power across the entire network is fixed and appropriate power allocation can be implemented to optimize the network performance. The relay nodes do not require decoding and demodulation operation, resulting in a low complexity. Besides, there is no delay for forwarding the OFDM symbols to the destination node. At the destination node the received signals have the corresponding STBC structure on each subcarrier. In order to reduce the decoding complexity, the sphere decoder is implemented for fast data decoding. Bit error rate (BER performance demonstrates the effectiveness of the proposed scheme.

  19. Study on networking issues of medium earth orbit satellite communications systems

    Science.gov (United States)

    Araki, Noriyuki; Shinonaga, Hideyuki; Ito, Yasuhiko

    1993-01-01

    Two networking issues of communications systems with medium earth orbit (MEO) satellites, namely network architectures and location determination and registration methods for hand-held terminals, are investigated in this paper. For network architecture, five candidate architectures are considered and evaluated in terms of signaling traffic. For location determination and registration, two methods are discussed and evaluated.

  20. ARL: A Bimonthly Report on Research Library Issues and Actions from ARL, CNI, and SPARC. Number 259

    Science.gov (United States)

    Barrett, G. Jaia, Ed.

    2008-01-01

    "ARL" is the bimonthly report on research library issues and actions from ARL (Association of Research Libraries), CNI (Coalition of Networked Information), and SPARC (Scholarly Publishing and Academic Resources Coalition). "ARL" reports on current issues of interest to academic and research library administrators, staff, and users; higher…

  1. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  2. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  3. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  4. Coherence resonance in globally coupled neuronal networks with different neuron numbers

    International Nuclear Information System (INIS)

    Ning Wei-Lian; Zhang Zheng-Zhen; Zeng Shang-You; Luo Xiao-Shu; Hu Jin-Lin; Zeng Shao-Wen; Qiu Yi; Wu Hui-Si

    2012-01-01

    Because a brain consists of tremendous neuronal networks with different neuron numbers ranging from tens to tens of thousands, we study the coherence resonance due to ion channel noises in globally coupled neuronal networks with different neuron numbers. We confirm that for all neuronal networks with different neuron numbers there exist the array enhanced coherence resonance and the optimal synaptic conductance to cause the maximal spiking coherence. Furthermoremore, the enhancement effects of coupling on spiking coherence and on optimal synaptic conductance are almost the same, regardless of the neuron numbers in the neuronal networks. Therefore for all the neuronal networks with different neuron numbers in the brain, relative weak synaptic conductance (0.1 mS/cm 2 ) is sufficient to induce the maximal spiking coherence and the best sub-threshold signal encoding. (interdisciplinary physics and related areas of science and technology)

  5. Modeling users' activity on twitter networks: validation of Dunbar's number.

    Directory of Open Access Journals (Sweden)

    Bruno Gonçalves

    Full Text Available Microblogging and mobile devices appear to augment human social capabilities, which raises the question whether they remove cognitive or biological constraints on human communication. In this paper we analyze a dataset of Twitter conversations collected across six months involving 1.7 million individuals and test the theoretical cognitive limit on the number of stable social relationships known as Dunbar's number. We find that the data are in agreement with Dunbar's result; users can entertain a maximum of 100-200 stable relationships. Thus, the 'economy of attention' is limited in the online world by cognitive and biological constraints as predicted by Dunbar's theory. We propose a simple model for users' behavior that includes finite priority queuing and time resources that reproduces the observed social behavior.

  6. On Number of Almost Blank Subframes in Heterogeneous Cellular Networks

    OpenAIRE

    Cierny, Michal; Wang, Haining; Wichman, Risto; Ding, Zhi; Wijting, Carl

    2013-01-01

    In heterogeneous cellular scenarios with macrocells, femtocells or picocells users may suffer from significant co-channel cross-tier interference. To manage this interference 3GPP introduced almost blank subframe (ABSF), a subframe in which the interferer tier is not allowed to transmit data. Vulnerable users thus get a chance to be scheduled in ABSFs with reduced cross-tier interference. We analyze downlink scenarios using stochastic geometry and formulate a condition for the required number...

  7. Advances in neural networks computational and theoretical issues

    CERN Document Server

    Esposito, Anna; Morabito, Francesco

    2015-01-01

    This book collects research works that exploit neural networks and machine learning techniques from a multidisciplinary perspective. Subjects covered include theoretical, methodological and computational topics which are grouped together into chapters devoted to the discussion of novelties and innovations related to the field of Artificial Neural Networks as well as the use of neural networks for applications, pattern recognition, signal processing, and special topics such as the detection and recognition of multimodal emotional expressions and daily cognitive functions, and  bio-inspired memristor-based networks.  Providing insights into the latest research interest from a pool of international experts coming from different research fields, the volume becomes valuable to all those with any interest in a holistic approach to implement believable, autonomous, adaptive, and context-aware Information Communication Technologies.

  8. Compatibility Issues of IPSec and TCP in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Hai-yang; XIN Yang

    2004-01-01

    Due to the problems arising when the Transmission Control Protocol (TCP) is applied over wireless networks, many TCP performance enhancement mechanisms have been proposed. However, such mechanisms aren't compatible with IPSec protocol. The paper reviews the TCP performance enhancement mechanisms in wireless networks. Then the conflicts between them are analyzed. Several proposals for solving theconflicts are discussed, and their benefit and limitations are examined.

  9. Framing of Ethical Issues in the Network Society

    DEFF Research Database (Denmark)

    Etter, Michael; Vestergaard Jørgensen, Anne

    Purpose: This study investigates the moral framing of an ethical issue by various actors and looks at the agenda setting effects between news media and the active online public as represented in social media. Design: We coded 4114 sentences manually and conducted an analysis of conditional...... probability of co-occurrence between actors and issues to identify associative frames. An ARIMA model and time series are applied to detect the interplay between the active online public and news media over a period of three months. Findings: The analysis reveals different framings of the ethical issue...

  10. Reliability issues of free-space communications systems and networks

    Science.gov (United States)

    Willebrand, Heinz A.

    2003-04-01

    Free space optics (FSO) is a high-speed point-to-point connectivity solution traditionally used in the enterprise campus networking market for building-to-building LAN connectivity. However, more recently some wire line and wireless carriers started to deploy FSO systems in their networks. The requirements on FSO system reliability, meaing both system availability and component reliability, are far more stringent in the carrier market when compared to the requirements in the enterprise market segment. This paper tries to outline some of the aspects that are important to ensure carrier class system reliability.

  11. Design issues and applications of wireless sensor networks ...

    African Journals Online (AJOL)

    ... using tiny wireless sensor motes known as “smart dusts”, which have been made possible by advances in micro-electromechanical systems (MEMS) technology, wireless communications and digital electronics. Design considerations for the hardware and the topology necessary to realize these networks were evaluated.

  12. College Student Social Networking: Its Importance and Its Issues

    Science.gov (United States)

    Wihbey, Jean A.

    2010-01-01

    Most traditional age college students communicate regularly on social networking sites such as, MySpace, Facebook, Friendster, Bebo, and LiveJournal. These are member-based internet communities that allow users to create a username, enter personal profile information, post photographs and communicate with others in innovative ways. Since Facebook…

  13. Reducing the Density and Number of Tobacco Retailers: Policy Solutions and Legal Issues.

    Science.gov (United States)

    Ackerman, Amy; Etow, Alexis; Bartel, Sara; Ribisl, Kurt M

    2017-02-01

    Because higher density of tobacco retailers is associated with greater tobacco use, U.S. communities seek ways to reduce the density and number of tobacco retailers. This approach can reduce the concentration of tobacco retailers in poorer communities, limit youth exposure to tobacco advertising, and prevent misleading associations between tobacco and health messaging. Communities can reduce the density and number of tobacco retailers by imposing minimum distance requirements between existing retailers, capping the number of retailers in a given geographic area, establishing a maximum number of retailers proportional to population size, and prohibiting sales at certain types of establishments, such as pharmacies, or within a certain distance of locations serving youth. Local governments use direct regulation, licensing, or zoning laws to enact these changes. We analyze each approach under U.S. constitutional law to assist communities in selecting and implementing one or more of these methods. There are few published legal opinions that address these strategies in the context of tobacco control. But potential constitutional challenges include violations of the Takings Clause of the Fifth Amendment, which protects property owners from onerous government regulations, and under the Fourteenth Amendment's Equal Protection and Due Process Clauses, which protect business owners from arbitrary or unreasonable regulations that do not further a legitimate government interest. Because there is an evidentiary basis linking the density of tobacco retailers to smoking rates in a community, courts are likely to reject constitutional challenges to carefully crafted laws that reduce the number of tobacco retailers. Our review of the relevant constitutional issues confirms that local governments have the authority to utilize laws and policies to reduce the density and number of tobacco retailers in their communities, given existing public health data. The analysis guides policy

  14. GPP Webinar: Solar Utilization in Higher Education Networking & Information Sharing Group: Financing Issues Discussion

    Science.gov (United States)

    This presentation from a Solar Utilization in Higher Education Networking and Information webinar covers financing and project economics issues related to solar project development in the higher education sector.

  15. A network approach for distinguishing ethical issues in research and development.

    Science.gov (United States)

    Zwart, Sjoerd D; van de Poel, Ibo; van Mil, Harald; Brumsen, Michiel

    2006-10-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR) session where we invited important stakeholders to think about the risks of this new technology. We show how a network approach is useful for understanding the observations, and suggests some relevant ethical issues. We argue that a network approach is also useful for ethical analysis of issues in other fields of research and development. The abandoning of the overarching rationality assumption, which is central to network approaches, does not have to lead to ethical relativism.

  16. A network approach for distinguishing ethical issues in research and development

    NARCIS (Netherlands)

    Zwart, S.D.; Poel, van de I.R.; Mil, van H.G.J.; Brumsen, M.

    2006-01-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR)

  17. A Network Approach for Distinguishing Ethical Issues in Research and Development

    NARCIS (Netherlands)

    Zwart, S.D.; Van de Poel, I.; Van Mil, H.; Brumsen, M.

    2006-01-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR)

  18. A Network Approach for Distinguishing Ethical Issues in Research and Development

    OpenAIRE

    Zwart, S.D.; Van de Poel, I.; Van Mil, H.; Brumsen, M.

    2006-01-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR) session where we invited important stakeholders to think about the risks of this new technology. We show how a network approach is useful for understanding the observations, and suggests some releva...

  19. Energetic Performance of Service-oriented Multi-radio Networks: Issues and Perspectives

    OpenAIRE

    Caporuscio , Mauro; Charlet , Damien; Issarny , Valérie; Navarra , Alfredo

    2006-01-01

    Wireless devices now hold multiple radio interfaces, allowing to switch from one network to another according to required connectivity and related quality. Still, the selection of the best radio interface for a specific connection is under the responsibility of the end-user in most cases. Integrated multi-radio network management so as to improve the overall performance of the network(s) has led to a number of research efforts over the last few years. However, several challenges remain due to...

  20. Adjustment of issue positions based on network strategies in a nelection campaign: A two-mode network autoregression model with cross-nested random effects

    NARCIS (Netherlands)

    Kleinnijenhuis, J.; de Nooy, W.

    2013-01-01

    During election campaigns, political parties deliver statements on salient issues in the news media, which are called issue positions. This article conceptualizes issue positions as a valued and longitudinal two-mode network of parties by issues. The network is valued because parties pronounce pro

  1. Adjustment of issue positions based on network strategies in an election campaign: a two-mode network autoregression model with cross-nested random effects

    NARCIS (Netherlands)

    Kleinnijenhuis, J.; de Nooy, W.

    2013-01-01

    During election campaigns, political parties deliver statements on salient issues in the news media, which are called issue positions. This article conceptualizes issue positions as a valued and longitudinal two-mode network of parties by issues. The network is valued because parties pronounce pro

  2. Celebrating 25 Years. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 3

    Science.gov (United States)

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Leading the Way in Dropout Prevention; (2) The 15 Effective Strategies in Action; (3) Technology Changes 1986-2011 (Marty Duckenfield); (4) 25 Years of Research and Support…

  3. Service-Learning. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 4

    Science.gov (United States)

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Dropouts and Democracy (Robert Shumer); (2) 2011 NDPN Crystal Star Winners; (3) Service-Learning as Dropout Intervention and More (Michael VanKeulen); and (4) Teacher…

  4. Using Active Networking to Detect and Troubleshoot Issues in Tactical Data Networks

    Science.gov (United States)

    2014-06-01

    networking (SDN) paradigm, which has gained popularity in recent years, has its roots in the idea of programmable networks [6]. By extending the...278–289, Aug. 2011. 67 [13] M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles , “Plan: A programming language for active networks,” ACM

  5. Personal support networks, social capital, and risk of relapse among individuals treated for substance use issues.

    Science.gov (United States)

    Panebianco, Daria; Gallupe, Owen; Carrington, Peter J; Colozzi, Ivo

    2016-01-01

    The success of treatment for substance use issues varies with personal and social factors, including the composition and structure of the individual's personal support network. This paper describes the personal support networks and social capital of a sample of Italian adults after long-term residential therapeutic treatment for substance use issues, and analyses network correlates of post-treatment substance use (relapse). Using a social network analysis approach, data were obtained from structured interviews (90-120 min long) with 80 former clients of a large non-governmental therapeutic treatment agency in Italy providing voluntary residential treatments and rehabilitation services for substance use issues. Participants had concluded the program at least six months prior. Data were collected on socio-demographic variables, addiction history, current drug use status (drug-free or relapsed), and the composition and structure of personal support networks. Factors related to risk of relapse were assessed using bivariate and multivariate logistic regression models. A main goal of this study was to identify differences between the support network profiles of drug free and relapsed participants. Drug free participants had larger, less dense, more heterogeneous and reciprocal support networks, and more brokerage social capital than relapsed participants. Additionally, a lower risk of relapse was associated with higher socio-economic status, being married/cohabiting, and having network members with higher socio-economic status, who have greater occupational heterogeneity, and reciprocate support. Post-treatment relapse was found to be negatively associated with the socioeconomic status and occupational heterogeneity of ego's support network, reciprocity in the ties between ego and network members, and a support network in which the members are relatively loosely connected with one another (i.e., ego possesses "brokerage social capital"). These findings suggest the

  6. Implementation Issues of Adaptive Energy Detection in Heterogeneous Wireless Networks

    Science.gov (United States)

    Sobron, Iker; Eizmendi, Iñaki; Martins, Wallace A.; Diniz, Paulo S. R.; Ordiales, Juan Luis; Velez, Manuel

    2017-01-01

    Spectrum sensing (SS) enables the coexistence of non-coordinated heterogeneous wireless systems operating in the same band. Due to its computational simplicity, energy detection (ED) technique has been widespread employed in SS applications; nonetheless, the conventional ED may be unreliable under environmental impairments, justifying the use of ED-based variants. Assessing ED algorithms from theoretical and simulation viewpoints relies on several assumptions and simplifications which, eventually, lead to conclusions that do not necessarily meet the requirements imposed by real propagation environments. This work addresses those problems by dealing with practical implementation issues of adaptive least mean square (LMS)-based ED algorithms. The paper proposes a new adaptive ED algorithm that uses a variable step-size guaranteeing the LMS convergence in time-varying environments. Several implementation guidelines are provided and, additionally, an empirical assessment and validation with a software defined radio-based hardware is carried out. Experimental results show good performance in terms of probabilities of detection (Pd>0.9) and false alarm (Pf∼0.05) in a range of low signal-to-noise ratios around [-4,1] dB, in both single-node and cooperative modes. The proposed sensing methodology enables a seamless monitoring of the radio electromagnetic spectrum in order to provide band occupancy information for an efficient usage among several wireless communications systems. PMID:28441751

  7. Stimulus number, duration and intensity encoding in randomly connected attractor networks with synaptic depression

    Directory of Open Access Journals (Sweden)

    Paul eMiller

    2013-05-01

    Full Text Available Randomly connected recurrent networks of excitatory groups of neurons can possess a multitude of attractor states. When the internal excitatory synapses of these networks are depressing, the attractor states can be destabilized with increasing input. This leads to an itinerancy, where with either repeated transient stimuli, or increasing duration of a single stimulus, the network activity advances through sequences of attractor states. We find that the resulting network state, which persists beyond stimulus offset, can encode the number of stimuli presented via a distributed representation of neural activity with non-monotonic tuning curves for most neurons. Increased duration of a single stimulus is encoded via different distributed representations, so unlike an integrator, the network distinguishes separate successive presentations of a short stimulus from a single presentation of a longer stimulus with equal total duration. Moreover, different amplitudes of stimulus cause new, distinct activity patterns, such that changes in stimulus number, duration and amplitude can be distinguished from each other. These properties of the network depend on dynamic depressing synapses, as they disappear if synapses are static. Thus short-term synaptic depression allows a network to store separately the different dynamic properties of a spatially constant stimulus.

  8. Numerical Solution of Fuzzy Differential Equations with Z-numbers Using Bernstein Neural Networks

    Directory of Open Access Journals (Sweden)

    Raheleh Jafari

    2017-01-01

    Full Text Available The uncertain nonlinear systems can be modeled with fuzzy equations or fuzzy differential equations (FDEs by incorporating the fuzzy set theory. The solutions of them are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by two types of Bernstein neural networks. Here, the uncertainties are in the sense of Z-numbers. Initially the FDE is transformed into four ordinary differential equations (ODEs with Hukuhara differentiability. Then neural models are constructed with the structure of ODEs. With modified back propagation method for Z- number variables, the neural networks are trained. The theory analysis and simulation results show that these new models, Bernstein neural networks, are effective to estimate the solutions of FDEs based on Z-numbers.

  9. Multiple system responses program: Identification of concerns related to a number of specific regulatory issues

    International Nuclear Information System (INIS)

    Murphy, G.A.; Casada, M.L.; Palko, L.E.; Roberts, M.W.

    1989-10-01

    This document describes the activities and results of the Multiple System Responses (MSR) program conducted by the Nuclear Operations Analysis Center (NOAC) at Oak Ridge National Laboratory (ORNL). The objective of the MSR program was to gather and review documentation for several unresolved safety issues and related programs of interest, and from that documentation, describe any additional potential safety concerns. The MSR program provides information that will aid the NRC staff in making an assessment of the relative safety significance of the concerns through the established prioritization process. Judgments were not made regarding the validity of the concerns expressed by others. Rather, the concerns were documented and potential safety issues were developed and defined as specifically as possible. Twenty-one potential safety issues were developed from the documented concerns. Additional information was gathered to support the NRC efforts in reviewing these issues for prioritization. 73 refs., 2 tabs

  10. Identification of serial number on bank card using recurrent neural network

    Science.gov (United States)

    Liu, Li; Huang, Linlin; Xue, Jian

    2018-04-01

    Identification of serial number on bank card has many applications. Due to the different number printing mode, complex background, distortion in shape, etc., it is quite challenging to achieve high identification accuracy. In this paper, we propose a method using Normalization-Cooperated Gradient Feature (NCGF) and Recurrent Neural Network (RNN) based on Long Short-Term Memory (LSTM) for serial number identification. The NCGF maps the gradient direction elements of original image to direction planes such that the RNN with direction planes as input can recognize numbers more accurately. Taking the advantages of NCGF and RNN, we get 90%digit string recognition accuracy.

  11. Retrieving infinite numbers of patterns in a spin-glass model of immune networks

    Science.gov (United States)

    Agliari, E.; Annibale, A.; Barra, A.; Coolen, A. C. C.; Tantari, D.

    2017-01-01

    The similarity between neural and (adaptive) immune networks has been known for decades, but so far we did not understand the mechanism that allows the immune system, unlike associative neural networks, to recall and execute a large number of memorized defense strategies in parallel. The explanation turns out to lie in the network topology. Neurons interact typically with a large number of other neurons, whereas interactions among lymphocytes in immune networks are very specific, and described by graphs with finite connectivity. In this paper we use replica techniques to solve a statistical mechanical immune network model with “coordinator branches” (T-cells) and “effector branches” (B-cells), and show how the finite connectivity enables the coordinators to manage an extensive number of effectors simultaneously, even above the percolation threshold (where clonal cross-talk is not negligible). A consequence of its underlying topological sparsity is that the adaptive immune system exhibits only weak ergodicity breaking, so that also spontaneous switch-like effects as bi-stabilities are present: the latter may play a significant role in the maintenance of immune homeostasis.

  12. Study on recognition algorithm for paper currency numbers based on neural network

    Science.gov (United States)

    Li, Xiuyan; Liu, Tiegen; Li, Yuanyao; Zhang, Zhongchuan; Deng, Shichao

    2008-12-01

    Based on the unique characteristic, the paper currency numbers can be put into record and the automatic identification equipment for paper currency numbers is supplied to currency circulation market in order to provide convenience for financial sectors to trace the fiduciary circulation socially and provide effective supervision on paper currency. Simultaneously it is favorable for identifying forged notes, blacklisting the forged notes numbers and solving the major social problems, such as armor cash carrier robbery, money laundering. For the purpose of recognizing the paper currency numbers, a recognition algorithm based on neural network is presented in the paper. Number lines in original paper currency images can be draw out through image processing, such as image de-noising, skew correction, segmentation, and image normalization. According to the different characteristics between digits and letters in serial number, two kinds of classifiers are designed. With the characteristics of associative memory, optimization-compute and rapid convergence, the Discrete Hopfield Neural Network (DHNN) is utilized to recognize the letters; with the characteristics of simple structure, quick learning and global optimum, the Radial-Basis Function Neural Network (RBFNN) is adopted to identify the digits. Then the final recognition results are obtained by combining the two kinds of recognition results in regular sequence. Through the simulation tests, it is confirmed by simulation results that the recognition algorithm of combination of two kinds of recognition methods has such advantages as high recognition rate and faster recognition simultaneously, which is worthy of broad application prospect.

  13. Defense Acquisition Research Journal. Volume 21, Number 4, Issue 71, October 2014

    Science.gov (United States)

    2014-10-01

    October 2014 Vol. 21 No. 4| ISSUE 71 “... All Others Must Bring Data.” — W. Edwards Deming Report Documentation Page Form...Research Journal is “…All Others Must Bring Data.” It derives from the famous quote by American management consultant W. Edwards Deming , “In God we

  14. Global and Long-Distance Decision-Making, Environmental Issues and Network Potentials.

    Science.gov (United States)

    Samuelson, K.; And Others

    FID/TM, an international group concerned with theory and methods of systems cybernetics and information networks, held a panel session at the 34th Annual American Society for Information Science (ASIS) Meeting in November 1971. This report contains the seven papers presented by that panel, concerning issues in global decision-making and the role…

  15. Defense AR Journal. Volume 16, Number 2, Issue 51, July 2009

    Science.gov (United States)

    2009-07-01

    will become the norm. The global marketplace and the billions of con- sumers that make up the cyberspace called Web 2.0 will drive this change and...the Research and Development Branch of the eLearning Technology Center at DAU. We wrap up this issue with a Letter to the Editor called “Show Me the...arguably strategi- cally important conflicts emerged around the world. Put differently, the global security environment shifted dramatically during

  16. Defense AR Journal. Volume 16, Number 3, Issue 52, October 2009

    Science.gov (United States)

    2009-10-01

    Journal (ARJ) print year. FROM THE EDITOR I am excited to announce the lineup of research articles for Issue 52 of the Defense Acquisition Review... identification and causality, and to prevent the variety generated by EA from reducing total product performance. From Amorphous to Defined: Balancing Risks in...possible in this environment, and will allow better flow of strategic-level acquisition advice, including the identification of existing and

  17. I-tese newsletter - Number 10 - 2010 I-tese Day special issue

    International Nuclear Information System (INIS)

    Devezeaux de Lavergne, Jean-Guy; Bigot, Bernard; Mathonniere, Gilles; Legee, Frederic; Popiolek, Nathalie; Imbach, Juliette; Mansilla, Christine; Le Duigou, Alain; Avril, Sophie; Thais, Francoise

    2010-01-01

    After a speech on energy efficiency as a major challenge for the planet and for France, the articles of this issue address the assessment of the efficiency of nuclear energy, propose an economic analysis of R and D value in the field of fourth generation fast reactors, discuss the energy efficiency of biofuels, discuss the relationship between energy efficiency and economic competitiveness in the case of a hydrogen mass production process, discuss the efficiency of the photovoltaic solar energy

  18. Trusted Data Communication and Security Issues in Gnss Network of Turkey

    Science.gov (United States)

    Bakici, S.; Erkek, B.; Manti, V.; Altekin, A.

    2017-11-01

    There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr), Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department's specialists since 2005. TUSAGA-Aktif (CORS-Tr) System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  19. TRUSTED DATA COMMUNICATION AND SECURITY ISSUES IN GNSS NETWORK OF TURKEY

    Directory of Open Access Journals (Sweden)

    S. Bakici

    2017-11-01

    Full Text Available There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr, Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department’s specialists since 2005. TUSAGA-Aktif (CORS-Tr System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  20. Predicting Causes of Data Quality Issues in a Clinical Data Research Network.

    Science.gov (United States)

    Khare, Ritu; Ruth, Byron J; Miller, Matthew; Tucker, Joshua; Utidjian, Levon H; Razzaghi, Hanieh; Patibandla, Nandan; Burrows, Evanette K; Bailey, L Charles

    2018-01-01

    Clinical data research networks (CDRNs) invest substantially in identifying and investigating data quality problems. While identification is largely automated, the investigation and resolution are carried out manually at individual institutions. In the PEDSnet CDRN, we found that only approximately 35% of the identified data quality issues are resolvable as they are caused by errors in the extract-transform-load (ETL) code. Nonetheless, with no prior knowledge of issue causes, partner institutions end up spending significant time investigating issues that represent either inherent data characteristics or false alarms. This work investigates whether the causes (ETL, Characteristic, or False alarm) can be predicted before spending time investigating issues. We trained a classifier on the metadata from 10,281 real-world data quality issues, and achieved a cause prediction F1-measure of up to 90%. While initially tested on PEDSnet, the proposed methodology is applicable to other CDRNs facing similar bottlenecks in handling data quality results.

  1. Education by the Numbers: The Fiscal Effect of School Choice Programs, 1990-2006. School Choice Issues in Depth

    Science.gov (United States)

    Aud, Susan L.

    2007-01-01

    School choice programs, which allow students to attend the public or private school of their choice using public funds, have taken root in the U.S. and are growing rapidly both in number and size. Their fiscal impact has become an important political issue. Proponents say school choice saves money because private schooling is more efficient,…

  2. On the number of different dynamics in Boolean networks with deterministic update schedules.

    Science.gov (United States)

    Aracena, J; Demongeot, J; Fanchon, E; Montalva, M

    2013-04-01

    Deterministic Boolean networks are a type of discrete dynamical systems widely used in the modeling of genetic networks. The dynamics of such systems is characterized by the local activation functions and the update schedule, i.e., the order in which the nodes are updated. In this paper, we address the problem of knowing the different dynamics of a Boolean network when the update schedule is changed. We begin by proving that the problem of the existence of a pair of update schedules with different dynamics is NP-complete. However, we show that certain structural properties of the interaction diagraph are sufficient for guaranteeing distinct dynamics of a network. In [1] the authors define equivalence classes which have the property that all the update schedules of a given class yield the same dynamics. In order to determine the dynamics associated to a network, we develop an algorithm to efficiently enumerate the above equivalence classes by selecting a representative update schedule for each class with a minimum number of blocks. Finally, we run this algorithm on the well known Arabidopsis thaliana network to determine the full spectrum of its different dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Dynamics of Number of Packets in Transit in Free Flow State of Data Network

    International Nuclear Information System (INIS)

    Shengkun Xie; Lawniczak, A.T.

    2011-01-01

    We study how the dynamics of Number of Packets in Transit (NPT) is affected by the coupling of a routing type with a volume of incoming packet traffic in a data network model of packet switching type. The NPT is a network performance indicator of an aggregate type that measures in '' real time '', how many packets are in the network on their routes to their destinations. We conduct our investigation using a time-discrete simulation model that is an abstraction of the Network Layer of the ISO OSI Seven Layer Reference Model. This model focuses on packets and their routing. We consider a static routing and two different types of dynamic routings coupled with different volumes of incoming packet traffic in the network free flow state. Our study shows that the order of the values of the NPT mean value time series depends on the coupling of a routing type with a volume of incoming packet traffic and changes when the volume of incoming packet traffic increases and is closed to the critical source load values, i.e. when it is closed to the phase transition points from the network free flow state to its congested states. (authors)

  4. The issue of cavitation number value in studies of water treatment by hydrodynamic cavitation.

    Science.gov (United States)

    Šarc, Andrej; Stepišnik-Perdih, Tadej; Petkovšek, Martin; Dular, Matevž

    2017-01-01

    Within the last years there has been a substantial increase in reports of utilization of hydrodynamic cavitation in various applications. It has came to our attention that many times the results are poorly repeatable with the main reason being that the researchers put significant emphasis on the value of the cavitation number when describing the conditions at which their device operates. In the present paper we firstly point to the fact that the cavitation number cannot be used as a single parameter that gives the cavitation condition and that large inconsistencies in the reports exist. Then we show experiments where the influences of the geometry, the flow velocity, the medium temperature and quality on the size, dynamics and aggressiveness of cavitation were assessed. Finally we show that there are significant inconsistencies in the definition of the cavitation number itself. In conclusions we propose a number of parameters, which should accompany any report on the utilization of hydrodynamic cavitation, to make it repeatable and to enable faster progress of science and technology development. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Defense Acquisition Research Journal. Volume 18, Number 4, Issue 60, October 2011

    Science.gov (United States)

    2011-10-01

    number form of citation ) as outlined in the Publication Manual of the American Psychological Association (6th Edition). For all other style questions...please refer to the Chicago Manual of Style (15th Edition). Contributors are encouraged to seek the advice of a reference librarian in completing...From Workforce to Warfighter Diagnosing Key Drivers of Job Impact and Business Results Attributable to Training at the Defense Acquisition

  6. Defense Acquisition Research Journal. Volume 18, Number 2, Issue 58, April 2011

    Science.gov (United States)

    2011-04-01

    submit your manuscript with references in APA format (author- date-page number form of citation) as outlined in the Publication Manual of the American...Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th Edition ). Contributors are...Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  7. Defense Acquisition Research Journal. Volume 20, Number 2, Issue 66, July 2013

    Science.gov (United States)

    2013-07-01

    your manuscript with references in APA format (author-date-page number form of citation) as outlined in the Publication Manual of the American...Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th Edition ). Contributors are...1 7/8/2013 11:11:37 AM Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is

  8. Defense Acquisition Research Journal. Volume 19, Number 3, Issue 63, July 2012

    Science.gov (United States)

    2012-07-01

    submit your manuscript with references in APA format (author-date-page number form of citation) as outlined in the Publication Manual of the American...Psycho- logical Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th Edition ). Contributors are... Publications Assistants/ Graphic Designers Janet Amedome Lisa Drobek Multimedia Assistant Noelia Perez Editing , Design, and Layout Schatz Publishing Group The

  9. Trajectory of a synthetic jet issuing into a high Reynolds number turbulent boundary layer

    Science.gov (United States)

    Berk, Tim; Baidya, Rio; de Silva, Charitha; Marusic, Ivan; Hutchins, Nicholas; Ganapathisubramani, Bharathram

    2017-11-01

    Synthetic jets are zero-net-mass-flux actuators that can be used in a range of flow control applications. For several pulsed/synthetic jet in cross-flow applications the variation of the jet trajectory in the mean flow with jet and boundary layer parameters is important. This trajectory will provide an indication of the penetration depth of the pulsed/synthetic jet into a boundary layer. Trajectories of a synthetic jet in a turbulent boundary layer are measured for a range of actuation parameters in both low- and high Reynolds numbers (up to Reτ = 13000). The important parameters influencing the trajectory are determined from these measurements. The Reynolds number of the boundary layer is shown to only have a small effect on the trajectory. In fact, the critical parameters are found to be the Strouhal number of the jet based on jet dimensions as well as the velocity ratio of the jet (defined as a ratio between peak jet velocity and the freestream velocity). An expression for the trajectory of the synthetic (or pulsed) jet is derived from the data, which (in the limit) is consistent with known expressions for the trajectory of a steady jet in a cross-flow. T.B. and B.G. are grateful to the support from the ERC (Grant Agreement No. 277472) and the EPSRC (Grant ref. no. EP/L006383/1).

  10. Incremental Optimization of Hub and Spoke Network for the Spokes’ Numbers and Flow

    Directory of Open Access Journals (Sweden)

    Yanfeng Wang

    2015-01-01

    Full Text Available Hub and spoke network problem is solved as part of a strategic decision making process which may have a profound effect on the future of enterprises. In view of the existing network structure, as time goes on, the number of spokes and the flow change because of different sources of uncertainty. Hence, the incremental optimization of hub and spoke network problem is considered in this paper, and the policy makers should adopt a series of strategies to cope with the change, such as setting up new hubs, adjusting the capacity level of original hubs, or closing some original hubs. The objective is to minimize the total cost, which includes the setup costs for the new hubs, the closure costs, and the adjustment costs for the original hubs as well as the flow routing costs. Two mixed-integer linear programming formulations are proposed and analyzed for this problem. China Deppon Logistics as an example is performed to present computational analysis, and we analyze the changes in the solutions driven by the number of spokes and the flow. The tests also allow an analysis to consider the effect of variation in parameters on network.

  11. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-12-01

    Full Text Available Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs. Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  12. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  13. Guidance for RNA-seq co-expression network construction and analysis: safety in numbers.

    Science.gov (United States)

    Ballouz, S; Verleyen, W; Gillis, J

    2015-07-01

    RNA-seq co-expression analysis is in its infancy and reasonable practices remain poorly defined. We assessed a variety of RNA-seq expression data to determine factors affecting functional connectivity and topology in co-expression networks. We examine RNA-seq co-expression data generated from 1970 RNA-seq samples using a Guilt-By-Association framework, in which genes are assessed for the tendency of co-expression to reflect shared function. Minimal experimental criteria to obtain performance on par with microarrays were >20 samples with read depth >10 M per sample. While the aggregate network constructed shows good performance (area under the receiver operator characteristic curve ∼0.71), the dependency on number of experiments used is nearly identical to that present in microarrays, suggesting thousands of samples are required to obtain 'gold-standard' co-expression. We find a major topological difference between RNA-seq and microarray co-expression in the form of low overlaps between hub-like genes from each network due to changes in the correlation of expression noise within each technology. jgillis@cshl.edu or sballouz@cshl.edu Networks are available at: http://gillislab.labsites.cshl.edu/supplements/rna-seq-networks/ and supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  14. Design issues of optical router for metropolitan optical network (MON) applications

    Science.gov (United States)

    Wei, Wei; Zeng, QingJi

    2001-10-01

    The popularity of the Internet has caused the traffic on the Metro Area Network (MAN) to grow drastically every year. It is believed that Wavelength Division Multiplexing (WDM) has become a cornerstone technology in the MAN. Solutions to provide a MAN with high bandwidth, good scalability and easy management are being constantly searched from both IP and WDM. In this paper we firstly propose a metro optical network architecture based on GMPLS--a flexible, highly scalable IP over WDM optical network architecture for the delivery of public network IP services. Two kinds of node including Electronic Label Switching Router (E-LSR) and Optical Router (O-LSR) are involved in this metro optical network architecture. Secondly, we mainly focus on design issues of OR including multi-granularity electro-optical hybrid switching fabrics, intelligent OTU, contro l plane software and etc. And we also discuss some issues such as routing, forwarding and management of OR. Finally, we reach conclusions that OR based on GMPLS and hybrid-switching fabrics is suitable for current multi-services application environment of MON and optimistic for IP traffic transfer.

  15. A sparse regulatory network of copy-number driven gene expression reveals putative breast cancer oncogenes.

    Science.gov (United States)

    Yuan, Yinyin; Curtis, Christina; Caldas, Carlos; Markowetz, Florian

    2012-01-01

    Copy number aberrations are recognized to be important in cancer as they may localize to regions harboring oncogenes or tumor suppressors. Such genomic alterations mediate phenotypic changes through their impact on expression. Both cis- and transacting alterations are important since they may help to elucidate putative cancer genes. However, amidst numerous passenger genes, trans-effects are less well studied due to the computational difficulty in detecting weak and sparse signals in the data, and yet may influence multiple genes on a global scale. We propose an integrative approach to learn a sparse interaction network of DNA copy-number regions with their downstream transcriptional targets in breast cancer. With respect to goodness of fit on both simulated and real data, the performance of sparse network inference is no worse than other state-of-the-art models but with the advantage of simultaneous feature selection and efficiency. The DNA-RNA interaction network helps to distinguish copy-number driven expression alterations from those that are copy-number independent. Further, our approach yields a quantitative copy-number dependency score, which distinguishes cis- versus trans-effects. When applied to a breast cancer data set, numerous expression profiles were impacted by cis-acting copy-number alterations, including several known oncogenes such as GRB7, ERBB2, and LSM1. Several trans-acting alterations were also identified, impacting genes such as ADAM2 and BAGE, which warrant further investigation. An R package named lol is available from www.markowetzlab.org/software/lol.html.

  16. Sandia technology. Volume 13, number 2 Special issue: verification of arms control treaties

    International Nuclear Information System (INIS)

    1989-01-01

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  17. Transnational issue-specific expert networking: A pathway to local policy change.

    Science.gov (United States)

    O'Brien, Cheryl

    2015-12-01

    This article reports on key findings from a study of subnational governments in Mexico and Nigeria (O'Brien, 2013). With empirical richness of the case study method and small-n statistical analysis across the subnational units for each country, this study asks: How can we push the needle toward more progressive policy change on violence against women in developing and democratizing contexts? This study finds that issue-specific expert networking is a civic pathway to subnational policy responsiveness in Mexico and Nigeria. The dynamics of this pathway illuminate local-global political connections, and this study shows how issue-specific expert networking is important for the diffusion of an international norm and policies on violence against women. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Presentation of our Issue 6, number 11 “Language and power relations”

    Directory of Open Access Journals (Sweden)

    Rolando Blas Sánchez

    2018-01-01

    Full Text Available It is estimated that there are around 7,000 languages in the world.  Only some of them have the status of being official languages and others are international languages. Many times, their status is linked to economic or political factors. In other cases, it is due to the colonizing inheritance. Those languages that do not enjoy a high status end up having limited spaces for their use or perishing if they cease to be transmitted to subsequent generations of speakers. This phenomenon occurs in all latitudes of the world. In the particular case of Our America, we can find this problematic with the indigenous languages and, although less visible, but with the same importance, with the Creole languages. For the readers of our magazine, in number 11 of this publication, we present a varied discussion about some practices of languages and their interactions with others. There are historical studies on the subversive power and resistance of indigenous languages, pedagogical proposals to maintain and revitalize them, strategic approaches to decolonization of thought and knowledge, analyses of the relationship between language, power and identity, and reflections on the situation of other languages that coexist in multilingual areas such as Creole and the difficulties and prejudices they face because they do not have a high status.

  19. Some Issues of the Paradigm of Multi-learning Machine - Modular Neural Networks

    DEFF Research Database (Denmark)

    Wang, Pan; Feng, Shuai; Fan, Zhun

    2009-01-01

    This paper addresses some issues on the weighted linear integration of modular neural networks (MNN: a paradigm of hybrid multi-learning machines). First, from the general meaning of variable weights and variable elements synthesis, three basic kinds of integrated models are discussed...... a general form while the corresponding computational algorithms are described briefly. The authors present a new training algorithm of sub-networks named “'Expert in one thing and good at many' (EOGM).” In this algorithm, every sub-network is trained on a primary dataset with some of its near neighbors...... as the accessorial datasets. Simulated results with a kind of dynamic integration methods show the effectiveness of these algorithms, where the performance of the algorithm with EOGM is better than that of the algorithm with a common training method....

  20. Issues for the integration of satellite and terrestrial cellular networks for mobile communications

    Science.gov (United States)

    Delre, Enrico; Mistretta, Ignazio; Dellipriscoli, Francesco; Settimo, Franco

    1991-01-01

    Satellite and terrestrial cellular systems naturally complement each other for land mobile communications, even though present systems have been developed independently. The main advantages of the integrated system are a faster wide area coverage, a better management of overloading traffic conditions, an extension to geographical areas not covered by the terrestrial network and, in perspective, the provision of only one integrated system for all mobile communications (land, aeronautical, and maritime). To achieve these goals, as far as possible the same protocols of the terrestrial network should be used also for the satellite network. Discussed here are the main issues arising from the requirements of the main integrated system. Some results are illustrated, and possible future improvements due to technical solutions are presented.

  1. Network-level reproduction number and extinction threshold for vector-borne diseases.

    Science.gov (United States)

    Xue, Ling; Scoglio, Caterina

    2015-06-01

    The basic reproduction number of deterministic models is an essential quantity to predict whether an epidemic will spread or not. Thresholds for disease extinction contribute crucial knowledge of disease control, elimination, and mitigation of infectious diseases. Relationships between basic reproduction numbers of two deterministic network-based ordinary differential equation vector-host models, and extinction thresholds of corresponding stochastic continuous-time Markov chain models are derived under some assumptions. Numerical simulation results for malaria and Rift Valley fever transmission on heterogeneous networks are in agreement with analytical results without any assumptions, reinforcing that the relationships may always exist and proposing a mathematical problem for proving existence of the relationships in general. Moreover, numerical simulations show that the basic reproduction number does not monotonically increase or decrease with the extinction threshold. Consistent trends of extinction probability observed through numerical simulations provide novel insights into mitigation strategies to increase the disease extinction probability. Research findings may improve understandings of thresholds for disease persistence in order to control vector-borne diseases.

  2. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  3. A methodology for the synthesis of heat exchanger networks having large numbers of uncertain parameters

    International Nuclear Information System (INIS)

    Novak Pintarič, Zorka; Kravanja, Zdravko

    2015-01-01

    This paper presents a robust computational methodology for the synthesis and design of flexible HEN (Heat Exchanger Networks) having large numbers of uncertain parameters. This methodology combines several heuristic methods which progressively lead to a flexible HEN design at a specific level of confidence. During the first step, a HEN topology is generated under nominal conditions followed by determining those points critical for flexibility. A significantly reduced multi-scenario model for flexible HEN design is formulated at the nominal point with the flexibility constraints at the critical points. The optimal design obtained is tested by stochastic Monte Carlo optimization and the flexibility index through solving one-scenario problems within a loop. This presented methodology is novel regarding the enormous reduction of scenarios in HEN design problems, and computational effort. Despite several simplifications, the capability of designing flexible HENs with large numbers of uncertain parameters, which are typical throughout industry, is not compromised. An illustrative case study is presented for flexible HEN synthesis comprising 42 uncertain parameters. - Highlights: • Methodology for HEN (Heat Exchanger Network) design under uncertainty is presented. • The main benefit is solving HENs having large numbers of uncertain parameters. • Drastically reduced multi-scenario HEN design problem is formulated through several steps. • Flexibility of HEN is guaranteed at a specific level of confidence.

  4. Estimating marine aerosol particle volume and number from Maritime Aerosol Network data

    Directory of Open Access Journals (Sweden)

    A. M. Sayer

    2012-09-01

    Full Text Available As well as spectral aerosol optical depth (AOD, aerosol composition and concentration (number, volume, or mass are of interest for a variety of applications. However, remote sensing of these quantities is more difficult than for AOD, as it is more sensitive to assumptions relating to aerosol composition. This study uses spectral AOD measured on Maritime Aerosol Network (MAN cruises, with the additional constraint of a microphysical model for unpolluted maritime aerosol based on analysis of Aerosol Robotic Network (AERONET inversions, to estimate these quantities over open ocean. When the MAN data are subset to those likely to be comprised of maritime aerosol, number and volume concentrations obtained are physically reasonable. Attempts to estimate surface concentration from columnar abundance, however, are shown to be limited by uncertainties in vertical distribution. Columnar AOD at 550 nm and aerosol number for unpolluted maritime cases are also compared with Moderate Resolution Imaging Spectroradiometer (MODIS data, for both the present Collection 5.1 and forthcoming Collection 6. MODIS provides a best-fitting retrieval solution, as well as the average for several different solutions, with different aerosol microphysical models. The "average solution" MODIS dataset agrees more closely with MAN than the "best solution" dataset. Terra tends to retrieve lower aerosol number than MAN, and Aqua higher, linked with differences in the aerosol models commonly chosen. Collection 6 AOD is likely to agree more closely with MAN over open ocean than Collection 5.1. In situations where spectral AOD is measured accurately, and aerosol microphysical properties are reasonably well-constrained, estimates of aerosol number and volume using MAN or similar data would provide for a greater variety of potential comparisons with aerosol properties derived from satellite or chemistry transport model data. However, without accurate AOD data and prior knowledge of

  5. A sparse autoencoder-based deep neural network for protein solvent accessibility and contact number prediction.

    Science.gov (United States)

    Deng, Lei; Fan, Chao; Zeng, Zhiwen

    2017-12-28

    Direct prediction of the three-dimensional (3D) structures of proteins from one-dimensional (1D) sequences is a challenging problem. Significant structural characteristics such as solvent accessibility and contact number are essential for deriving restrains in modeling protein folding and protein 3D structure. Thus, accurately predicting these features is a critical step for 3D protein structure building. In this study, we present DeepSacon, a computational method that can effectively predict protein solvent accessibility and contact number by using a deep neural network, which is built based on stacked autoencoder and a dropout method. The results demonstrate that our proposed DeepSacon achieves a significant improvement in the prediction quality compared with the state-of-the-art methods. We obtain 0.70 three-state accuracy for solvent accessibility, 0.33 15-state accuracy and 0.74 Pearson Correlation Coefficient (PCC) for the contact number on the 5729 monomeric soluble globular protein dataset. We also evaluate the performance on the CASP11 benchmark dataset, DeepSacon achieves 0.68 three-state accuracy and 0.69 PCC for solvent accessibility and contact number, respectively. We have shown that DeepSacon can reliably predict solvent accessibility and contact number with stacked sparse autoencoder and a dropout approach.

  6. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy...... consumption of the terminals with respect to their workload and the overhead of distributing tasks among terminals are taken into account. The paper shows, that the number of cooperating terminals is in general limited to a few, though alternating with respect to the various system parameters....

  7. Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: A Survey and Open Issues

    Science.gov (United States)

    Eslaminejad, Mohammadreza; Razak, Shukor Abd

    2012-01-01

    Wireless sensor networks basically consist of low cost sensor nodes which collect data from environment and relay them to a sink, where they will be subsequently processed. Since wireless nodes are severely power-constrained, the major concern is how to conserve the nodes' energy so that network lifetime can be extended significantly. Employing one static sink can rapidly exhaust the energy of sink neighbors. Furthermore, using a non-optimal single path together with a maximum transmission power level may quickly deplete the energy of individual nodes on the route. This all results in unbalanced energy consumption through the sensor field, and hence a negative effect on the network lifetime. In this paper, we present a comprehensive taxonomy of the various mechanisms applied for increasing the network lifetime. These techniques, whether in the routing or cross-layer area, fall within the following types: multi-sink, mobile sink, multi-path, power control and bio-inspired algorithms, depending on the protocol operation. In this taxonomy, special attention has been devoted to the multi-sink, power control and bio-inspired algorithms, which have not yet received much consideration in the literature. Moreover, each class covers a variety of the state-of-the-art protocols, which should provide ideas for potential future works. Finally, we compare these mechanisms and discuss open research issues. PMID:23202008

  8. A joint european initiative on IASCC issues: the new Amalia nuclear network

    International Nuclear Information System (INIS)

    Sevini, F.; Debarberis, L.; Toerroenen, K.; Iracane, D.; Van Dijk, S.

    2002-01-01

    The Institute for energy of the joint research center of the European Commission has recently organized a workshop on IASCC (irradiation-assisted stress corrosion cracking) issues at Petten, with the participation of Tractebel, CEA, EDF, Ringhals, NRI from Czech Republic and of many other institutes. The conclusions showed that in-core IASCC experiments are lacking and should be developed in order to make substantial progress in the field. Beside these technical considerations, it is also important to propose an European program to set our own standards instead of relying on American propositions. The next action is therefore establishing a European network of IASCC specialists, with an integrated laboratory, formed by the complementary tools provided by the member institutions. The new network will exchange information, results and will coordinate the use of resources. AMALIA is the acronym for ''assessment of materials ageing under load and irradiation-assisted corrosion''. (A.C.)

  9. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the sub-systems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  10. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the subsystems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  11. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  12. Social networking use and RescueTime: The issue of engagement

    OpenAIRE

    Collins, E.I.M.; Cox, A.L.; Bird, J.; Harrison, D.

    2014-01-01

    The dramatic rise in the use of social network sites (SNS) has resulted in a number of users feeling stressed about the extent of their personal use. Previous work has established that daily retrospective estimations of SNS use and access to RescueTime not only improve accuracy of estimations but also reduce perceived stress. The present study aimed to extend this by also exploring the influence of prospective estimations on stress and perceived time management. However, the study was thwarte...

  13. GPP Webinar: Solar Utilization in Higher Education Networking & Information Sharing Group: RFP, Contract, and Administrative Issues Discussion

    Science.gov (United States)

    This presentation from a Solar Utilization in Higher Education Networking and Information webinar covers contracts, Request for Proposals (RFPs), and administrative issues related to solar project development in the higher education sector.

  14. Introduction to focus issue: Synchronization in large networks and continuous media—data, models, and supermodels

    Science.gov (United States)

    Duane, Gregory S.; Grabow, Carsten; Selten, Frank; Ghil, Michael

    2017-12-01

    The synchronization of loosely coupled chaotic systems has increasingly found applications to large networks of differential equations and to models of continuous media. These applications are at the core of the present Focus Issue. Synchronization between a system and its model, based on limited observations, gives a new perspective on data assimilation. Synchronization among different models of the same system defines a supermodel that can achieve partial consensus among models that otherwise disagree in several respects. Finally, novel methods of time series analysis permit a better description of synchronization in a system that is only observed partially and for a relatively short time. This Focus Issue discusses synchronization in extended systems or in components thereof, with particular attention to data assimilation, supermodeling, and their applications to various areas, from climate modeling to macroeconomics.

  15. Introduction to focus issue: Synchronization in large networks and continuous media-data, models, and supermodels.

    Science.gov (United States)

    Duane, Gregory S; Grabow, Carsten; Selten, Frank; Ghil, Michael

    2017-12-01

    The synchronization of loosely coupled chaotic systems has increasingly found applications to large networks of differential equations and to models of continuous media. These applications are at the core of the present Focus Issue. Synchronization between a system and its model, based on limited observations, gives a new perspective on data assimilation. Synchronization among different models of the same system defines a supermodel that can achieve partial consensus among models that otherwise disagree in several respects. Finally, novel methods of time series analysis permit a better description of synchronization in a system that is only observed partially and for a relatively short time. This Focus Issue discusses synchronization in extended systems or in components thereof, with particular attention to data assimilation, supermodeling, and their applications to various areas, from climate modeling to macroeconomics.

  16. Issues in networking and research funding for the European Association of Health Law.

    Science.gov (United States)

    Townend, David; Duguet, Anne-Marie

    2008-09-01

    All academics, perhaps with the exception of those who are hermits with independent private means, are concerned with questions of networking and research funding. The nature of academic life is to search out new ideas and revisit old ones, and to discuss these ideas with others. This requires networks of colleagues and funding to provide the basic resources of time and literature. This may be at the local level, but increasingly the expectation is that these activities should become more and more elaborate; our networks are now international, and our time and resources cost ever increasing amounts which, for many if not most academics, must be found outside the general budget of the home University. Our success as academics is measured, in increasing part, on our ability to show our networking and external funding credentials. There is a more resounding reason to pursue both networking and externally funded research: through such projects the experience of each individual can be increased such that the result is far greater than one could achieve alone. Networking and external funding are not ends in themselves, but they can and should be a great enhancement to academic life and contribution. None of this is news or a novel claim; it is simply today's environment. This paper considers some opportunities for how networking and externally funded research might help the EAHL to realise its aims in developing the discipline of health law. We, as authors, do not claim any special expertise in the area, and readers are quite justified in thinking "who are they to talk to us about what we clearly know much more about?" However, we were asked to start a discussion at the inaugural conference of the Association, and the thoughts that we present now were designed to do that. It is a discussion which will form one of the early activities of the Association. Here the paper is divided first issues concerning networking, and second those concerning research funding from sources

  17. Birth of scale-free molecular networks and the number of distinct DNA and protein domains per genome.

    Science.gov (United States)

    Rzhetsky, A; Gomez, S M

    2001-10-01

    Current growth in the field of genomics has provided a number of exciting approaches to the modeling of evolutionary mechanisms within the genome. Separately, dynamical and statistical analyses of networks such as the World Wide Web and the social interactions existing between humans have shown that these networks can exhibit common fractal properties-including the property of being scale-free. This work attempts to bridge these two fields and demonstrate that the fractal properties of molecular networks are linked to the fractal properties of their underlying genomes. We suggest a stochastic model capable of describing the evolutionary growth of metabolic or signal-transduction networks. This model generates networks that share important statistical properties (so-called scale-free behavior) with real molecular networks. In particular, the frequency of vertices connected to exactly k other vertices follows a power-law distribution. The shape of this distribution remains invariant to changes in network scale: a small subgraph has the same distribution as the complete graph from which it is derived. Furthermore, the model correctly predicts that the frequencies of distinct DNA and protein domains also follow a power-law distribution. Finally, the model leads to a simple equation linking the total number of different DNA and protein domains in a genome with both the total number of genes and the overall network topology. MatLab (MathWorks, Inc.) programs described in this manuscript are available on request from the authors. ar345@columbia.edu.

  18. Predicting octane number using nuclear magnetic resonance spectroscopy and artificial neural networks

    KAUST Repository

    Abdul Jameel, Abdul Gani

    2018-04-17

    Machine learning algorithms are attracting significant interest for predicting complex chemical phenomenon. In this work, a model to predict research octane number (RON) and motor octane number (MON) of pure hydrocarbons, hydrocarbon-ethanol blends and gasoline-ethanol blends has been developed using artificial neural networks (ANN) and molecular parameters from 1H nuclear Magnetic Resonance (NMR) spectroscopy. RON and MON of 128 pure hydrocarbons, 123 hydrocarbon-ethanol blends of known composition and 30 FACE (fuels for advanced combustion engines) gasoline-ethanol blends were utilized as a dataset to develop the ANN model. The effect of weight % of seven functional groups including paraffinic CH3 groups, paraffinic CH2 groups, paraffinic CH groups, olefinic -CH=CH2 groups, naphthenic CH-CH2 groups, aromatic C-CH groups and ethanolic OH groups on RON and MON was studied. The effect of branching (i.e., methyl substitution), denoted by a parameter termed as branching index (BI), and molecular weight (MW) were included as inputs along with the seven functional groups to predict RON and MON. The topology of the developed ANN models for RON (9-540-314-1) and MON (9-340-603-1) have two hidden layers and a large number of nodes, and was validated against experimentally measured RON and MON of pure hydrocarbons, hydrocarbon-ethanol and gasoline-ethanol blends; a good correlation (R2=0.99) between the predicted and the experimental data was obtained. The average error of prediction for both RON and MON was found to be 1.2 which is close to the range of experimental uncertainty. This shows that the functional groups in a molecule or fuel can be used to predict its ON, and the complex relationship between them can be captured by tools like ANN.

  19. Predicting octane number using nuclear magnetic resonance spectroscopy and artificial neural networks

    KAUST Repository

    Abdul Jameel, Abdul Gani; Oudenhoven, Vincent Van; Emwas, Abdul-Hamid M.; Sarathy, Mani

    2018-01-01

    Machine learning algorithms are attracting significant interest for predicting complex chemical phenomenon. In this work, a model to predict research octane number (RON) and motor octane number (MON) of pure hydrocarbons, hydrocarbon-ethanol blends and gasoline-ethanol blends has been developed using artificial neural networks (ANN) and molecular parameters from 1H nuclear Magnetic Resonance (NMR) spectroscopy. RON and MON of 128 pure hydrocarbons, 123 hydrocarbon-ethanol blends of known composition and 30 FACE (fuels for advanced combustion engines) gasoline-ethanol blends were utilized as a dataset to develop the ANN model. The effect of weight % of seven functional groups including paraffinic CH3 groups, paraffinic CH2 groups, paraffinic CH groups, olefinic -CH=CH2 groups, naphthenic CH-CH2 groups, aromatic C-CH groups and ethanolic OH groups on RON and MON was studied. The effect of branching (i.e., methyl substitution), denoted by a parameter termed as branching index (BI), and molecular weight (MW) were included as inputs along with the seven functional groups to predict RON and MON. The topology of the developed ANN models for RON (9-540-314-1) and MON (9-340-603-1) have two hidden layers and a large number of nodes, and was validated against experimentally measured RON and MON of pure hydrocarbons, hydrocarbon-ethanol and gasoline-ethanol blends; a good correlation (R2=0.99) between the predicted and the experimental data was obtained. The average error of prediction for both RON and MON was found to be 1.2 which is close to the range of experimental uncertainty. This shows that the functional groups in a molecule or fuel can be used to predict its ON, and the complex relationship between them can be captured by tools like ANN.

  20. Generation of a superposition of odd photon number states for quantum information networks

    DEFF Research Database (Denmark)

    Neergaard-Nielsen, Jonas Schou; Nielsen, B.; Hettich, C.

    2006-01-01

    Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August......Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August...

  1. Allocation and management issues in multiple-transaction open access transmission networks

    Science.gov (United States)

    Tao, Shu

    This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical

  2. Security and privacy issues in wireless sensor networks for healthcare applications.

    Science.gov (United States)

    Al Ameen, Moshaddique; Liu, Jingwei; Kwak, Kyungsup

    2012-02-01

    The use of wireless sensor networks (WSN) in healthcare applications is growing in a fast pace. Numerous applications such as heart rate monitor, blood pressure monitor and endoscopic capsule are already in use. To address the growing use of sensor technology in this area, a new field known as wireless body area networks (WBAN or simply BAN) has emerged. As most devices and their applications are wireless in nature, security and privacy concerns are among major areas of concern. Due to direct involvement of humans also increases the sensitivity. Whether the data gathered from patients or individuals are obtained with the consent of the person or without it due to the need by the system, misuse or privacy concerns may restrict people from taking advantage of the full benefits from the system. People may not see these devices safe for daily use. There may also possibility of serious social unrest due to the fear that such devices may be used for monitoring and tracking individuals by government agencies or other private organizations. In this paper we discuss these issues and analyze in detail the problems and their possible measures.

  3. Exotic plant infestation is associated with decreased modularity and increased numbers of connectors in mixed-grass prairie pollination networks

    Science.gov (United States)

    Larson, Diane L.; Rabie, Paul A.; Droege, Sam; Larson, Jennifer L.; Haar, Milton

    2016-01-01

    The majority of pollinating insects are generalists whose lifetimes overlap flowering periods of many potentially suitable plant species. Such generality is instrumental in allowing exotic plant species to invade pollination networks. The particulars of how existing networks change in response to an invasive plant over the course of its phenology are not well characterized, but may shed light on the probability of long-term effects on plant-pollinator interactions and the stability of network structure. Here we describe changes in network topology and modular structure of infested and non-infested networks during the flowering season of the generalist non-native flowering plant, Cirsium arvense in mixed-grass prairie at Badlands National Park, South Dakota, USA. Objectives were to compare network-level effects of infestation as they propagate over the season in infested and non-infested (with respect to C. arvense) networks. We characterized plant-pollinator networks on 5 non-infested and 7 infested 1-ha plots during 4 sample periods that collectively covered the length of C. arvense flowering period. Two other abundantly-flowering invasive plants were present during this time: Melilotus officinalis had highly variable floral abundance in both C. arvense-infested and non-infested plots andConvolvulus arvensis, which occurred almost exclusively in infested plots and peaked early in the season. Modularity, including roles of individual species, and network topology were assessed for each sample period as well as in pooled infested and non-infested networks. Differences in modularity and network metrics between infested and non-infested networks were limited to the third and fourth sample periods, during flower senescence of C. arvenseand the other invasive species; generality of pollinators rose concurrently, suggesting rewiring of the network and a lag effect of earlier floral abundance. Modularity was lower and number of connectors higher in infested

  4. SARNET. Severe Accident Research Network - key issues in the area of source term

    International Nuclear Information System (INIS)

    Giordano, P.; Micaelli, J.C.; Haste, T.; Herranz, L.

    2005-01-01

    About fifty European organisations integrate in SARNET (Network of Excellence of the EU 6 th Framework Programme) their research capacities in resolve better the most important remaining uncertainties and safety issues concerning existing and future Nuclear Power Plants (NPPs) under hypothetical Severe Accident (SA) conditions. Wishing to maintain a long-lasting cooperation, they conduct three types of activities: integrating activities, spreading of excellence and jointly executed research. This paper summarises the main results obtained by the network after the first year, giving more prominence to those from jointly executed research in the Source Term area. Integrating activities have been performed through different means: the ASTEC integral computer code for severe accident transient modelling, through development of PSA2 methodologies, through the setting of a structure for definition of evolving R and D priorities and through the development of a web-network of data bases that hosts experimental data. Such activities have been facilitated by the development of an Advanced Communication Tool. Concerning spreading of excellence, educational courses covering Severe Accident Analysis Methodology and Level 2 PSA have been set up, to be given in early 2006. A detailed text book on Severe Accident Phenomenology has been designed and agreed amongst SARNET members. A mobility programme for students and young researchers is being developed, some detachments are already completed or in progress, and examples are quoted. Jointly executed research activities concern key issues grouped in the Corium, Containment and Source Term areas. In Source Term, behaviour of the highly radio-toxic ruthenium under oxidising conditions (like air ingress) for HBU and MOX fuel has been investigated. First modelling proposals for ASTEC have been made for oxidation of fuel and of ruthenium. Experiments on transport of highly volatile oxide ruthenium species have been performed. Reactor

  5. Tobacco industry issues management organizations: Creating a global corporate network to undermine public health

    Directory of Open Access Journals (Sweden)

    Malone Ruth E

    2008-01-01

    Full Text Available Abstract Background The global tobacco epidemic claims 5 million lives each year, facilitated by the ability of transnational tobacco companies to delay or thwart meaningful tobacco control worldwide. A series of cross-company tobacco industry "issues management organizations" has played an important role in coordinating and implementing common strategies to defeat tobacco control efforts at international, national, and regional levels. This study examines the development and enumerates the activities of these organizations and explores the implications of continuing industry cooperation for global public health. Methods Using a snowball sampling strategy, we collected documentary data from tobacco industry documents archives and assembled them into a chronologically organized case study. Results The International Committee on Smoking Issues (ICOSI was formed in 1977 by seven tobacco company chief executives to create common anti-tobacco control strategies and build a global network of regional and national manufacturing associations. The organization's name subsequently changed to INFOTAB. The multinational companies built the organization rapidly: by 1984, it had 69 members operating in 57 countries. INFOTAB material, including position papers and "action kits" helped members challenge local tobacco control measures and maintain tobacco-friendly environments. In 1992 INFOTAB was replaced by two smaller organizations. The Tobacco Documentation Centre, which continues to operate, distributes smoking-related information and industry argumentation to members, some produced by cross-company committees. Agro-Tobacco Services, and now Hallmark Marketing Services, assists the INFOTAB-backed and industry supported International Tobacco Growers Association in advancing claims regarding the economic importance of tobacco in developing nations. Conclusion The massive scale and scope of this industry effort illustrate how corporate interests, when

  6. Tobacco industry issues management organizations: creating a global corporate network to undermine public health.

    Science.gov (United States)

    McDaniel, Patricia A; Intinarelli, Gina; Malone, Ruth E

    2008-01-17

    The global tobacco epidemic claims 5 million lives each year, facilitated by the ability of transnational tobacco companies to delay or thwart meaningful tobacco control worldwide. A series of cross-company tobacco industry "issues management organizations" has played an important role in coordinating and implementing common strategies to defeat tobacco control efforts at international, national, and regional levels. This study examines the development and enumerates the activities of these organizations and explores the implications of continuing industry cooperation for global public health. Using a snowball sampling strategy, we collected documentary data from tobacco industry documents archives and assembled them into a chronologically organized case study. The International Committee on Smoking Issues (ICOSI) was formed in 1977 by seven tobacco company chief executives to create common anti-tobacco control strategies and build a global network of regional and national manufacturing associations. The organization's name subsequently changed to INFOTAB. The multinational companies built the organization rapidly: by 1984, it had 69 members operating in 57 countries. INFOTAB material, including position papers and "action kits" helped members challenge local tobacco control measures and maintain tobacco-friendly environments. In 1992 INFOTAB was replaced by two smaller organizations. The Tobacco Documentation Centre, which continues to operate, distributes smoking-related information and industry argumentation to members, some produced by cross-company committees. Agro-Tobacco Services, and now Hallmark Marketing Services, assists the INFOTAB-backed and industry supported International Tobacco Growers Association in advancing claims regarding the economic importance of tobacco in developing nations. The massive scale and scope of this industry effort illustrate how corporate interests, when threatened by the globalization of public health, sidestep competitive

  7. Tobacco industry issues management organizations: Creating a global corporate network to undermine public health

    Science.gov (United States)

    McDaniel, Patricia A; Intinarelli, Gina; Malone, Ruth E

    2008-01-01

    Background The global tobacco epidemic claims 5 million lives each year, facilitated by the ability of transnational tobacco companies to delay or thwart meaningful tobacco control worldwide. A series of cross-company tobacco industry "issues management organizations" has played an important role in coordinating and implementing common strategies to defeat tobacco control efforts at international, national, and regional levels. This study examines the development and enumerates the activities of these organizations and explores the implications of continuing industry cooperation for global public health. Methods Using a snowball sampling strategy, we collected documentary data from tobacco industry documents archives and assembled them into a chronologically organized case study. Results The International Committee on Smoking Issues (ICOSI) was formed in 1977 by seven tobacco company chief executives to create common anti-tobacco control strategies and build a global network of regional and national manufacturing associations. The organization's name subsequently changed to INFOTAB. The multinational companies built the organization rapidly: by 1984, it had 69 members operating in 57 countries. INFOTAB material, including position papers and "action kits" helped members challenge local tobacco control measures and maintain tobacco-friendly environments. In 1992 INFOTAB was replaced by two smaller organizations. The Tobacco Documentation Centre, which continues to operate, distributes smoking-related information and industry argumentation to members, some produced by cross-company committees. Agro-Tobacco Services, and now Hallmark Marketing Services, assists the INFOTAB-backed and industry supported International Tobacco Growers Association in advancing claims regarding the economic importance of tobacco in developing nations. Conclusion The massive scale and scope of this industry effort illustrate how corporate interests, when threatened by the globalization of

  8. Neutron spectrometry and dosimetry with neural networks and Bonner spheres: a study to reduce the spheres number

    International Nuclear Information System (INIS)

    Espinoza G, J. G.; Martinez B, M. R.; Leon P, A. A.; Hernandez P, C. F.; Castaneda M, V. H.; Solis S, L. O.; Castaneda M, R.; Ortiz R, J. M.; Vega C, H. R.; Mendez, R.; Gallego, E.; De Sousa L, M. A.

    2016-10-01

    For neutron spectrometry and neutron dosimetry, the Bonner spheres spectrometric system has been the most widely used system, however, the number, size and weight of the spheres composing the system, as well as the need to use a reconstruction code and the long periods of time used to carry out the measurements are some of the disadvantages of this system. For the reconstruction of the spectra, different techniques such as artificial neural networks of reverse propagation have been used. The objective of this work was to reduce the number of Bonner spheres and to use counting speeds in a reverse propagation neural network, optimized by means of the robust design methodology, to reconstruct the neutron spectra. For the design of the neural network we used the neutron spectra of the IAEA and the response matrix of the Bonner spheres with "6LiI(Eu) detector. The performance of the network was compared; using 7 Bonner spheres against other cases where only 2 and one sphere are used. The network topologies were trained 36 times for each case keeping constant the objective error (1E(-3)), the training algorithm was trains cg and the robust design methodology to determine the best network architectures. With these, the best and worst results were compared. The results obtained using 7 spheres were similar to those with the 5-in sphere, however is still in an information analysis stage. (Author)

  9. Signaling Network Assessment of Mutations and Copy Number Variations Predict Breast Cancer Subtype-Specific Drug Targets

    Directory of Open Access Journals (Sweden)

    Naif Zaman

    2013-10-01

    Full Text Available Individual cancer cells carry a bewildering number of distinct genomic alterations (e.g., copy number variations and mutations, making it a challenge to uncover genomic-driven mechanisms governing tumorigenesis. Here, we performed exome sequencing on several breast cancer cell lines that represent two subtypes, luminal and basal. We integrated these sequencing data and functional RNAi screening data (for the identification of genes that are essential for cell proliferation and survival onto a human signaling network. Two subtype-specific networks that potentially represent core-signaling mechanisms underlying tumorigenesis were identified. Within both networks, we found that genes were differentially affected in different cell lines; i.e., in some cell lines a gene was identified through RNAi screening, whereas in others it was genomically altered. Interestingly, we found that highly connected network genes could be used to correctly classify breast tumors into subtypes on the basis of genomic alterations. Further, the networks effectively predicted subtype-specific drug targets, which were experimentally validated.

  10. Dynamic mobility applications policy analysis : policy and institutional issues for intelligent network flow optimization (INFLO).

    Science.gov (United States)

    2014-12-01

    The report documents policy considerations for the Intelligent Network Flow Optimization (INFLO) connected vehicle applications : bundle. INFLO aims to optimize network flow on freeways and arterials by informing motorists of existing and impen...

  11. Optimization of the architecture of a neural network in neutron spectrometry to reduce the number of Bonner spheres

    International Nuclear Information System (INIS)

    Leon P, A. A.; Martinez B, M. R.; Hernandez P, C. F.; Espinoza G, J. G.; Castaneda M, V. H.; Solis S, L. O.; Castaneda M, R.; Ortiz R, J. M.; Vega C, H. R.; Mendez V, R.; Gallego, E.; De Sousa L, M. A.

    2016-10-01

    The neutron spectrometry is an experimental process for determining the energy distribution called the Spectrum. Among the methods available for neutron spectrometry, one can mention the Bonner Sphere Spectrometric System as one of the most used, consisting of a detector placed in the center of a set of polyethylene spheres whose diameters range from 2 to 18 inches, however has some disadvantages such as the long periods of time to perform the measurements, the weight and the spheres number that vary according to the system. From this, alternative methods such as artificial neural networks are proposed. For this project neural networks of reverse propagation were used with the methodology of robust design of artificial neural networks, with the aid of a computational tool that maximizes the performance, making the time used for the training s of the network is the smallest possible and thus gets the orthogonal fixes quickly to determine the best network topology. The counting rates of a spectrometric system with 7 spheres, 2 spheres and one sphere of 5 and 8 inches were used. This methodology seeks to reduce the work used as in the spectrometric system formed by a greater number of spheres, since to enter less data in the counting rates to obtain the spectra with 60 energy levels saves time and space, because at having a smaller number of spheres its portability is easier to move from one place to another, for this we performed several experiments with different errors until we reached the optimal error so that the topology of the network was appropriate and find the best design parameters. A statistical software JMP was also used to obtain the best topologies and thus to retrain obtaining its best and worst spectra, in order to determine if the reduction is possible. (Author)

  12. A visual sense of number emerges from the dynamics of a recurrent on-center off-surround neural network.

    Science.gov (United States)

    Sengupta, Rakesh; Surampudi, Bapi Raju; Melcher, David

    2014-09-25

    It has been proposed that the ability of humans to quickly perceive numerosity involves a visual sense of number. Different paradigms of enumeration and numerosity comparison have produced a gamut of behavioral and neuroimaging data, but there has been no unified conceptual framework that can explain results across the entire range of numerosity. The current work tries to address the ongoing debate concerning whether the same mechanism operates for enumeration of small and large numbers, through a computational approach. We describe the workings of a single-layered, fully connected network characterized by self-excitation and recurrent inhibition that operates at both subitizing and estimation ranges. We show that such a network can account for classic numerical cognition effects (the distance effect, Fechner׳s law, Weber fraction for numerosity comparison) through the network steady state activation response across different recurrent inhibition values. The model also accounts for fMRI data previously reported for different enumeration related tasks. The model also allows us to generate an estimate of the pattern of reaction times in enumeration tasks. Overall, these findings suggest that a single network architecture can account for both small and large number processing. Copyright © 2014. Published by Elsevier B.V.

  13. Security Issues Threats and Challenges in Data Management of Wireless Communication & Sensor Network over Cloud: A Review

    OpenAIRE

    Padmaja R Ayachit,; N. G. Narole

    2014-01-01

    Cloud computing is a colloquial expression used to describe a variety of different computing concepts that involve a large number of computers that are connected through a real-time communication network. The five key characteristics of cloud computing are: location-independent resource pooling, on demand self-service, rapid elasticity, broad network access, and measured service. These five characteristics represent the first layer in the cloud environment. Wireless sensor net...

  14. Special Issue on 5G Communications and Experimental Trials with Heterogeneous and Agile Mobile networks

    OpenAIRE

    Sejun Song; KyungHi Chang; Chanho Yoon; Jong‐Moon Chung

    2018-01-01

    5th generation mobile networks, 5G, are the proposed next‐generation communication network standards. In addition to providing more than 1 Gb per second faster speeds, 5G will be a global game changer from technological, economic, societal, and environmental perspectives by integrating multiple networks in diverse sectors for various up to date applications such as the Internet of Things (IoT), device‐to‐device direct communication (D2D), vehicular communications (V2X), and disaster resilient...

  15. Design Issues for Traffic Management for the ATM UBR + Service for TCP Over Satellite Networks

    Science.gov (United States)

    Jain, Raj

    1999-01-01

    This project was a comprehensive research program for developing techniques for improving the performance of Internet protocols over Asynchronous Transfer Mode (ATM) based satellite networks. Among the service categories provided by ATM networks, the most commonly used category for data traffic is the unspecified bit rate (UBR) service. UBR allows sources to send data into the network without any feedback control. The project resulted in the numerous ATM Forum contributions and papers.

  16. Gigabit Network Communications Research, Quarterly R and D Report Number 10

    Science.gov (United States)

    1993-03-01

    EDTIC- ELECTE .SSEP01O3IS" EU * Sponsored by Advanced Research Projects Agency (DoD) Computer Systems Technology Office Gigabit Network Communications... Information ", Xylogics Inc., January 1993. RFC 1389: Malkin, G. (Xylogics Inc.), and F. Baker (Advanced Computer Communications), "RIP Version 2 MIB...Reynolds, J.K., "BOOTP Vendor Information Extensions", USC/ISI, January 1993. RFC 1396: Crocker, S., "The Process for Organization of Internet Standards

  17. Networks of VTA Neurons Encode Real-Time Information about Uncertain Numbers of Actions Executed to Earn a Reward

    Directory of Open Access Journals (Sweden)

    Jesse Wood

    2017-08-01

    Full Text Available Multiple and unpredictable numbers of actions are often required to achieve a goal. In order to organize behavior and allocate effort so that optimal behavioral policies can be selected, it is necessary to continually monitor ongoing actions. Real-time processing of information related to actions and outcomes is typically assigned to the prefrontal cortex and basal ganglia, but also depends on midbrain regions, especially the ventral tegmental area (VTA. We were interested in how individual VTA neurons, as well as networks within the VTA, encode salient events when an unpredictable number of serial actions are required to obtain a reward. We recorded from ensembles of putative dopamine and non-dopamine neurons in the VTA as animals performed multiple cued trials in a recording session where, in each trial, serial actions were randomly rewarded. While averaging population activity did not reveal a response pattern, we observed that different neurons were selectively tuned to low, medium, or high numbered actions in a trial. This preferential tuning of putative dopamine and non-dopamine VTA neurons to different subsets of actions in a trial allowed information about binned action number to be decoded from the ensemble activity. At the network level, tuning curve similarity was positively associated with action-evoked noise correlations, suggesting that action number selectivity reflects functional connectivity within these networks. Analysis of phasic responses to cue and reward revealed that the requirement to execute multiple and uncertain numbers of actions weakens both cue-evoked responses and cue-reward response correlation. The functional connectivity and ensemble coding scheme that we observe here may allow VTA neurons to cooperatively provide a real-time account of ongoing behavior. These computations may be critical to cognitive and motivational functions that have long been associated with VTA dopamine neurons.

  18. Gender Variations in the Effects of Number of Organizational Memberships, Number of Social Networking Sites, and Grade-Point Average on Global Social Responsibility in Filipino University Students

    Directory of Open Access Journals (Sweden)

    Romeo B. Lee

    2016-02-01

    Full Text Available The study seeks to estimate gender variations in the direct effects of (a number of organizational memberships, (b number of social networking sites (SNS, and (c grade-point average (GPA on global social responsibility (GSR; and in the indirect effects of (a and of (b through (c on GSR. Cross-sectional survey data were drawn from questionnaire interviews involving 3,173 Filipino university students. Based on a path model, the three factors were tested to determine their inter-relationships and their relationships with GSR. The direct and total effects of the exogenous factors on the dependent variable are statistically significantly robust. The indirect effects of organizational memberships on GSR through GPA are also statistically significant, but the indirect effects of SNS on GSR through GPA are marginal. Men and women significantly differ only in terms of the total effects of their organizational memberships on GSR. The lack of broad gender variations in the effects of SNS, organizational memberships and GPA on GSR may be linked to the relatively homogenous characteristics and experiences of the university students interviewed. There is a need for more path models to better understand the predictors of GSR in local students.

  19. Gender Variations in the Effects of Number of Organizational Memberships, Number of Social Networking Sites, and Grade-Point Average on Global Social Responsibility in Filipino University Students

    Science.gov (United States)

    Lee, Romeo B.; Baring, Rito V.; Sta. Maria, Madelene A.

    2016-01-01

    The study seeks to estimate gender variations in the direct effects of (a) number of organizational memberships, (b) number of social networking sites (SNS), and (c) grade-point average (GPA) on global social responsibility (GSR); and in the indirect effects of (a) and of (b) through (c) on GSR. Cross-sectional survey data were drawn from questionnaire interviews involving 3,173 Filipino university students. Based on a path model, the three factors were tested to determine their inter-relationships and their relationships with GSR. The direct and total effects of the exogenous factors on the dependent variable are statistically significantly robust. The indirect effects of organizational memberships on GSR through GPA are also statistically significant, but the indirect effects of SNS on GSR through GPA are marginal. Men and women significantly differ only in terms of the total effects of their organizational memberships on GSR. The lack of broad gender variations in the effects of SNS, organizational memberships and GPA on GSR may be linked to the relatively homogenous characteristics and experiences of the university students interviewed. There is a need for more path models to better understand the predictors of GSR in local students. PMID:27247700

  20. Gender Variations in the Effects of Number of Organizational Memberships, Number of Social Networking Sites, and Grade-Point Average on Global Social Responsibility in Filipino University Students.

    Science.gov (United States)

    Lee, Romeo B; Baring, Rito V; Sta Maria, Madelene A

    2016-02-01

    The study seeks to estimate gender variations in the direct effects of (a) number of organizational memberships, (b) number of social networking sites (SNS), and (c) grade-point average (GPA) on global social responsibility (GSR); and in the indirect effects of (a) and of (b) through (c) on GSR. Cross-sectional survey data were drawn from questionnaire interviews involving 3,173 Filipino university students. Based on a path model, the three factors were tested to determine their inter-relationships and their relationships with GSR. The direct and total effects of the exogenous factors on the dependent variable are statistically significantly robust. The indirect effects of organizational memberships on GSR through GPA are also statistically significant, but the indirect effects of SNS on GSR through GPA are marginal. Men and women significantly differ only in terms of the total effects of their organizational memberships on GSR. The lack of broad gender variations in the effects of SNS, organizational memberships and GPA on GSR may be linked to the relatively homogenous characteristics and experiences of the university students interviewed. There is a need for more path models to better understand the predictors of GSR in local students.

  1. Implementing artificial neural networks in nuclear power plants diagnostic systems: issues and challenges

    International Nuclear Information System (INIS)

    Boger, Z.

    1998-01-01

    A recent review of artificial intelligence applications in nuclear power plants (NPP) diagnostics and fault detection finds that mostly expert systems (ES) and artificial neural networks (ANN) techniques were researched and proposed, but the number of actual implementations in NPP diagnostics systems is very small. It lists the perceived obstacles to the ANN-based system acceptance and implementation. This paper analyses this list. Some of ANN limitations relate to 'quantitative' difficulties of designing and training large-scale ANNs. The availability of an efficient large-scale ANN training algorithm may alleviate most of these concerns. Other perceived drawbacks refer to the 'qualitative' aspects of ANN acceptance - how and when can we rely on the quality of the advice given by the ANN model. Several techniques are available that help to brighten the 'black box' image of the ANN. Analysis of the trained ANN can identify the significant inputs. Calculation of the Causal Indices may reveal the magnitude and sign of the influence of each input on each output. Both these techniques increase the confidence of the users when they conform to known knowledge, or point to plausible relationships. Analysis of the behavior of the neurons in the hidden layer can identify false ANN classification when presented with noisy or corrupt data. Auto-associative NN can identify faulty sensors or data. Two examples of the ANN capabilities as possible diagnostic tools are given, using NPP data, one classifying internal reactor disturbances by neutron noise spectra analysis, the other identifying the faults causes of several transients. To use these techniques the ANN developers need large amount of training data of as many transients as possible. Such data is routinely generated in NPP simulators during the periodic qualification of NPP operators. The IAEA can help by encouraging the saving and distributing the transient data to developers of ANN diagnostic system, to serve as

  2. Blending Hydrogen into Natural Gas Pipeline Networks. A Review of Key Issues

    Energy Technology Data Exchange (ETDEWEB)

    Melaina, M. W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Antonia, O. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Penev, M. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-03-01

    This study assesses the potential to deliver hydrogen through the existing natural gas pipeline network as a hydrogen and natural gas mixture to defray the cost of building dedicated hydrogen pipelines. Blending hydrogen into the existing natural gas pipeline network has also been proposed as a means of increasing the output of renewable energy systems such as large wind farms.

  3. The evolutionary and ecological consequences of animal social networks: emerging issues.

    Science.gov (United States)

    Kurvers, Ralf H J M; Krause, Jens; Croft, Darren P; Wilson, Alexander D M; Wolf, Max

    2014-06-01

    The first generation of research on animal social networks was primarily aimed at introducing the concept of social networks to the fields of animal behaviour and behavioural ecology. More recently, a diverse body of evidence has shown that social fine structure matters on a broader scale than initially expected, affecting many key ecological and evolutionary processes. Here, we review this development. We discuss the effects of social network structure on evolutionary dynamics (genetic drift, fixation probabilities, and frequency-dependent selection) and social evolution (cooperation and between-individual behavioural differences). We discuss how social network structure can affect important coevolutionary processes (host-pathogen interactions and mutualisms) and population stability. We also discuss the potentially important, but poorly studied, role of social network structure on dispersal and invasion. Throughout, we highlight important areas for future research. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. KEY ISSUES OF CONCEPTS' FORMATION OF THE NETWORK OF RESOURCE CENTER OF DISTANCE EDUCATION OF GENERAL EDUCATION INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Yuriy M. Bogachkov

    2013-06-01

    Full Text Available In the article the problem of constructing a network of resource centers for Distance Education to meet the needs of general secondary schools is presented. Modern educational trends in the use of Internet services in education are viewed.  Main contradictions, solution of which helps to create a network of resource centers, are identified. The definition of key terms related to the range of issues are given. The basic categories of participants, who  implementation of e-learning and networking are oriented on. There are considered the basic tasks of  distance education resource centers' functioning and types of supporting: personnel, regulatory, informative, systematic and  technical etc. The review of possible models of implementation of  students' distance education is reviewed . Three options for business models of resource centers, depending on funding  sources are offered.

  5. Data security issues arising from integration of wireless access into healthcare networks.

    Science.gov (United States)

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  6. USSOCOM Metrics - A Case Study in Modern C4I Network Management Issues

    National Research Council Canada - National Science Library

    Stocking, Richard

    1997-01-01

    .... Industry uses the same type of circuits but approaches the network management of these circuits from a financial interest versus the military strategic and tactical aspects considered by the service user...

  7. Theoretical framework on selected core issues on conditions for productive learning in networked learning environments

    DEFF Research Database (Denmark)

    Dirckinck-Holmfeld, Lone; Svendsen, Brian Møller; Ponti, Marisa

    The report documents and summarises the elements and dimensions that have been identified to describe and analyse the case studies collected in the Kaleidoscope Jointly Executed Integrating Research Project (JEIRP) on Conditions for productive learning in network learning environments.......The report documents and summarises the elements and dimensions that have been identified to describe and analyse the case studies collected in the Kaleidoscope Jointly Executed Integrating Research Project (JEIRP) on Conditions for productive learning in network learning environments....

  8. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    OpenAIRE

    Hoon-Jae Lee; Pardeep Kumar

    2011-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are ...

  9. Networking issues---Lan and Wan needs---The impact of workstations

    International Nuclear Information System (INIS)

    Harvey, J.

    1990-01-01

    This review focuses on the use of networks in the LEP experiments at CERN. The role of the extended LAN at CERN is discussed in some detail, with particular emphasis on the impact the sudden growth in the use of workstations is having. The problem of network congestion is highlighted and possible evolution to FDDI mentioned. The status and use of the wide area connections are also reported

  10. Denial-of-Service attacks on 6LoWPAN-RPL networks: Issues and practical solutions

    OpenAIRE

    Anass RGHIOUI; Anass KHANNOUS; Mohammed BOUHORMA

    2014-01-01

    RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from intern...

  11. Blind identification of the number of sub-carriers for orthogonal frequency division multiplexing-based elastic optical networking

    Science.gov (United States)

    Zhao, Lei; Xu, Hengying; Bai, Chenglin

    2018-03-01

    In orthogonal frequency division multiplexing (OFDM)-based elastic optical networking (EON), it is imperative to identify unknown parameters of OFDM-based EON signals quickly, intelligently and robustly. Because the number of sub-carriers determines the size of the sub-carriers spacing and then affects the symbol period of the OFDM and the anti-dispersion capability of the system, the identification of the number of sub-carriers has a profound effect on the identification of other key parameters of the system. In this paper, we proposed a method of number identification for sub-carriers of OFDM-based EON signals with help of high-order cyclic cumulant. The specific fourth-order cyclic cumulant exists only at the location of its sub-carriers frequencies. So the identification of the number of sub-carriers can be implemented by detecting the cyclic-frequencies. The proposed scheme in our study can be divided into three sub-stages, i.e. estimating the spectral range, calculating the high-order cyclic cumulant and identifying the number of sub-carriers. When the optical signal-to-noise ratios (OSNR) varied from 16dB to 22dB, the number of sub-carriers (64-512) was successfully identified in the experiment, and from the statistical point of view, the average identification absolute accuracy (IAAs) exceeded 94%.

  12. Genetic Basis for Developmental Homeostasis of Germline Stem Cell Niche Number: A Network of Tramtrack-Group Nuclear BTB Factors

    Science.gov (United States)

    Chalvet, Fabienne; Netter, Sophie; Dos Santos, Nicolas; Poisot, Emilie; Paces-Fessy, Mélanie; Cumenal, Delphine; Peronnet, Frédérique; Pret, Anne-Marie; Théodore, Laurent

    2012-01-01

    The potential to produce new cells during adult life depends on the number of stem cell niches and the capacity of stem cells to divide, and is therefore under the control of programs ensuring developmental homeostasis. However, it remains generally unknown how the number of stem cell niches is controlled. In the insect ovary, each germline stem cell (GSC) niche is embedded in a functional unit called an ovariole. The number of ovarioles, and thus the number of GSC niches, varies widely among species. In Drosophila, morphogenesis of ovarioles starts in larvae with the formation of terminal filaments (TFs), each made of 8–10 cells that pile up and sort in stacks. TFs constitute organizers of individual germline stem cell niches during larval and early pupal development. In the Drosophila melanogaster subgroup, the number of ovarioles varies interspecifically from 8 to 20. Here we show that pipsqueak, Trithorax-like, batman and the bric-à-brac (bab) locus, all encoding nuclear BTB/POZ factors of the Tramtrack Group, are involved in limiting the number of ovarioles in D. melanogaster. At least two different processes are differentially perturbed by reducing the function of these genes. We found that when the bab dose is reduced, sorting of TF cells into TFs was affected such that each TF contains fewer cells and more TFs are formed. In contrast, psq mutants exhibited a greater number of TF cells per ovary, with a normal number of cells per TF, thereby leading to formation of more TFs per ovary than in the wild type. Our results indicate that two parallel genetic pathways under the control of a network of nuclear BTB factors are combined in order to negatively control the number of germline stem cell niches. PMID:23185495

  13. Effect of anti-vertigo granule on the opening number and blood flow of mouse ear capillary network

    Science.gov (United States)

    Li, Chongxian; Liu, Xiaobin; Li, Jun; Hao, Shaojun; Wang, Xidong; Li, Wenjun; Zhang, Zhengchen

    2018-04-01

    To observe the effects of anti-glare particles on the open number and blood flow in the auricle of mice with microcirculation disturbance model. Sixty mice, half male and half female, were randomly divided into 6 groups. The mice were given Kangxuan granule suspension, serum brain granule suspension and normal saline of the same volume, respectively, once a day. The mice were anesthetized by intraperitoneal injection of chloral hydrate at 1 hour after the last administration. The mouse was fixed on the observation platform and the auricle was placed on the transmission stage. BZ-2000 microcirculation microscope and microcirculation analysis system were used to observe the changes of blood velocity and capillary opening volume in auricle of mice before administration. The changes of blood velocity and capillaries opening volume of mouse auricle were observed 2 min after epinephrine injection into tail vein of mice. Bear fruit: Compared with those before epinephrine, the opening number of capillary reticulum of auricle in large dose Kangxuan granule group was significantly decreased (Pgroup and middle group. In the small dose Kangxuan granule group, the opening number of capillary network of auricle decreased significantly (Pgroup, the large dose Kangxuan granule group could significantly increase the opening number of the auricle capillary network in mice (Pgroup could significantly increase the opening number of auricle capillary reticulum in mice (Pgroup by Ridit test. Both Kangxuan granule group and Yangxuannao granule group could significantly improve the auricle hair of mice with microcirculation disorder. The blood flow in fine blood vessels (Pblood flow in mice with microcirculation disorder.

  14. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  15. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  16. Special issue on searching and mining the web and social networks

    NARCIS (Netherlands)

    Litvak, Nelly; Vigna, Sebastiano

    2014-01-01

    The past few decades have seen the rise of online social networks as a worldwide phenomenon with a high impact on our society. Beyond the obvious exposure phenomena, with obvious implications on security and privacy, people have started to become acquainted - even married! - in online social

  17. On the development of mobile agent systems for wireless sensor networks : issues and solutions

    NARCIS (Netherlands)

    Fortino, G.; Galzarano, S.; Ganzha, M.; Jain, L.C.

    2013-01-01

    Due to the growing exploitation of wireless sensor networks (WSNs) for enhancing all major conventional application domains and enabling brand new application domains, the development of applications based on WSNs has recently gained a significant focus. Thus, design methods, middleware and

  18. An integrated framework of knowledge transfer and ICT issues in co-creation value networks

    NARCIS (Netherlands)

    Bagheri, S.; Kusters, R.J.; Trienekens, J.J.M.; Varajão, J.E.Q.; Cruz-Cunha, M.M.; Martinho, R.; Rijo, R.; Bjørn-Andersen, N.; Turner, R.; Alves, D.

    2016-01-01

    In dynamic value networks (VNs), knowledge serves as a basis for close collaboration of actors (i.e. firms with their partners and customers) to enhance co-creation of integrated solutions. In order to provide a technical foundation for seamless knowledge transfer among actors, VNs require

  19. Blending Hydrogen into Natural Gas Pipeline Networks: A Review of Key Issues

    Energy Technology Data Exchange (ETDEWEB)

    Melaina, M. W.; Antonia, O.; Penev, M.

    2013-03-01

    The United States has 11 distinct natural gas pipeline corridors: five originate in the Southwest, four deliver natural gas from Canada, and two extend from the Rocky Mountain region. This study assesses the potential to deliver hydrogen through the existing natural gas pipeline network as a hydrogen and natural gas mixture to defray the cost of building dedicated hydrogen pipelines.

  20. Special Issue on 5G Communications and Experimental Trials with Heterogeneous and Agile Mobile networks

    Directory of Open Access Journals (Sweden)

    Sejun Song

    2018-02-01

    Full Text Available 5th generation mobile networks, 5G, are the proposed next‐generation communication network standards. In addition to providing more than 1 Gb per second faster speeds, 5G will be a global game changer from technological, economic, societal, and environmental perspectives by integrating multiple networks in diverse sectors for various up to date applications such as the Internet of Things (IoT, device‐to‐device direct communication (D2D, vehicular communications (V2X, and disaster resilient communication. Currently, millimeter‐wave (mmWave radio spectrum between 30 GHz and 300 GHz is critical for 5G rollout. Regulatory bodies around the world are now working towards opening up new spectrum bands from 6 GHz–100 GHz, and new technologies to overcome the challenges of these mmWave bands have been developed. It is envisioned that advanced 5G network infrastructure includes ultra‐broadband access, high‐speed backhaul and relay, softwarized flexible evolved packet core solutions for efficient system management, and satellite communications as an inherent component of 5G systems.

  1. Social networking profiles and professionalism issues in residency applicants: an original study-cohort study.

    Science.gov (United States)

    Ponce, Brent A; Determann, Jason R; Boohaker, Hikel A; Sheppard, Evan; McGwin, Gerald; Theiss, Steven

    2013-01-01

    To determine the frequency of social networking, the degree of information publicly disclosed, and whether unprofessional content was identified in applicants from the 2010 Residency Match. Medical professionalism is an essential competency for physicians to learn, and information found on social networking sites may be hazardous to the doctor-patient relationship and an institution's public perception. No study has analyzed the social network content of applicants applying for residency. Online review of social networking Facebook profiles of graduating medical students applying for a residency in orthopedic surgery. Evidence of unprofessional content was based upon Accreditation Council for Graduate Medical Education guidelines. Additional recorded applicant data included as follows: age, United States Medical Licensing Examination part I score, and residency composite score. Relationship between professionalism score and recorded data points was evaluated using an analysis of variance. Nearly half of all applicants, 46% (200/431), had a Facebook profile. The majority of profiles (85%) did not restrict online access to their profile. Unprofessional content was identified in 16% of resident applicant profiles. Variables associated with lower professionalism scores included unmarried relationship status and lower residency composite scores. It is critical for healthcare professionals to recognize both the benefits and risks present with electronic communication and to vigorously protect the content of material allowed to be publically accessed through the Internet. Copyright © 2013 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  2. U.S. EPA's National Dioxin Air Monitoring Network: Analytical Issues

    Science.gov (United States)

    The U.S. EPA has established a National Dioxin Air Monitoring Network (NDAMN) to determine the temporal and geographical variability of atmospheric chlorinated dibenzo-p-dioxins (CDDs), furans (CDFs), and coplanar polychlorinated biphenyls (PCBs) at rural and non-impacted locatio...

  3. Exploiting LCSH, LCC, and DDC To Retrieve Networked Resources: Issues and Challenges.

    Science.gov (United States)

    Chan, Lois Mai

    This paper examines how the nature of the World Wide Web and characteristics of networked resources affect subject access and analyzes the requirements of effective indexing and retrieval tools. The current and potential uses of existing tools and possible courses of future development are explored in the context of recent research. The first…

  4. Current status and issues of nuclear human resource development/General activities of Japan nuclear human resource development network

    International Nuclear Information System (INIS)

    Murakami, Hiroyuki; Hino, Sadami; Tsuru, Hisanori

    2013-01-01

    The Japan Nuclear Human Resource Development Network (JN-HRD Net) was established in November 2010 with the aim of developing a framework for mutual cooperation and information sharing among nuclear-related organizations. Although the tasks and goals of developing human resources in the nuclear field have been shifted since the accident at the Tokyo Electric Power Company (TEPCO) Fukushima Daiichi Nuclear Power Plant, the necessity of fostering capable personnel in this field stays unchanged and the importance of our network activities has further emphasized. The meeting of JN-HRD Net was held on the 5th of February 2013, where its activities by each field were reported and views and opinions were actively exchanged between more than 90 participants. This paper briefly describes current status and issues of JN-HRD Net and its general activities conducted by the JN-HRD Net secretariat. (J.P.N.)

  5. The DOE transportation strategy: Public information, communications network and issue resolution

    International Nuclear Information System (INIS)

    Philpott, R.E.

    1986-01-01

    The OCRWM plans to issue a draft ''comprehensive transportation plan'' in the fall of 1987 that combines the Institutional Plan, the Transportation Business Plan (DOE/RW-0046, January 1986), and a framework for transportation operational procedures. This paper reviews the major elements of the OCRWM's institutional strategy. The OCRWM's strategy for addressing transportation issues relies on the development of public information to foster public understanding and acceptance of program activities and goals, and active communication and interaction with all parties having an interest in the development and operation of the NWPA transportation program. The OCRWM's goal in conducting such activities is to foster cooperative effort in addressing transportation issues, and to focus on communication and constructive interaction rather than conflict

  6. Using heuristic algorithms for capacity leasing and task allocation issues in telecommunication networks under fuzzy quality of service constraints

    Science.gov (United States)

    Huseyin Turan, Hasan; Kasap, Nihat; Savran, Huseyin

    2014-03-01

    Nowadays, every firm uses telecommunication networks in different amounts and ways in order to complete their daily operations. In this article, we investigate an optimisation problem that a firm faces when acquiring network capacity from a market in which there exist several network providers offering different pricing and quality of service (QoS) schemes. The QoS level guaranteed by network providers and the minimum quality level of service, which is needed for accomplishing the operations are denoted as fuzzy numbers in order to handle the non-deterministic nature of the telecommunication network environment. Interestingly, the mathematical formulation of the aforementioned problem leads to the special case of a well-known two-dimensional bin packing problem, which is famous for its computational complexity. We propose two different heuristic solution procedures that have the capability of solving the resulting nonlinear mixed integer programming model with fuzzy constraints. In conclusion, the efficiency of each algorithm is tested in several test instances to demonstrate the applicability of the methodology.

  7. Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thi-Tham Nguyen

    2014-03-01

    Full Text Available This paper proposes a practical low-complexity MAC (medium access control scheme for quality of service (QoS-aware and cluster-based underwater acoustic sensor networks (UASN, in which the provision of differentiated QoS is required. In such a network, underwater sensors (U-sensor in a cluster are divided into several classes, each of which has a different QoS requirement. The major problem considered in this paper is the maximization of the number of nodes that a cluster can accommodate while still providing the required QoS for each class in terms of the PDR (packet delivery ratio. In order to address the problem, we first estimate the packet delivery probability (PDP and use it to formulate an optimization problem to determine the optimal value of the maximum packet retransmissions for each QoS class. The custom greedy and interior-point algorithms are used to find the optimal solutions, which are verified by extensive simulations. The simulation results show that, by solving the proposed optimization problem, the supportable number of underwater sensor nodes can be maximized while satisfying the QoS requirements for each class.

  8. Legal issues relating to the feed-in of biogas under the Gas Network Access Ordinance; Rechtsfragen der Biogaseinspeisung nach der GasNZV

    Energy Technology Data Exchange (ETDEWEB)

    Stappert, Holger; Johannsen, Sven Leif Erik [Luther Rechtsanwaltsgesellschaft mbH, Duesseldorf (Germany)

    2012-07-01

    In the authors' view, the legislature has set itself ambitious goals in regulating the feed-in of biogas into the natural gas grid. Aside from the economic considerations that are leading investors to prefer other investment opportunities there are also a number of unresolved technical issues relating to the feed-in of biogas. Furthermore, network operators find themselves confronted with considerable legal uncertainty as they process grid connection applications, i.e. in the time interval from application submission until contract conclusion. In spite of being allowed only 3 months for processing connection applications, grid operators are required to bind themselves to a high degree in approving an application. This is a particular cause of difficulty given the as yet unresolved technical problems and is accordingly subject to controversy. In those difficult cases where it not possible to guarantee year-round feed-in of biogas into the grid because of unavailability of deodorant plants that would be needed for the ability to backfeed biogas into upstream grids, resolution would often nevertheless be possible if it was clearly indicated that use of a ''bypass solution'' as a means of ensuring overall cost-effectiveness would be accepted as a capacity-enhancing measure for purposes of cost allocation. This would provide grid operators a way of reliably circumventing the technical difficulties associated with deodorisation, enabling them to connect biogas production plants to the grid without having to deal with these technical issues which still await their final resolution. Under the law currently in force there is no legal impediment, subject to the specifics of the individual case, to accepting a bypass solution as a capacity enhancing measure. It would help grid operators in obtaining legal certainty, and ultimately promote investment in biogas projects, if the legislature were to clarify these issues in the Gas Network Access Ordinance.

  9. Prediction of Currency Volume Issued in Taiwan Using a Hybrid Artificial Neural Network and Multiple Regression Approach

    Directory of Open Access Journals (Sweden)

    Yuehjen E. Shao

    2013-01-01

    Full Text Available Because the volume of currency issued by a country always affects its interest rate, price index, income levels, and many other important macroeconomic variables, the prediction of currency volume issued has attracted considerable attention in recent years. In contrast to the typical single-stage forecast model, this study proposes a hybrid forecasting approach to predict the volume of currency issued in Taiwan. The proposed hybrid models consist of artificial neural network (ANN and multiple regression (MR components. The MR component of the hybrid models is established for a selection of fewer explanatory variables, wherein the selected variables are of higher importance. The ANN component is then designed to generate forecasts based on those important explanatory variables. Subsequently, the model is used to analyze a real dataset of Taiwan's currency from 1996 to 2011 and twenty associated explanatory variables. The prediction results reveal that the proposed hybrid scheme exhibits superior forecasting performance for predicting the volume of currency issued in Taiwan.

  10. Passing Corrupt Data Across Network Layers: An Overview of Recent Developments and Issues

    Directory of Open Access Journals (Sweden)

    Michael Welzl

    2005-02-01

    Full Text Available Recent Internet developments seem to make a point for passing corrupt data from the link to the network layer and above instead of ensuring data integrity with a checksum and ARQ. We give an overview of these efforts (the UDP Lite and DCCP protocols and explain which circumstances would justify delivery of erroneous data; clearly, the missing piece in the puzzle is efficient and meaningful interlayer communication.

  11. Research Issues on Customer-Oriented and Eco-friendly Networks for Healthy Fashionable Goods

    OpenAIRE

    Fornasiero , Rosanna; Chiodi , Andrea; Carpanzano , Emanuele; Carneiro , Luis

    2010-01-01

    International audience; Needs and expectations of specific target groups - such as elderly, obese, disabled, or diabetic persons- are arising as challenging opportunities for European companies which are asked to supply small series of functional and fashionable goods of high quality, affordable price and eco-compatible. In order to design, develop, produce and distribute such products, a new framework and related components of collaborative networking need to be developed, enabling the produ...

  12. Addressing the Issue of Routing Unfairness in Opportunistic Backhaul Networks for Collecting Sensed Data

    Directory of Open Access Journals (Sweden)

    Tekenate E. Amah

    2017-12-01

    Full Text Available Widely deploying sensors in the environment and embedding them in physical objects is a crucial step towards realizing smart and sustainable cities. To cope with rising resource demands and limited budgets, opportunistic networks (OppNets offer a scalable backhaul option for collecting delay-tolerant data from sensors to gateways in order to enable efficient urban operations and services. While pervasive devices such as smartphones and tablets contribute significantly to the scalability of OppNets, closely following human movement patterns and social structure introduces network characteristics that pose routing challenges. Our study on the impact of these characteristics reveals that existing routing protocols subject a key set of devices to higher resource consumption, to which their users may respond by withdrawing participation. Unfortunately, existing solutions addressing this unfairness do not guarantee achievable throughput since they are not specifically designed for sensed data collection scenarios. Based on concepts derived from the study, we suggest design guidelines for adapting applicable routing protocols to sensed data collection scenarios. We also follow our design guidelines to propose the Fair Locality Aware Routing (FLARoute technique. Evaluating FLARoute within an existing routing protocol confirms improved fairness and throughput under conditions that compromise the performance of existing solutions.

  13. Using network screening methods to determine locations with specific safety issues: A design consistency case study.

    Science.gov (United States)

    Butsick, Andrew J; Wood, Jonathan S; Jovanis, Paul P

    2017-09-01

    The Highway Safety Manual provides multiple methods that can be used to identify sites with promise (SWiPs) for safety improvement. However, most of these methods cannot be used to identify sites with specific problems. Furthermore, given that infrastructure funding is often specified for use related to specific problems/programs, a method for identifying SWiPs related to those programs would be very useful. This research establishes a method for Identifying SWiPs with specific issues. This is accomplished using two safety performance functions (SPFs). This method is applied to identifying SWiPs with geometric design consistency issues. Mixed effects negative binomial regression was used to develop two SPFs using 5 years of crash data and over 8754km of two-lane rural roadway. The first SPF contained typical roadway elements while the second contained additional geometric design consistency parameters. After empirical Bayes adjustments, sites with promise (SWiPs) were identified. The disparity between SWiPs identified by the two SPFs was evident; 40 unique sites were identified by each model out of the top 220 segments. By comparing sites across the two models, candidate road segments can be identified where a lack design consistency may be contributing to an increase in expected crashes. Practitioners can use this method to more effectively identify roadway segments suffering from reduced safety performance due to geometric design inconsistency, with detailed engineering studies of identified sites required to confirm the initial assessment. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. CULTURAL ISSUES OF SOCIAL NETWORKS, THEIR PRINCIPLES AND VALUES IN SOCIAL INCLUSION

    Directory of Open Access Journals (Sweden)

    Alessandro Marco Rosini

    2015-09-01

    Full Text Available This article aims to show the importance of a samba school for the local community (in relation to social inclusion and redemption of human values, reflect on the application of this learning created at community to a (organization and discuss the role of people in organizational and cultural strengthening in a social networking environment. It also shows how the use of information technology and communication (ITC can contribute to the evolution of educational scenario of those communities. The scientific method for this is case study, using Delphi technique, where the main community stakeholders are interviewed. Care, respect and consideration for the people who are part of the community are important factors in these social communities. The learning generated by the community and their leaders’ effort are determining for them. ITC can help this learning.

  15. Insights and issues with simulating terrestrial DOC loading of Arctic river networks.

    Science.gov (United States)

    Kicklighter, David W; Hayes, Daniel J; McClelland, James W; Peterson, Bruce J; McGuire, A David; Melillo, Jerry M

    2013-12-01

    Terrestrial carbon dynamics influence the contribution of dissolved organic carbon (DOC) to river networks in addition to hydrology. In this study, we use a biogeochemical process model to simulate the lateral transfer of DOC from land to the Arctic Ocean via riverine transport. We estimate that, over the 20th century, the pan-Arctic watershed has contributed, on average, 32 Tg C/yr of DOC to river networks emptying into the Arctic Ocean with most of the DOC coming from the extensive area of boreal deciduous needle-leaved forests and forested wetlands in Eurasian watersheds. We also estimate that the rate of terrestrial DOC loading has been increasing by 0.037 Tg C/yr2 over the 20th century primarily as a result of climate-induced increases in water yield. These increases have been offset by decreases in terrestrial DOC loading caused by wildfires. Other environmental factors (CO2 fertilization, ozone pollution, atmospheric nitrogen deposition, timber harvest, agriculture) are estimated to have relatively small effects on terrestrial DOC loading to Arctic rivers. The effects of the various environmental factors on terrestrial carbon dynamics have both offset and enhanced concurrent effects on hydrology to influence terrestrial DOC loading and may be changing the relative importance of terrestrial carbon dynamics on this carbon flux. Improvements in simulating terrestrial DOC loading to pan-Arctic rivers in the future will require better information on the production and consumption of DOC within the soil profile, the transfer of DOC from land to headwater streams, the spatial distribution of precipitation and its temporal trends, carbon dynamics of larch-dominated ecosystems in eastern Siberia, and the role of industrial organic effluents on carbon budgets of rivers in western Russia.

  16. Insights and issues with simulating terrestrial DOC loading of Arctic river networks

    Science.gov (United States)

    Kicklighter, David W.; Hayes, Daniel J.; McClelland, James W.; Peterson, Bruce J.; McGuire, A. David; Melillo, Jerry M.

    2013-01-01

    Terrestrial carbon dynamics influence the contribution of dissolved organic carbon (DOC) to river networks in addition to hydrology. In this study, we use a biogeochemical process model to simulate the lateral transfer of DOC from land to the Arctic Ocean via riverine transport. We estimate that, over the 20th century, the pan-Arctic watershed has contributed, on average, 32 Tg C/yr of DOC to river networks emptying into the Arctic Ocean with most of the DOC coming from the extensive area of boreal deciduous needle-leaved forests and forested wetlands in Eurasian watersheds. We also estimate that the rate of terrestrial DOC loading has been increasing by 0.037 Tg C/yr2 over the 20th century primarily as a result of climate-induced increases in water yield. These increases have been offset by decreases in terrestrial DOC loading caused by wildfires. Other environmental factors (CO2 fertilization, ozone pollution, atmospheric nitrogen deposition, timber harvest, agriculture) are estimated to have relatively small effects on terrestrial DOC loading to Arctic rivers. The effects of the various environmental factors on terrestrial carbon dynamics have both offset and enhanced concurrent effects on hydrology to influence terrestrial DOC loading and may be changing the relative importance of terrestrial carbon dynamics on this carbon flux. Improvements in simulating terrestrial DOC loading to pan-Arctic rivers in the future will require better information on the production and consumption of DOC within the soil profile, the transfer of DOC from land to headwater streams, the spatial distribution of precipitation and its temporal trends, carbon dynamics of larch-dominated ecosystems in eastern Siberia, and the role of industrial organic effluents on carbon budgets of rivers in western Russia.

  17. The undersampled wireless acoustic sensor network scenario: some preliminary results and open research issues

    NARCIS (Netherlands)

    Sommen, P.C.W.; Janse, K.

    2009-01-01

    Advances in hardware technology pave the way to small, low power wireless sensor devices, such as wireless microphones. This makes it possible to use a large number, i.e. thousands, of microphones at positions where it is not feasible to put wired microphones, creating an enormous potential for

  18. Accounting for water management issues within hydrological simulation: Alternative modelling options and a network optimization approach

    Science.gov (United States)

    Efstratiadis, Andreas; Nalbantis, Ioannis; Rozos, Evangelos; Koutsoyiannis, Demetris

    2010-05-01

    In mixed natural and artificialized river basins, many complexities arise due to anthropogenic interventions in the hydrological cycle, including abstractions from surface water bodies, groundwater pumping or recharge and water returns through drainage systems. Typical engineering approaches adopt a multi-stage modelling procedure, with the aim to handle the complexity of process interactions and the lack of measured abstractions. In such context, the entire hydrosystem is separated into natural and artificial sub-systems or components; the natural ones are modelled individually, and their predictions (i.e. hydrological fluxes) are transferred to the artificial components as inputs to a water management scheme. To account for the interactions between the various components, an iterative procedure is essential, whereby the outputs of the artificial sub-systems (i.e. abstractions) become inputs to the natural ones. However, this strategy suffers from multiple shortcomings, since it presupposes that pure natural sub-systems can be located and that sufficient information is available for each sub-system modelled, including suitable, i.e. "unmodified", data for calibrating the hydrological component. In addition, implementing such strategy is ineffective when the entire scheme runs in stochastic simulation mode. To cope with the above drawbacks, we developed a generalized modelling framework, following a network optimization approach. This originates from the graph theory, which has been successfully implemented within some advanced computer packages for water resource systems analysis. The user formulates a unified system which is comprised of the hydrographical network and the typical components of a water management network (aqueducts, pumps, junctions, demand nodes etc.). Input data for the later include hydraulic properties, constraints, targets, priorities and operation costs. The real-world system is described through a conceptual graph, whose dummy properties

  19. Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues

    Directory of Open Access Journals (Sweden)

    Mohd Aizaini Maarof

    2013-08-01

    Full Text Available Wireless Sensor Networks (WSNs are important and necessary platforms for the future as the concept “Internet of Things” has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that occur due to various reasons, such as node failures, reading errors, unusual events, and malicious attacks. Therefore, anomaly detection is a necessary process to ensure the quality of sensor data before it is utilized for making decisions. In this review, we present the challenges of anomaly detection in WSNs and state the requirements to design efficient and effective anomaly detection models. We then review the latest advancements of data anomaly detection research in WSNs and classify current detection approaches in five main classes based on the detection methods used to design these approaches. Varieties of the state-of-the-art models for each class are covered and their limitations are highlighted to provide ideas for potential future works. Furthermore, the reviewed approaches are compared and evaluated based on how well they meet the stated requirements. Finally, the general limitations of current approaches are mentioned and further research opportunities are suggested and discussed.

  20. Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues

    Science.gov (United States)

    Rassam, Murad A.; Zainal, Anazida; Maarof, Mohd Aizaini

    2013-01-01

    Wireless Sensor Networks (WSNs) are important and necessary platforms for the future as the concept “Internet of Things” has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that occur due to various reasons, such as node failures, reading errors, unusual events, and malicious attacks. Therefore, anomaly detection is a necessary process to ensure the quality of sensor data before it is utilized for making decisions. In this review, we present the challenges of anomaly detection in WSNs and state the requirements to design efficient and effective anomaly detection models. We then review the latest advancements of data anomaly detection research in WSNs and classify current detection approaches in five main classes based on the detection methods used to design these approaches. Varieties of the state-of-the-art models for each class are covered and their limitations are highlighted to provide ideas for potential future works. Furthermore, the reviewed approaches are compared and evaluated based on how well they meet the stated requirements. Finally, the general limitations of current approaches are mentioned and further research opportunities are suggested and discussed. PMID:23966182

  1. Freezing issue on stability master production scheduling for supplier network: Decision making view

    Directory of Open Access Journals (Sweden)

    Aisyati Azizah

    2017-01-01

    Full Text Available In the daily operation, there are frequently changes in customer order requirement which will induce instability of the MPS. Moreover, the frequently adjustment of MPS can induce fluctuation of production and increasing of inventory cost as well as decreasing service level of customer. Most of studies about instability of MPS use freezing method and rolling procedure to adjust MPS periodically. Freezing is the proportion of planning horizon being frozen, whereas rolling procedure is a method replanning periodically of MPS using newly updated demand data. This study is focused on interval freezing length as an issue of decision making. In supply chain, a manufacturer is supported by suppliers to supply material requirement. Since a manufacturer plan production schedule on MPS the freezing interval is determined that will be informed to suppliers which supply the material requirement. In previous research, the freezing interval is decided by manufacturer as necessary decision maker. This decision must be followed by suppliers though it is not beneficial for them. It can be concluded that this condition is no win-win situation. Hence, this research proposes that suppliers will be involved as decision maker besides a manufacturer so the interval freezing is decided by two-side decision maker.

  2. Comparison and Evaluation of the Performance of Various Types of Neural Networks for Planning Issues Related to Optimal Management of Charging and Discharging Electric Cars in Intelligent Power Grids

    Directory of Open Access Journals (Sweden)

    Arash Moradzaeh

    2018-01-01

    Full Text Available The use of electric vehicles in addition to reducing environmental concerns can play a significant role in reducing the peak and filling the characteristic valleys of the daily network load. In other words, in the context of smart grids, it is possible to improve the battery of electric vehicles by scheduling charging and discharging processes. In this research, the issue of controlling the charge and discharge of electric vehicles was evaluated using a variety of neural models, until the by examining the effect of the growth rate of the penetration level of electric vehicles of the hybrid type that can be connected to the distribution network, the results of the charge management and discharge model of the proposed response are examined. The results indicate that due to increased penetration of these cars is increased the amount of responses to charge and discharge management. In this research, a variety of neural network methods, a neural network method using Multilayer Perceptron Training (MLP, b neural network method using Jordan Education (RNN, c neural network method using training (RBF Was evaluated based on parameters such as reduction of training error, reduction of network testing error, duration of run and number of replications for each one. The final results indicate that electric vehicles can be used as scattered power plants, and can be useful for regulating the frequency and regulation of network voltages and the supply of peak traffic. This also reduces peak charges and incidental costs, which ultimately helps to further network stability. Finally, the charge and discharge management response reflects the fact that intelligent network-based models have the ability to manage the charge and discharge of electric vehicles, and among the models the amount of error reduction training and testing is very favourable for both RNN, MLP.

  3. Stoichiometric balance of protein copy numbers is measurable and functionally significant in a protein-protein interaction network for yeast endocytosis.

    Science.gov (United States)

    Holland, David O; Johnson, Margaret E

    2018-03-01

    Stoichiometric balance, or dosage balance, implies that proteins that are subunits of obligate complexes (e.g. the ribosome) should have copy numbers expressed to match their stoichiometry in that complex. Establishing balance (or imbalance) is an important tool for inferring subunit function and assembly bottlenecks. We show here that these correlations in protein copy numbers can extend beyond complex subunits to larger protein-protein interactions networks (PPIN) involving a range of reversible binding interactions. We develop a simple method for quantifying balance in any interface-resolved PPINs based on network structure and experimentally observed protein copy numbers. By analyzing such a network for the clathrin-mediated endocytosis (CME) system in yeast, we found that the real protein copy numbers were significantly more balanced in relation to their binding partners compared to randomly sampled sets of yeast copy numbers. The observed balance is not perfect, highlighting both under and overexpressed proteins. We evaluate the potential cost and benefits of imbalance using two criteria. First, a potential cost to imbalance is that 'leftover' proteins without remaining functional partners are free to misinteract. We systematically quantify how this misinteraction cost is most dangerous for strong-binding protein interactions and for network topologies observed in biological PPINs. Second, a more direct consequence of imbalance is that the formation of specific functional complexes depends on relative copy numbers. We therefore construct simple kinetic models of two sub-networks in the CME network to assess multi-protein assembly of the ARP2/3 complex and a minimal, nine-protein clathrin-coated vesicle forming module. We find that the observed, imperfectly balanced copy numbers are less effective than balanced copy numbers in producing fast and complete multi-protein assemblies. However, we speculate that strategic imbalance in the vesicle forming module

  4. Genome-wide copy number variation study associates metabotropic glutamate receptor gene networks with attention deficit hyperactivity disorder

    Science.gov (United States)

    Elia, Josephine; Glessner, Joseph T; Wang, Kai; Takahashi, Nagahide; Shtir, Corina J; Hadley, Dexter; Sleiman, Patrick M A; Zhang, Haitao; Kim, Cecilia E; Robison, Reid; Lyon, Gholson J; Flory, James H; Bradfield, Jonathan P; Imielinski, Marcin; Hou, Cuiping; Frackelton, Edward C; Chiavacci, Rosetta M; Sakurai, Takeshi; Rabin, Cara; Middleton, Frank A; Thomas, Kelly A; Garris, Maria; Mentch, Frank; Freitag, Christine M; Steinhausen, Hans-Christoph; Todorov, Alexandre A; Reif, Andreas; Rothenberger, Aribert; Franke, Barbara; Mick, Eric O; Roeyers, Herbert; Buitelaar, Jan; Lesch, Klaus-Peter; Banaschewski, Tobias; Ebstein, Richard P; Mulas, Fernando; Oades, Robert D; Sergeant, Joseph; Sonuga-Barke, Edmund; Renner, Tobias J; Romanos, Marcel; Romanos, Jasmin; Warnke, Andreas; Walitza, Susanne; Meyer, Jobst; Pálmason, Haukur; Seitz, Christiane; Loo, Sandra K; Smalley, Susan L; Biederman, Joseph; Kent, Lindsey; Asherson, Philip; Anney, Richard J L; Gaynor, J William; Shaw, Philip; Devoto, Marcella; White, Peter S; Grant, Struan F A; Buxbaum, Joseph D; Rapoport, Judith L; Williams, Nigel M; Nelson, Stanley F; Faraone, Stephen V; Hakonarson, Hakon

    2014-01-01

    Attention deficit hyperactivity disorder (ADHD) is a common, heritable neuropsychiatric disorder of unknown etiology. We performed a whole-genome copy number variation (CNV) study on 1,013 cases with ADHD and 4,105 healthy children of European ancestry using 550,000 SNPs. We evaluated statistically significant findings in multiple independent cohorts, with a total of 2,493 cases with ADHD and 9,222 controls of European ancestry, using matched platforms. CNVs affecting metabotropic glutamate receptor genes were enriched across all cohorts (P = 2.1 × 10−9). We saw GRM5 (encoding glutamate receptor, metabotropic 5) deletions in ten cases and one control (P = 1.36 × 10−6). We saw GRM7 deletions in six cases, and we saw GRM8 deletions in eight cases and no controls. GRM1 was duplicated in eight cases. We experimentally validated the observed variants using quantitative RT-PCR. A gene network analysis showed that genes interacting with the genes in the GRM family are enriched for CNVs in ~10% of the cases (P = 4.38 × 10−10) after correction for occurrence in the controls. We identified rare recurrent CNVs affecting glutamatergic neurotransmission genes that were overrepresented in multiple ADHD cohorts. PMID:22138692

  5. Analysis of the impact of connecting a larger number of small hydroelectric power plants to the short-circuit currents values and relay protection system of distribution network

    Directory of Open Access Journals (Sweden)

    Sučević Nikola

    2017-01-01

    Full Text Available In this paper the influence of a large number of small hydro power plants on the short-circuit currents is analysed, as well as the operation of the relay protection system within the real distribution network in Serbia. The necessary modification of the existing protection functions, as well as the implementation of the new proposed protection functions, are presented and discussed. Network modeling and analysis are performed using the program tool DIgSILENT PowerFactory.

  6. Special number issued in commemoration of 10th anniversary of NEDO's industrial technology research and development department; NEDO sangyo gijutsu kenkyu kaihatsu bumon 10 shunenshi

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-09-01

    This special number is issued in commemoration of 10th anniversary of NEDO's industrial technology research and development department, to look back its R and D activity results and help the future projects. This department was established in 1988, based on the Law of Establishment of the Industrial Technology Research and Development System, and started its activities as the central institute for positively promoting the R and D of the industrial technologies, centered by the basic and advanced areas, while in closely cooperation with oversea institutes. During this period, the department has been pursuing various projects, including large-scale industrial technology R and D projects transferred from the Agency of Industrial Science and Technology; R and D projects for technologies for the industrial bases of the next generation and medical/welfare equipment technologies; projects for assistance to international cooperative research teams; projects for establishing facilities as research bases necessary for promoting R and D of advanced industrial technologies; and, more recently, projects for establishing measures to cope with global environmental problems. NEDO has been playing a role of managing and controlling various large-size R and D projects, both in name and reality, taking over the projects which had been promoted by the Agency of Industrial Science and Technology. This special number outlines the R and D projects NEDO has pursued in the past 10 years. (NEDO)

  7. Identification of networks of co-occurring, tumor-related DNA copy number changes using a genome-wide scoring approach.

    Directory of Open Access Journals (Sweden)

    Christiaan Klijn

    2010-01-01

    Full Text Available Tumorigenesis is a multi-step process in which normal cells transform into malignant tumors following the accumulation of genetic mutations that enable them to evade the growth control checkpoints that would normally suppress their growth or result in apoptosis. It is therefore important to identify those combinations of mutations that collaborate in cancer development and progression. DNA copy number alterations (CNAs are one of the ways in which cancer genes are deregulated in tumor cells. We hypothesized that synergistic interactions between cancer genes might be identified by looking for regions of co-occurring gain and/or loss. To this end we developed a scoring framework to separate truly co-occurring aberrations from passenger mutations and dominant single signals present in the data. The resulting regions of high co-occurrence can be investigated for between-region functional interactions. Analysis of high-resolution DNA copy number data from a panel of 95 hematological tumor cell lines correctly identified co-occurring recombinations at the T-cell receptor and immunoglobulin loci in T- and B-cell malignancies, respectively, showing that we can recover truly co-occurring genomic alterations. In addition, our analysis revealed networks of co-occurring genomic losses and gains that are enriched for cancer genes. These networks are also highly enriched for functional relationships between genes. We further examine sub-networks of these networks, core networks, which contain many known cancer genes. The core network for co-occurring DNA losses we find seems to be independent of the canonical cancer genes within the network. Our findings suggest that large-scale, low-intensity copy number alterations may be an important feature of cancer development or maintenance by affecting gene dosage of a large interconnected network of functionally related genes.

  8. High Lithium Transference Number Electrolytes via Creation of 3-Dimensional, Charged, Nanoporous Networks from Dense Functionalized Nanoparticle Composites

    KAUST Repository

    Schaefer, Jennifer L.

    2013-03-26

    High lithium transference number, tLi+, electrolytes are desired for use in both lithium-ion and lithium metal rechargeable battery technologies. Historically, low tLi+ electrolytes have hindered device performance by allowing ion concentration gradients within the cell, leading to high internal resistances that ultimately limit cell lifetime, charging rates, and energy density. Herein, we report on the synthesis and electrochemical features of electrolytes based on nanoparticle salts designed to provide high tLi+. The salts are created by cofunctionalization of metal oxide nanoparticles with neutral organic ligands and tethered lithium salts. When dispersed in a conducting fluid such as tetraglyme, they spontaneously form a charged, nanoporous network of particles at moderate nanoparticle loadings. Modification of the tethered anion chemistry from -SO3 - to -SO3BF3 - is shown to enhance ionic conductivity of the electrolytes by facilitating ion pair dissociation. At a particle volume fraction of 0.15, the electrolyte exists as a self-supported, nanoporous gel with an optimum ionic conductivity of 10 -4 S/cm at room temperature. Galvanostatic polarization measurements on symmetric lithium metal cells containing the electrolyte show that the cell short circuit time, tSC, is inversely proportional to the square of the applied current density tSC ∼ J-2, consistent with previously predicted results for traditional polymer-in-salt electrolytes with low tLi+. Our findings suggest that electrolytes with tLi+ ≈ 1 and good ion-pair dissociation delay lithium dendrite nucleation and may lead to improved lithium plating in rechargeable batteries with metallic lithium anodes. © 2013 American Chemical Society.

  9. Operations of electric taxis to serve advance reservations by trip chaining: Sensitivity analysis on network size, customer demand and number of charging stations

    Directory of Open Access Journals (Sweden)

    Hao Wang

    2016-10-01

    Full Text Available This research investigated the performance of an Electric Taxi (ET fleet that catered solely for customers with advance reservations. In a previously related research, a customized Paired Pickup and Delivery Problem with Time Window and Charging Station (PPDPTWCS had been formulated to solve for the minimum number of taxis that would serve a fixed set of customer demand. The concept behind this fleet optimization was to chain multiple customer trips and trips to Charging Stations (CSs to form a route and assigned to a taxi driver. In this paper the sensitivity of the ET fleet’s operations with respect to network sizes, customer demand densities and number of CSs have been investigated. It also analyzed the market shares of the CSs and the occupancy of a CS over time. The results showed that, (1 the expansion of network size or the increase in customer demand density led to increase in fleet size, number of trips to the CSs and maximum occupancies at the CSs but these performance measures grew at different rates; (2 when the network size and number of CSs were fixed, an increase in customer demand density led to a better utilization of taxis in terms of more customers served per taxi and higher average revenue per taxi; (3 given the same network size and demand density, the ET fleet’s performance was relatively insensitive to the number of CSs; and (4 the usage of individual CS was affected by the number of CS and their locations; and (5 when all the ETs were fully charged at the beginning of the same shift hour, they visited the CSs in bunches when their batteries were about to run out. These findings contribute to a better understanding of the operations of the ET fleet and the CSs. They could be used for making better decisions in the planning of ET operations.

  10. Business potentials related to smart grid. Issue paper - working group 5; Denmark. Smart Grid Network; Erhvervspotentialer i Smart Grid. Issue paper, arbejdsgruppe 5

    Energy Technology Data Exchange (ETDEWEB)

    Hauge, B. (Villawatt, Taastrup (Denmark)); Mortensen, E. (DI Energibranchen, Copenhagen (Denmark)); Lyck, L.L. (DONG Energy A/S, Fredericia (Denmark)); Hillingsoee Stubberup, M. (Udenrigsministeriet. Invest in Denmark, Copenhagen (Denmark)); Baadsgaard Trolle, M. (Dansk Energi, Frederiksberg (Denmark)); Lomholt Svensson, N. (Klima- og Energiministeriet, Copenhagen (Denmark)); Roemer Kofod, P. (ABB A/S, Skovlunde); Hauch, R. (IBM A/S, Kgs. Lyngby (Denmark)); Cajus, S. (DI ITEK, Copenhagen (Denmark)); Stroem, S. (Vindmoelleindustrien, Frederiksberg (Denmark))

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 5 provides an immediate assessment of business potential at the sector level based on the recommendations contained in the reports of the working groups 1-4. The working group has only drawn preliminary conclusions regarding business opportunities that may arise as a result of the other network groups' recommendations. In particular three areas, Denmark has at present the potential to strengthen the Danish business potential: 1) System Solutions. The intelligent energy system is more about interaction between different system components than the components themselves. Here Denmark belongs to the world elite, including the extensive use of cogeneration and wind power; 2) Market Solutions. The Nordic electricity trading system ''Nord Pool'' is the most efficient market-based electricity system in the world, and Denmark has thus a good basis for creating market-based solutions for future power systems; 3) Large-scale demonstration environments creates opportunities for companies to test and refine their products, solutions and services. In Denmark, Energinet.dk and utility companies have opened up for companies to use the Danish network for testing solutions to real customers. More foreign players thus regard Denmark as an attractive market to test new technologies, partly because the Danish market is homogeneous and clear, and partly because Denmark in relation to the power system has a robust and well-managed network. Finally, the high share of fluctuating energy production helps to clarify the need for a flexible and intelligent power system. It is this combination of strengths that make Denmark a unique market for international companies to locate their

  11. Ties That Bind: The Practice of Social Networks. Number Two in a Series of Reports on Social Networks from The Annie E. Casey Foundation

    Science.gov (United States)

    Bailey, Terri J.

    2006-01-01

    This report documents the Annie E. Casey Foundation's effort to learn from families, communities and organizations around the country about their experiences with social network strategies and approaches. Using the voices and experiences of the families and organizations visited, the report summarizes findings from these visits and helps lay the…

  12. Exact estimation of biodiesel cetane number (CN) from its fatty acid methyl esters (FAMEs) profile using partial least square (PLS) adapted by artificial neural network (ANN)

    International Nuclear Information System (INIS)

    Hosseinpour, Soleiman; Aghbashlo, Mortaza; Tabatabaei, Meisam; Khalife, Esmail

    2016-01-01

    Highlights: • Estimating the biodiesel CN from its FAMEs profile using ANN-based PLS approach. • Comparing the capability of ANN-adapted PLS approach with the standard PLS model. • Exact prediction of biodiesel CN from it FAMEs profile using ANN-based PLS method. • Developing an easy-to-use software using ANN-PLS model for computing the biodiesel CN. - Abstract: Cetane number (CN) is among the most important properties of biodiesel because it quantifies combustion speed or in better words, ignition quality. Experimental measurement of biodiesel CN is rather laborious and expensive. However, the high proportionality of biodiesel fatty acid methyl esters (FAMEs) profile with its CN is very appealing to develop straightforward and inexpensive computerized tools for biodiesel CN estimation. Unfortunately, correlating the chemical structure of biodiesel to its CN using conventional statistical and mathematical approaches is very difficult. To solve this issue, partial least square (PLS) adapted by artificial neural network (ANN) was introduced and examined herein as an innovative approach for the exact estimation of biodiesel CN from its FAMEs profile. In the proposed approach, ANN paradigm was used for modeling the inner relation between the input and the output PLS score vectors. In addition, the capability of the developed method in predicting the biodiesel CN was compared with the basal PLS method. The accuracy of the developed approaches for computing the biodiesel CN was assessed using three statistical criteria, i.e., coefficient of determination (R"2), mean-squared error (MSE), and percentage error (PE). The ANN-adapted PLS method predicted the biodiesel CN with an R"2 value higher than 0.99 demonstrating the fidelity of the developed model over the classical PLS method with a markedly lower R"2 value of about 0.85. In order to facilitate the use of the proposed model, an easy-to-use computer program was also developed on the basis of ANN-adapted PLS

  13. Wireless Sensor Network –A Survey

    OpenAIRE

    Nirvika Chouhan; P.D.Vyavahare; Rekha Jain

    2013-01-01

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life time of the network. In Wireless sensor network, nodes should consume less power, memoryand so data aggregation should be performed. Security is another aspect which should be pres...

  14. High Lithium Transference Number Electrolytes via Creation of 3-Dimensional, Charged, Nanoporous Networks from Dense Functionalized Nanoparticle Composites

    KAUST Repository

    Schaefer, Jennifer L.; Yanga, Dennis A.; Archer, Lynden A.

    2013-01-01

    High lithium transference number, tLi+, electrolytes are desired for use in both lithium-ion and lithium metal rechargeable battery technologies. Historically, low tLi+ electrolytes have hindered device performance by allowing ion concentration

  15. A network of epigenetic modifiers and DNA repair genes controls tissue-specific copy number alteration preference.

    Science.gov (United States)

    Cramer, Dina; Serrano, Luis; Schaefer, Martin H

    2016-11-10

    Copy number alterations (CNAs) in cancer patients show a large variability in their number, length and position, but the sources of this variability are not known. CNA number and length are linked to patient survival, suggesting clinical relevance. We have identified genes that tend to be mutated in samples that have few or many CNAs, which we term CONIM genes (COpy Number Instability Modulators). CONIM proteins cluster into a densely connected subnetwork of physical interactions and many of them are epigenetic modifiers. Therefore, we investigated how the epigenome of the tissue-of-origin influences the position of CNA breakpoints and the properties of the resulting CNAs. We found that the presence of heterochromatin in the tissue-of-origin contributes to the recurrence and length of CNAs in the respective cancer type.

  16. A recursive method for calculating the total number of spanning trees and its applications in self-similar small-world scale-free network models

    Science.gov (United States)

    Ma, Fei; Su, Jing; Yao, Bing

    2018-05-01

    The problem of determining and calculating the number of spanning trees of any finite graph (model) is a great challenge, and has been studied in various fields, such as discrete applied mathematics, theoretical computer science, physics, chemistry and the like. In this paper, firstly, thank to lots of real-life systems and artificial networks built by all kinds of functions and combinations among some simpler and smaller elements (components), we discuss some helpful network-operation, including link-operation and merge-operation, to design more realistic and complicated network models. Secondly, we present a method for computing the total number of spanning trees. As an accessible example, we apply this method to space of trees and cycles respectively, and our results suggest that it is indeed a better one for such models. In order to reflect more widely practical applications and potentially theoretical significance, we study the enumerating method in some existing scale-free network models. On the other hand, we set up a class of new models displaying scale-free feature, that is to say, following P(k) k-γ, where γ is the degree exponent. Based on detailed calculation, the degree exponent γ of our deterministic scale-free models satisfies γ > 3. In the rest of our discussions, we not only calculate analytically the solutions of average path length, which indicates our models have small-world property being prevailing in amounts of complex systems, but also derive the number of spanning trees by means of the recursive method described in this paper, which clarifies our method is convenient to research these models.

  17. Research, development and demonstration. Issue paper - working group 3; Denmark. Smart Grid Network; Forskning, udvikling og demonstration. Issue paper, arbejdsgruppe 3

    Energy Technology Data Exchange (ETDEWEB)

    Balasiu, A [Siemens A/S, Ballerup (Denmark); Troi, A [Danmarks Tekniske Univ. Risoe Nationallaboratoriet for Baeredygtig Energi, Roskilde (Denmark); Andersen, Casper [DI Energibranchen, Copenhagen (Denmark); and others

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 3 was defined as: - An overview of the Danish research and development of smart grids and related areas; - Conducting an analysis of the research and development needs required for the introduction of a smart grid in Denmark. Based on this analysis, provide suggestions for new large research and development projects; - Provide recommendations on how the activities are best carried out taking into account innovation, economic growth and jobs. In the analysis it is explained that Denmark so far has a strong position in several elements of RD and D activities. This position will soon be threatened as several European countries have launched ambitious initiatives to strengthen the national position. The working group recommends that Denmark gives priority to Smart Grids as a national action in order to solve the challenge of technically and economically efficient integration of renewable energy. Smart Grid is a catalyst that strengthens a new green growth industry (cleantech) in Denmark. Research and development has an important role to play in this development. A common vision and roadmap must be established for research institutions, energy companies and industries related to research, development and demonstration of Smart Grid, which can maintain and expand Denmark's global leadership position. As part of this, there is a need to strengthen and market research infrastructures, which can turn Denmark into a global hub for smart grid development. There is a current need to strengthen the advanced technical and scientific research in the complexities of the power system, research on market design, user behavior and smart grid interoperability. (LN)

  18. Research, development and demonstration. Issue paper - working group 3; Denmark. Smart Grid Network; Forskning, udvikling og demonstration. Issue paper, arbejdsgruppe 3

    Energy Technology Data Exchange (ETDEWEB)

    Balasiu, A. (Siemens A/S, Ballerup (Denmark)); Troi, A. (Danmarks Tekniske Univ.. Risoe Nationallaboratoriet for Baeredygtig Energi, Roskilde (Denmark)); Andersen, Casper (DI Energibranchen, Copenhagen (Denmark)) (and others)

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 3 was defined as: - An overview of the Danish research and development of smart grids and related areas; - Conducting an analysis of the research and development needs required for the introduction of a smart grid in Denmark. Based on this analysis, provide suggestions for new large research and development projects; - Provide recommendations on how the activities are best carried out taking into account innovation, economic growth and jobs. In the analysis it is explained that Denmark so far has a strong position in several elements of RD and D activities. This position will soon be threatened as several European countries have launched ambitious initiatives to strengthen the national position. The working group recommends that Denmark gives priority to Smart Grids as a national action in order to solve the challenge of technically and economically efficient integration of renewable energy. Smart Grid is a catalyst that strengthens a new green growth industry (cleantech) in Denmark. Research and development has an important role to play in this development. A common vision and roadmap must be established for research institutions, energy companies and industries related to research, development and demonstration of Smart Grid, which can maintain and expand Denmark's global leadership position. As part of this, there is a need to strengthen and market research infrastructures, which can turn Denmark into a global hub for smart grid development. There is a current need to strengthen the advanced technical and scientific research in the complexities of the power system, research on market design, user behavior and smart grid interoperability. (LN)

  19. On Delay and Security in Network Coding

    Science.gov (United States)

    Dikaliotis, Theodoros K.

    2013-01-01

    In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…

  20. Chiropractic Health Care: A National Study of Cost of Education, Service Utilization, Number of Practicing Doctors of Chiropractic, and Other Key Policy Issues. Volumes I-II.

    Science.gov (United States)

    von Kuster, Thomas, Jr.

    Results from the first federally sponsored study of the chiropractic health care profession are presented, and a broad range of facts and issues of concern to policy-makers, the profession, and the public are described. The two-year project included three national surveys of: service providers (doctors of chiropractic in practice more than two…

  1. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  2. Rural Student Entrepreneurs: Linking Commerce and Community. (Benefits)[Squared]: The Exponential Results of Linking School Improvement and Community Development, Issue Number Three.

    Science.gov (United States)

    Boethel, Martha

    In many rural areas, both communities and schools are threatened by decreasing population and changing economic conditions. To boost both the local economy and student achievement, a growing number of rural schools are turning to entrepreneurial education. In school entrepreneurship programs, students create small businesses under the guidance of…

  3. Editorial of the Special Issue on Human-Technology Interaction and Technology Adoption: Exploring Frameworks other than Actor-Network Theory

    DEFF Research Database (Denmark)

    Tanev, Stoyan

    2014-01-01

    Actor-network theory (ANT) has established itself as a valuable resource for the analysis of technology innovation and adoption. One of the main reasons for the success of the Innovation Translation Model (a specific instantiation of ANT) is the fact that it fits very well the emerging dominance...... challenges. This is why in this special issue we have focused on exploring, in parallel to ANT, other approaches that have also proven valuable in studying technology adoption and human-technology interaction. Some of these approaches share significant common ground with ANT. They also diverge in some......, Design in-use, Practice theory, Innovation diffusion, Consumer innovativeness and Activity theory....

  4. How many or how much? Testing the relative influence of the number of social network risks versus the amount of time exposed to social network risks on post-treatment substance use.

    Science.gov (United States)

    Eddie, David; Kelly, John F

    2017-06-01

    Having high-risk, substance-using friends is associated with young adult substance use disorder (SUD) relapse. It is unclear, however, whether it is the total number of high-risk friends, or the amount of time spent with high-risk friends that leads to relapse. Unclear also, is to what extent low-risk friends buffer risk. This study examined the influence of number of high-risk and low-risk friends, and the amount time spent with these friends on post-treatment percent days abstinent (PDA). Young adult inpatients (N=302) were assessed at intake, and 3, 6, and 12 months on social network measures and PDA. Mixed models tested for effects of number of high- and low-risk friends, and time spent with these friends on PDA, and for net-risk friend effects to test whether low-risk friends offset risk. Within and across assessments, number of, and time spent with high-risk friends was negatively associated with PDA, while the inverse was true for low-risk friends. Early post-treatment, time spent with friends more strongly predicted PDA than number of friends. Participants were more deleteriously affected by time with high-risk friends the longer they were out of treatment, while contemporaneously protection conferred by low-risk friends increased. This interaction effect, however, was not observed with number of high- or low-risk friends, or number of friends net-risk. Young adult SUD patients struggling to break ties with high-risk friends should be encouraged to minimize time with them. Clinicians should also encourage patients to grow their social network of low-risk friends. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Special Issue on ActorNetwork Theory, Value CoCreation and Design in Open Innovation Environments

    DEFF Research Database (Denmark)

    Tanev, Stoyan; Storni, Cristiano; Stuedahl, Dagny

    2015-01-01

    The present special issue focuses on the application of ANT to the articulation of a cocreative perspective on design in open innovation environments. The Editors invited submissions by authors using ANT to explore and discuss the link between value co-creation, design and innovation and especially...

  6. New approach in electricity network regulation: an issue on effective integration of distributed generation in electricity supply systems

    International Nuclear Information System (INIS)

    Scheepers, Martin J.J.; Wals, Adrian F.

    2003-11-01

    Technological developments and EU targets for penetration of renewable energy sources (RES) and greenhouse gas (GHG) reduction are decentralising the electricity infrastructure and services. Although, the liberalisation and internationalisation of the European electricity market has resulted in efforts to harmonise transmission pricing and regulation, hardly any initiative exists to consider the opening up and regulation of distribution networks to ensure effective participation of RES and distributed generation (DG) in the internal market. The SUSTELNET project has been created in order to close this policy gap. Its main objective is to develop regulatory roadmaps for the transition to an electricity market and network structure that creates a level playing field between centralised and decentralised generation and that facilitates the integration of RES, within the framework of the liberalisation of the EU electricity market. By analysing the technical, socio-economic and institutional dynamics of the European electricity system and markets, the project identifies the underlying patterns that provide the boundary conditions and levers for policy development to reach long term RES and GHG targets (2020-2030 time frame). This paper presents results of this analytical phase of the SUSTELNET project. Furthermore, preliminary results of the current work in progress are presented. Principles and criteria for a regulatory framework for sustainable electricity systems are discussed, as well as the development of medium to long-term transition strategies/roadmaps for network regulation and market transformation to facilitate the integration of RES and decentralised electricity generating systems.

  7. Tough New Issues Refocus Health Education

    Science.gov (United States)

    Dessoff, Alan

    2011-01-01

    From dating violence to sexting and social networking, districts are struggling to address a number of sensitive and relatively new health education issues that are aggravated by students' increasing access to computers, cell phones and other digital devices. Through new or revised curricula, administrators are attempting to deal with these and…

  8. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  9. The United Kingdom Acid Waters Monitoring Network: a review of the first 15 years and introduction to the special issue

    International Nuclear Information System (INIS)

    Monteith, D.T.; Evans, C.D.

    2005-01-01

    The United Kingdom Acid Waters Monitoring Network (AWMN) was established in 1988 to determine the ecological impact of acidic emissions control policy on acid-sensitive lakes and streams. AWMN data have been used to explore a range of causal linkages necessary to connect changes in emissions to chemical and, ultimately, biological recovery. Regional scale reductions in sulphur (S) deposition have been found to have had an immediate influence on surface water chemistry, including increases in acid neutralising capacity, pH and alkalinity and declines in aluminium toxicity. These in turn can be linked to changes in the aquatic biota which are consistent with 'recovery' responses. A continuation of the current programme is essential in order to better understand apparent non-linearity between nitrogen (N) in deposition and runoff, the substantial rise in organic acid concentrations, and the likely impacts of forecast climate change and other potential constraints on further biological improvement. - After 15 years of the UK Acid Waters Monitoring Network, we can now draw clear conclusions regarding the impact of emission reductions on acidified UK fresh waters

  10. Operating Protocol and Networking Issues of a Telemedicine Platform Integrating from Wireless Home Sensors to the Hospital Information System

    Directory of Open Access Journals (Sweden)

    Massimiliano Donati

    2013-01-01

    Full Text Available Chronic heart failure (CHF is among the major causes of hospitalization for elderly citizens. Its considerable impact on patient quality of life, the resources congestion, and the related costs can be efficiently mitigated using remote wireless biosensors networks placed at patient home, able to communicate in secure way over the public Internet with the cardiology departmental Hospital Information System (HIS. In this way, physicians can monitor the situation of several patients at distance and quickly realize and act alterations in vital parameters. In this scenario, the Health@Home (H@H platform is conceived. The pool of Bluetooth sensors enables patients to daily collect vital signs at home in noninvasive fashion. A home gateway receives and processes all signals before sending them to a server node in charge of interfacing with the usual HIS. The novel concept of operating protocol (OP represents a list of actions, remotely configurable, that the domestic network has to follow (required measurements, transmissions, comparisons with personalized thresholds, etc.. The first medical tests on 30 patients (1 month allowed to verify the model, both from the patient and the medical perspective. The main evaluation metrics were usability, flexibility, and reliability of the communication from sensors to HIS.

  11. An Issue of Boundary Value for Velocity and Training Overhead Using Cooperative MIMO Technique in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. R. Islam

    2011-06-01

    Full Text Available A boundary value of velocity of data gathering node (DGN and a critical value for training overhead beyond which the cooperative communication in wireless sensor network will not be feasible is proposed in this paper. Multiple Input Multiple Outputs (MIMO cooperative communication is taken as an application. The performance in terms of energy efficiency and delay for a combination of two transmitting and two receiving antennas is analyzed. The results show that a set of critical value of velocity and training overhead pair is present for the long haul communication from the sensors to the data gathering node. Later a graphical relation between boundary value of training overhead and velocity is simulated. A mathematical relation between velocity and training overhead is also developed. The effects of several parameters on training overhead and velocity are analyzed.

  12. A novel design of an automatic lighting control system for a wireless sensor network with increased sensor lifetime and reduced sensor numbers.

    Science.gov (United States)

    Mohamaddoust, Reza; Haghighat, Abolfazl Toroghi; Sharif, Mohamad Javad Motahari; Capanni, Niccolo

    2011-01-01

    Wireless sensor networks (WSN) are currently being applied to energy conservation applications such as light control. We propose a design for such a system called a lighting automatic control system (LACS). The LACS system contains a centralized or distributed architecture determined by application requirements and space usage. The system optimizes the calculations and communications for lighting intensity, incorporates user illumination requirements according to their activities and performs adjustments based on external lighting effects in external sensor and external sensor-less architectures. Methods are proposed for reducing the number of sensors required and increasing the lifetime of those used, for considerably reduced energy consumption. Additionally we suggest methods for improving uniformity of illuminance distribution on a workplane's surface, which improves user satisfaction. Finally simulation results are presented to verify the effectiveness of our design.

  13. A Novel Design of an Automatic Lighting Control System for a Wireless Sensor Network with Increased Sensor Lifetime and Reduced Sensor Numbers

    Science.gov (United States)

    Mohamaddoust, Reza; Haghighat, Abolfazl Toroghi; Sharif, Mohamad Javad Motahari; Capanni, Niccolo

    2011-01-01

    Wireless sensor networks (WSN) are currently being applied to energy conservation applications such as light control. We propose a design for such a system called a Lighting Automatic Control System (LACS). The LACS system contains a centralized or distributed architecture determined by application requirements and space usage. The system optimizes the calculations and communications for lighting intensity, incorporates user illumination requirements according to their activities and performs adjustments based on external lighting effects in external sensor and external sensor-less architectures. Methods are proposed for reducing the number of sensors required and increasing the lifetime of those used, for considerably reduced energy consumption. Additionally we suggest methods for improving uniformity of illuminance distribution on a workplane’s surface, which improves user satisfaction. Finally simulation results are presented to verify the effectiveness of our design. PMID:22164114

  14. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    Science.gov (United States)

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects.

  15. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...

  16. Scanning number and brightness yields absolute protein concentrations in live cells: a crucial parameter controlling functional bio-molecular interaction networks.

    Science.gov (United States)

    Papini, Christina; Royer, Catherine A

    2018-02-01

    Biological function results from properly timed bio-molecular interactions that transduce external or internal signals, resulting in any number of cellular fates, including triggering of cell-state transitions (division, differentiation, transformation, apoptosis), metabolic homeostasis and adjustment to changing physical or nutritional environments, amongst many more. These bio-molecular interactions can be modulated by chemical modifications of proteins, nucleic acids, lipids and other small molecules. They can result in bio-molecular transport from one cellular compartment to the other and often trigger specific enzyme activities involved in bio-molecular synthesis, modification or degradation. Clearly, a mechanistic understanding of any given high level biological function requires a quantitative characterization of the principal bio-molecular interactions involved and how these may change dynamically. Such information can be obtained using fluctation analysis, in particular scanning number and brightness, and used to build and test mechanistic models of the functional network to define which characteristics are the most important for its regulation.

  17. A Continuous 3D-Graphene Network to Overcome Threshold Issues and Contact Resistance in Thermally Conductive Graphene Nanocomposites

    Directory of Open Access Journals (Sweden)

    Federico Conrado

    2017-01-01

    Full Text Available In order to overcome thermal resistance issues in polymeric matrix composites, self-standing graphene aerogels were synthetized and infiltrated with an epoxy resin, in order to create conductive preferential pathways through which heat can be easily transported. These continuous highly thermally conductive 3D-structures show, due to the high interconnection degree of graphene flakes, enhanced transport properties. Two kinds of aerogels were investigated, obtained by hydrothermal synthesis (HS and ice-templated direct freeze synthesis (DFS. Following HS method an isotropic structure is obtained, and following DFS method instead an anisotropic arrangement of graphene flakes results. The density of the structure can be tuned leading to a different amount of graphene inside the final composite. The residual oxygen, known to be detrimental to thermal properties, was removed by thermal treatment before the infiltration process. With 1,25 wt.% of graphene, using HS method, the thermal conductivity of the polymeric resin was increased by 80%, suggesting that this technique is a valid route to improve the thermal performance of graphene-based composites. When preferential orientation of the filler was present (DFS case, thermal conductivity was increased more than 25% with a graphene content of only 0,27 wt.%, demonstrating that oriented structures can further improve the thermal transport efficiency.

  18. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  19. An artificial neural network to safely reduce the number of ambulance ECGs transmitted for physician assessment in a system with prehospital detection of ST elevation myocardial infarction

    Directory of Open Access Journals (Sweden)

    Forberg Jakob L

    2012-02-01

    Full Text Available Abstract Background Pre-hospital electrocardiogram (ECG transmission to an expert for interpretation and triage reduces time to acute percutaneous coronary intervention (PCI in patients with ST elevation Myocardial Infarction (STEMI. In order to detect all STEMI patients, the ECG should be transmitted in all cases of suspected acute cardiac ischemia. The aim of this study was to examine the ability of an artificial neural network (ANN to safely reduce the number of ECGs transmitted by identifying patients without STEMI and patients not needing acute PCI. Methods Five hundred and sixty ambulance ECGs transmitted to the coronary care unit (CCU in routine care were prospectively collected. The ECG interpretation by the ANN was compared with the diagnosis (STEMI or not and the need for an acute PCI (or not as determined from the Swedish coronary angiography and angioplasty register. The CCU physician's real time ECG interpretation (STEMI or not and triage decision (acute PCI or not were registered for comparison. Results The ANN sensitivity, specificity, positive and negative predictive values for STEMI was 95%, 68%, 18% and 99%, respectively, and for a need of acute PCI it was 97%, 68%, 17% and 100%. The area under the ANN's receiver operating characteristics curve for STEMI detection was 0.93 (95% CI 0.89-0.96 and for predicting the need of acute PCI 0.94 (95% CI 0.90-0.97. If ECGs where the ANN did not identify a STEMI or a need of acute PCI were theoretically to be withheld from transmission, the number of ECGs sent to the CCU could have been reduced by 64% without missing any case with STEMI or a need of immediate PCI. Conclusions Our ANN had an excellent ability to predict STEMI and the need of acute PCI in ambulance ECGs, and has a potential to safely reduce the number of ECG transmitted to the CCU by almost two thirds.

  20. Prediction model of velocity field around circular cylinder over various Reynolds numbers by fusion convolutional neural networks based on pressure on the cylinder

    Science.gov (United States)

    Jin, Xiaowei; Cheng, Peng; Chen, Wen-Li; Li, Hui

    2018-04-01

    A data-driven model is proposed for the prediction of the velocity field around a cylinder by fusion convolutional neural networks (CNNs) using measurements of the pressure field on the cylinder. The model is based on the close relationship between the Reynolds stresses in the wake, the wake formation length, and the base pressure. Numerical simulations of flow around a cylinder at various Reynolds numbers are carried out to establish a dataset capturing the effect of the Reynolds number on various flow properties. The time series of pressure fluctuations on the cylinder is converted into a grid-like spatial-temporal topology to be handled as the input of a CNN. A CNN architecture composed of a fusion of paths with and without a pooling layer is designed. This architecture can capture both accurate spatial-temporal information and the features that are invariant of small translations in the temporal dimension of pressure fluctuations on the cylinder. The CNN is trained using the computational fluid dynamics (CFD) dataset to establish the mapping relationship between the pressure fluctuations on the cylinder and the velocity field around the cylinder. Adam (adaptive moment estimation), an efficient method for processing large-scale and high-dimensional machine learning problems, is employed to implement the optimization algorithm. The trained model is then tested over various Reynolds numbers. The predictions of this model are found to agree well with the CFD results, and the data-driven model successfully learns the underlying flow regimes, i.e., the relationship between wake structure and pressure experienced on the surface of a cylinder is well established.

  1. ALARA issues arising for safety and security of radiation sources and security screening devices - Summary and recommendations of the 12. European ALARA network workshop

    International Nuclear Information System (INIS)

    Shaw, P.; Crouail, P.; Drouet, F.

    2010-01-01

    The 12. European ALARA Network (EAN) workshop on 'ALARA issues arising for safety and security of radiation sources and security screening devices' took place in Vienna (Austria) in October 2009. The aim of that workshop was to consider how the implementation of ALARA3, in terms of planned and emergency situations, involving worker and public doses, is affected by the introduction of security-related measures. In the case of new equipment and procedures, there was also the question of whether exposures arising from security screening devices can be justified and optimised. This workshop consisted of invited oral presentations, which highlighted the main issues, and half of the programme was devoted to discussions within working groups on specific topics. During their discussions, the working groups identified recommendations dealing with the following topics: the implementation of the Code of Conduct and HASS4 - ensuring ALARA; balancing security and safety - how to achieve an optimum solution; the management of an emergency exposure situation from an ALARA perspective; the justification and optimisation of the use of security devices. The objective of this paper is to present the main conclusions and recommendations produced during the workshop. Individual presentations (papers and slides) as well as the reports from the working groups are available to download on the EAN web site (http://www.eu-alara.net). (authors)

  2. The International Haemovigilance Network Database for the Surveillance of Adverse Reactions and Events in Donors and Recipients of Blood Components: technical issues and results.

    Science.gov (United States)

    Politis, C; Wiersum, J C; Richardson, C; Robillard, P; Jorgensen, J; Renaudier, P; Faber, J-C; Wood, E M

    2016-11-01

    The International Haemovigilance Network's ISTARE is an online database for surveillance of all adverse reactions (ARs) and adverse events (AEs) associated with donation of blood and transfusion of blood components, irrespective of severity or the harm caused. ISTARE aims to unify the collection and sharing of information with a view to harmonizing best practices for haemovigilance systems around the world. Adverse reactionss and adverse events are recorded by blood component, type of reaction, severity and imputability to transfusion, using internationally agreed standard definitions. From 2006 to 2012, 125 national sets of annual aggregated data were received from 25 countries, covering 132.8 million blood components issued. The incidence of all ARs was 77.5 per 100 000 components issued, of which 25% were severe (19.1 per 100 000). Of 349 deaths (0.26 per 100 000), 58% were due to the three ARs related to the respiratory system: transfusion-associated circulatory overload (TACO, 27%), transfusion-associated acute lung injury (TRALI, 19%) and transfusion-associated dyspnoea (TAD, 12%). Cumulatively, 594 477 donor complications were reported (rate 660 per 100 000), of which 2.9% were severe. ISTARE is a well-established surveillance tool offering important contributions to international efforts to maximize transfusion safety. © 2016 International Society of Blood Transfusion.

  3. Seven Issues, Revisited

    OpenAIRE

    Whitehead, Jim; De Bra, Paul; Grønbæk, Kaj; Larsen, Deena; Legget, John; schraefel, monica m.c.

    2002-01-01

    It has been 15 years since the original presentation by Frank Halasz at Hypertext'87 on seven issues for the next generation of hypertext systems. These issues are: Search and Query Composites Virtual Structures Computation in/over hypertext network Versioning Collaborative Work Extensibility and Tailorability Since that time, these issues have formed the nucleus of multiple research agendas within the Hypertext community. Befitting this direction-setting role, the issues have been revisited ...

  4. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  5. Energy, transport network and financial issues: PR perspectives for economic development in time of Euro-Med area change

    Directory of Open Access Journals (Sweden)

    Amanda Jane Succi

    2012-02-01

    At first this will involve the policy makers at the central level, like the Ministry of Education and Sciences and the main research actors in the public and in the private sector. The criteria of the geographical and the subjects coverage has been also used in order to be able to present a public institutions of the higher education and research but even the enterprises that act in the research area are mainly focusing to the integration of these two systems which have been working separately for a long period of time and that must become efficient in order to adapt to the conditions of a country that has limited financial resources. This article is intended to provide a comprehensive overview of the scientific research in Albania, focusing in defining the priority areas for the research in social sciences. The information about the higher education and the potential problems that it faces, is based on a big number of research institutions, selected based on their involvement in scientific research in social sciences. This article brings into evidence the fact that in order to establish a stable and effective infrastructure in scientific research in Albania, is important to work in different directions. A successful way to increase the efficasity through the elements of the “innovative system” is by working with organizations that work in specific sectors of the economy, aiming for a possible cooperation in scientific search, for an important social contribution.

  6. Emissão de laudos eletrocardiográficos a distância: experiência da rede catarinense de telemedicina Issuing electrocardiographic reports remotely: experience of the telemedicine network of Santa Catarina

    Directory of Open Access Journals (Sweden)

    Isabela de Carlos Back Giuliano

    2012-11-01

    electrocardiographic diagnoses issued among users of the Telemedicine Network of Santa Catarina during the time when the report was issued freely. This system was connected to 287 cities in Santa Catarina; the tests were done in the places of origin and the reports were issued in three tertiary-care hospitals. From 2005 to 2010 the reports were issued freely and a probabilistic method for data analysis was created. An experienced cardiologist evaluated all ECGs to assess the chances of abnormality. RESULTS: 243,363 ECGs were evaluated. The majority (58% was performed on patients older than 50 years from primary care services (72%. There were differences in the frequency per region; this was partly related to the number of cardiologists/region (r = -0.551, to the distance from tertiary-care centers and potential differences of acceptance of the method. Approximately 53% of the ECGs were abnormal with greater frequency with increasing age (r² = 0.8166 and with significant regional differences (p < 0.0001. CONCLUSIONS: We built a data analysis system integrating prevalent terms, probabilistic analysis and specialized dictionaries. The system has covered a significant portion of the population of Santa Catarina, mainly elderly patients from the network of primary healthcare centers and remote regions of the State.

  7. Fusion Canada issue 6

    International Nuclear Information System (INIS)

    1989-02-01

    A short bulletin from the National Fusion Program. Included in this issue is a funding report for CFFTP, a technical update for Tokamak de Varennes and a network for university research by the National Fusion Program. 4 figs

  8. Product Platform Development in Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer; Skold, Martin

    2011-01-01

    The article examines the strategic issues involved in the deployment of product platform development in an industrial network. The move entails identifying the types and characteristics of generically different product platform strategies and clarifying strategic motives and differences. Number o...... of platforms and product brands serve as the key dimensions when distinguishing the different strategies. Each strategy has its own challenges and raises various issues to deal with.......The article examines the strategic issues involved in the deployment of product platform development in an industrial network. The move entails identifying the types and characteristics of generically different product platform strategies and clarifying strategic motives and differences. Number...

  9. Integration of generic issues

    International Nuclear Information System (INIS)

    Thatcher, D.

    1989-01-01

    The NRC has recognized the need to integrate generic issues (GIs). The GI process includes a number of phases, all of which should recognize the potential for overlap and conflict among related issues. In addition to the issues themselves, other related NRC and industry programs and activities need to be factored into the GI process. Integration has taken place, or is taking place, for a number of GIs. Each case of integration involves a specific set of circumstances and, as a result, the way in which integration proceeds can vary. This paper discusses the integration of issues in the generic issue process and provides a number of examples

  10. Building functional networks of spiking model neurons.

    Science.gov (United States)

    Abbott, L F; DePasquale, Brian; Memmesheimer, Raoul-Martin

    2016-03-01

    Most of the networks used by computer scientists and many of those studied by modelers in neuroscience represent unit activities as continuous variables. Neurons, however, communicate primarily through discontinuous spiking. We review methods for transferring our ability to construct interesting networks that perform relevant tasks from the artificial continuous domain to more realistic spiking network models. These methods raise a number of issues that warrant further theoretical and experimental study.

  11. Number needed to treat and costs per responder among biologic treatments for moderate-to-severe psoriasis: a network meta-analysis.

    Science.gov (United States)

    Armstrong, April W; Betts, Keith A; Signorovitch, James E; Sundaram, Murali; Li, Junlong; Ganguli, Arijit X; Wu, Eric Q

    2018-04-23

    The clinical benefits of biologic therapies for moderate-to-severe psoriasis are well established, but wide variations exist in patient response. To determine the number needed to treat (NNT) to achieve a 75% and 90% reduction in the Psoriasis Area and Severity Index (PASI-75/90) with FDA-approved agents and evaluate the incremental cost per PASI-75 or PASI-90 responder. The relative probabilities of achieving PASI-75 and PASI-90, as well as NNTs, were estimated using a network meta-analysis. Costs (2017 USD) included drug acquisition and administration. The incremental cost per PASI-75 or PASI-90 responder for each treatment was estimated for the clinical trial period, and annually. Compared with supportive care, the NNT to achieve PASI-75 was 1.18 for ixekizumab, 1.29 for secukinumab 300 mg, 1.37 for infliximab, 1.48 for adalimumab, 1.53 for secukinumab 150 mg, 1.58 for ustekinumab, 2.25 for etanercept, and 3.71 for apremilast. The one-year incremental cost per PASI-75 responder relative to supportive care was $59,830 for infliximab, $88,775 for secukinumab 300 mg, $91,837 for adalimumab, $95,898 for ixekizumab, $97,363 for ustekinumab, $105,131 for secukinumab 150 mg, $129,665 for apremilast, and $159,328 for etanercept. Results were similar for PASI-90. The NNT and incremental cost per responder are meaningful ways to assess comparative effectiveness and cost effectiveness among psoriasis treatments.

  12. Suspect screening of large numbers of emerging contaminants in environmental waters using artificial neural networks for chromatographic retention time prediction and high resolution mass spectrometry data analysis.

    Science.gov (United States)

    Bade, Richard; Bijlsma, Lubertus; Miller, Thomas H; Barron, Leon P; Sancho, Juan Vicente; Hernández, Felix

    2015-12-15

    The recent development of broad-scope high resolution mass spectrometry (HRMS) screening methods has resulted in a much improved capability for new compound identification in environmental samples. However, positive identifications at the ng/L concentration level rely on analytical reference standards for chromatographic retention time (tR) and mass spectral comparisons. Chromatographic tR prediction can play a role in increasing confidence in suspect screening efforts for new compounds in the environment, especially when standards are not available, but reliable methods are lacking. The current work focuses on the development of artificial neural networks (ANNs) for tR prediction in gradient reversed-phase liquid chromatography and applied along with HRMS data to suspect screening of wastewater and environmental surface water samples. Based on a compound tR dataset of >500 compounds, an optimized 4-layer back-propagation multi-layer perceptron model enabled predictions for 85% of all compounds to within 2min of their measured tR for training (n=344) and verification (n=100) datasets. To evaluate the ANN ability for generalization to new data, the model was further tested using 100 randomly selected compounds and revealed 95% prediction accuracy within the 2-minute elution interval. Given the increasing concern on the presence of drug metabolites and other transformation products (TPs) in the aquatic environment, the model was applied along with HRMS data for preliminary identification of pharmaceutically-related compounds in real samples. Examples of compounds where reference standards were subsequently acquired and later confirmed are also presented. To our knowledge, this work presents for the first time, the successful application of an accurate retention time predictor and HRMS data-mining using the largest number of compounds to preliminarily identify new or emerging contaminants in wastewater and surface waters. Copyright © 2015 Elsevier B.V. All rights

  13. Mind maps and network analysis to evaluate conceptualization of complex issues: A case example evaluating systems science workshops for childhood obesity prevention.

    Science.gov (United States)

    Frerichs, Leah; Young, Tiffany L; Dave, Gaurav; Stith, Doris; Corbie-Smith, Giselle; Hassmiller Lich, Kristen

    2018-06-01

    Across disciplines, it is common practice to bring together groups to solve complex problems. Facilitators are often asked to help groups organize information about and better understand the problem in order to develop and prioritize solutions. However, despite existence of several methods to elicit and characterize how individuals and groups think about and conceptualize an issue, many are difficult to implement in practice-based settings where resources such as technology and participant time are limited and research questions shift over time. This paper describes an easy-to-implement diagramming technique for eliciting conceptualization and a flexible network analysis method for characterizing changes in both individual and group conceptualization. We use a case example to illustrate how we used the methods to evaluate African American adolescent's conceptual understanding of obesity before and after participating in a series of four systems thinking workshops. The methods produced results that were sensitive to changes in conceptualization that were likely driven by the specific activities employed during the workshop sessions. The methods appear strong for capturing salient levels of conceptualization at both individual and collective levels. The paper concludes with a critical examination of strengths and weaknesses of the methods and implications for future practice and research. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Routing architecture and security for airborne networks

    Science.gov (United States)

    Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato

    2009-05-01

    Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.

  15. Neutron spectrometry and dosimetry with neural networks and Bonner spheres: a study to reduce the spheres number; Espectrometria y dosimetria neutronica con redes neuronales y esferas Bonner: un estudio para reducir el numero de esferas

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza G, J. G.; Martinez B, M. R.; Leon P, A. A.; Hernandez P, C. F.; Castaneda M, V. H.; Solis S, L. O.; Castaneda M, R.; Ortiz R, J. M.; Vega C, H. R. [Universidad Autonoma de Zacatecas, Av. Ramon Lopez Velarde 801, Col. Centro, 98000 Zacatecas, Zac. (Mexico); Mendez, R. [Centro de Investigaciones Energeticas, Medioambientales y Tecnologicas, Laboratorio de Patrones Neutronicos, Av. Complutense 22, 28040 Madrid (Spain); Gallego, E. [Universidad Politecnica de Madrid, Departamento de Ingenieria Nuclear, C. Jose Gutierrez Abascal 2, 28006 Madrid (Spain); De Sousa L, M. A. [Centro de Desenvolvimento da Tecnologia Nuclear / CNEN, Av. Pte. Antonio Carlos 6627, Pampulha, 31270-901 Belo Horizonte, MG (Brazil)

    2016-10-15

    For neutron spectrometry and neutron dosimetry, the Bonner spheres spectrometric system has been the most widely used system, however, the number, size and weight of the spheres composing the system, as well as the need to use a reconstruction code and the long periods of time used to carry out the measurements are some of the disadvantages of this system. For the reconstruction of the spectra, different techniques such as artificial neural networks of reverse propagation have been used. The objective of this work was to reduce the number of Bonner spheres and to use counting speeds in a reverse propagation neural network, optimized by means of the robust design methodology, to reconstruct the neutron spectra. For the design of the neural network we used the neutron spectra of the IAEA and the response matrix of the Bonner spheres with {sup 6}LiI(Eu) detector. The performance of the network was compared; using 7 Bonner spheres against other cases where only 2 and one sphere are used. The network topologies were trained 36 times for each case keeping constant the objective error (1E(-3)), the training algorithm was trains cg and the robust design methodology to determine the best network architectures. With these, the best and worst results were compared. The results obtained using 7 spheres were similar to those with the 5-in sphere, however is still in an information analysis stage. (Author)

  16. Robust Learning of High-dimensional Biological Networks with Bayesian Networks

    Science.gov (United States)

    Nägele, Andreas; Dejori, Mathäus; Stetter, Martin

    Structure learning of Bayesian networks applied to gene expression data has become a potentially useful method to estimate interactions between genes. However, the NP-hardness of Bayesian network structure learning renders the reconstruction of the full genetic network with thousands of genes unfeasible. Consequently, the maximal network size is usually restricted dramatically to a small set of genes (corresponding with variables in the Bayesian network). Although this feature reduction step makes structure learning computationally tractable, on the downside, the learned structure might be adversely affected due to the introduction of missing genes. Additionally, gene expression data are usually very sparse with respect to the number of samples, i.e., the number of genes is much greater than the number of different observations. Given these problems, learning robust network features from microarray data is a challenging task. This chapter presents several approaches tackling the robustness issue in order to obtain a more reliable estimation of learned network features.

  17. Surveillance Jumps on the Network

    Science.gov (United States)

    Raths, David

    2011-01-01

    Internet protocol (IP) network-based cameras and digital video management software are maturing, and many issues that have surrounded them, including bandwidth, data storage, ease of use, and integration are starting to become clearer as the technology continues to evolve. Prices are going down and the number of features is going up. Many school…

  18. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. Scope of Contributions This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  19. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    , such as limited wireless bandwidth operation, routing, scheduling, network control, etc. Currently Bluetooth specification particularly does not describe in details about how to implement Quality of Service and Resource Management in Bluetooth protocol stacks. These issues become significant, when the number...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... capacity allocation, network traffic control, inter-piconet scheduling, and buffer management. First, after a short presentation about Bluetooth technology, and QoS issues, queueing models and a simulation-based buffer management have been constructed. Then by using analysis and simulation, it shows some...

  20. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  1. Smart network expansion - (no) an issue for urban network operators. With hot spot analysis to smart grid; Smarter Netzausbau - (k)ein Thema fuer staedtische Netzbetreiber. Mit Hotspotanalyse zum Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Safirov, Janko; Guarente, Andreas; Haas, Hans-Juergen [Stadtwerke Solingen Netz GmbH, Solingen (Germany); Ladermann, Alexander; Seeger, Nick; Fritz, Wolfgang [Consentec GmbH, Aachen (Germany)

    2013-04-29

    The ongoing construction of production facilities based on renewable energy sources in distribution networks has led to measures to reinforce power distribution systems with many network operators, or this occurs in the near future. Many areal network operators with extended network structures and often lower load in comparison to the installed generation capacity are in the focus of these developments. In contrast, it is frequently assumed for urban distribution networks that these are affected at most sporadic by measures to reinforce power distribution systems. However, basically also for urban network operators the question concerning the development of the supply task rises.

  2. Optimization of the architecture of a neural network in neutron spectrometry to reduce the number of Bonner spheres; Optimizacion de la arquitectura de una red neuronal en espectrometria de neutrones para reducer el numero de esferas Bonner

    Energy Technology Data Exchange (ETDEWEB)

    Leon P, A. A.; Martinez B, M. R.; Hernandez P, C. F.; Espinoza G, J. G.; Castaneda M, V. H.; Solis S, L. O.; Castaneda M, R.; Ortiz R, J. M.; Vega C, H. R. [Universidad Autonoma de Zacatecas, Av. Ramon Lopez Velarde 801, Col. Centro, 98000 Zacatecas, Zac. (Mexico); Mendez V, R. [Centro de Investigaciones Energeticas, Medioambientales y Tecnologicas, Laboratorio de Patrones Neutronicos, Av. Complutense 22, 28040 Madrid (Spain); Gallego, E. [Universidad Politecnica de Madrid, Departamento de Ingenieria Nuclear, ETSI Industriales, Jose Gutierrez Abascal 2, 28006 Madrid (Spain); De Sousa L, M. A. [Centro de Desenvolvimento da Tecnologia Nuclear / CNEN, Av. Pte. Antonio Carlos 6627, 31270-901 Pampulha, Belo Horizonte, Minas Gerais (Brazil)

    2016-10-15

    The neutron spectrometry is an experimental process for determining the energy distribution called the Spectrum. Among the methods available for neutron spectrometry, one can mention the Bonner Sphere Spectrometric System as one of the most used, consisting of a detector placed in the center of a set of polyethylene spheres whose diameters range from 2 to 18 inches, however has some disadvantages such as the long periods of time to perform the measurements, the weight and the spheres number that vary according to the system. From this, alternative methods such as artificial neural networks are proposed. For this project neural networks of reverse propagation were used with the methodology of robust design of artificial neural networks, with the aid of a computational tool that maximizes the performance, making the time used for the training s of the network is the smallest possible and thus gets the orthogonal fixes quickly to determine the best network topology. The counting rates of a spectrometric system with 7 spheres, 2 spheres and one sphere of 5 and 8 inches were used. This methodology seeks to reduce the work used as in the spectrometric system formed by a greater number of spheres, since to enter less data in the counting rates to obtain the spectra with 60 energy levels saves time and space, because at having a smaller number of spheres its portability is easier to move from one place to another, for this we performed several experiments with different errors until we reached the optimal error so that the topology of the network was appropriate and find the best design parameters. A statistical software JMP was also used to obtain the best topologies and thus to retrain obtaining its best and worst spectra, in order to determine if the reduction is possible. (Author)

  3. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  4. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  5. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  6. Liability Issues

    International Nuclear Information System (INIS)

    O’Donoghue, K.

    2016-01-01

    Nuclear liability conventions try to provide a set of rules to govern third party liability. Not all States are parties to one of the existing liability conventions. There are a number of reasons why individual States may choose not to join one of the existing conventions. These include limits of compensation, jurisdiction issues, complexity, cost and definition of damage among others. This paper looks at the existing conventions and identifies some of the main issues in the existing conventions which prevent some States from signing them. The paper attempts to tease out some of the perceived gaps in the existing conventions and give a brief description of the reasons why non-Contracting Parties have difficulty with the provisions of the conventions. The paper recognizes that there has been work done in this area previously by the International Expert Group on Nuclear Liability (INLEX) and others to try to develop the existing frameworks to enhance global adherence by nuclear and non-nuclear States to an effective nuclear liability regime. (author)

  7. Hupa Numbers.

    Science.gov (United States)

    Bennett, Ruth, Ed.; And Others

    An introduction to the Hupa number system is provided in this workbook, one in a series of numerous materials developed to promote the use of the Hupa language. The book is written in English with Hupa terms used only for the names of numbers. The opening pages present the numbers from 1-10, giving the numeral, the Hupa word, the English word, and…

  8. Triangular Numbers

    Indian Academy of Sciences (India)

    Admin

    Triangular number, figurate num- ber, rangoli, Brahmagupta–Pell equation, Jacobi triple product identity. Figure 1. The first four triangular numbers. Left: Anuradha S Garge completed her PhD from. Pune University in 2008 under the supervision of Prof. S A Katre. Her research interests include K-theory and number theory.

  9. Proth Numbers

    Directory of Open Access Journals (Sweden)

    Schwarzweller Christoph

    2015-02-01

    Full Text Available In this article we introduce Proth numbers and prove two theorems on such numbers being prime [3]. We also give revised versions of Pocklington’s theorem and of the Legendre symbol. Finally, we prove Pepin’s theorem and that the fifth Fermat number is not prime.

  10. Research Article Special Issue

    African Journals Online (AJOL)

    2017-11-10

    Nov 10, 2017 ... Emulators like Cooja makes the task easier by allow large and small network of motes to be simulated. ... The packet capturing tool can start capturing once the desired number of motes and bridged are linked in .... Business.

  11. Innovation Networks to Stimulate Public and Private Sector Collaboration for Advisory Services Innovation and Coordination: The Case of Pasture Performance Issues in the New Zealand Dairy Industry

    Science.gov (United States)

    Rijswijk, K.; Brazendale, R.

    2017-01-01

    Purpose: An innovation network, called the Pasture Improvement Leadership Group (PILG), was formed to improve the quality and consistency of advice provided to dairy farmers in New Zealand, after they expressed dissatisfaction with their pastures. The aim of this paper is to better understand the challenges of forming and maintaining networks to…

  12. Using Social Network Graphs as Visualization Tools to Influence Peer Selection Decision-Making Strategies to Access Information about Complex Socioscientific Issues

    Science.gov (United States)

    Yoon, Susan A.

    2011-01-01

    This study extends previous research that explores how visualization affordances that computational tools provide and social network analyses that account for individual- and group-level dynamic processes can work in conjunction to improve learning outcomes. The study's main hypothesis is that when social network graphs are used in instruction,…

  13. Sagan numbers

    OpenAIRE

    Mendonça, J. Ricardo G.

    2012-01-01

    We define a new class of numbers based on the first occurrence of certain patterns of zeros and ones in the expansion of irracional numbers in a given basis and call them Sagan numbers, since they were first mentioned, in a special case, by the North-american astronomer Carl E. Sagan in his science-fiction novel "Contact." Sagan numbers hold connections with a wealth of mathematical ideas. We describe some properties of the newly defined numbers and indicate directions for further amusement.

  14. Eulerian numbers

    CERN Document Server

    Petersen, T Kyle

    2015-01-01

    This text presents the Eulerian numbers in the context of modern enumerative, algebraic, and geometric combinatorics. The book first studies Eulerian numbers from a purely combinatorial point of view, then embarks on a tour of how these numbers arise in the study of hyperplane arrangements, polytopes, and simplicial complexes. Some topics include a thorough discussion of gamma-nonnegativity and real-rootedness for Eulerian polynomials, as well as the weak order and the shard intersection order of the symmetric group. The book also includes a parallel story of Catalan combinatorics, wherein the Eulerian numbers are replaced with Narayana numbers. Again there is a progression from combinatorics to geometry, including discussion of the associahedron and the lattice of noncrossing partitions. The final chapters discuss how both the Eulerian and Narayana numbers have analogues in any finite Coxeter group, with many of the same enumerative and geometric properties. There are four supplemental chapters throughout, ...

  15. Identifying Clusters of Complex Urban–Rural Issues as Part of Policy Making Process Using a Network Analysis Approach: A Case Study in Bahía de Los Ángeles, Mexico

    Directory of Open Access Journals (Sweden)

    Javier Sandoval

    2017-06-01

    Full Text Available Improving human settlements diagnosis is a key factor in effective urban planning and the design of efficient policy making. In this paper, we illustrate how network theory concepts can be applied to reveal the topological structure of functional relationships in a network of heterogeneous urban–rural issues. This mapping is done using clustering algorithms and centrality value techniques. By analyzing emergent groups of urban–rural related issues, our methodology was applied to a rural community, considering in this exercise environmental matters and real estate interests as a way to better understand the structure of salient issues in the context of its urban development program design. Results show clusters that arrange themselves not by an obvious similarity in their constituent components, but by relations observed in urban–rural settings that hint on the issues that the urban development program must focus. Due to its complex nature, the classification of these emerging clusters and how they must be treated in traditional planning instruments is a new challenge that this novel methodology reveals.

  16. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  17. Transfinite Numbers

    Indian Academy of Sciences (India)

    Transfinite Numbers. What is Infinity? S M Srivastava. In a series of revolutionary articles written during the last quarter of the nineteenth century, the great Ger- man mathematician Georg Cantor removed the age-old mistrust of infinity and created an exceptionally beau- tiful and useful theory of transfinite numbers. This is.

  18. Changes in T-cell subpopulations and cytokine network during early period of ibrutinib therapy in chronic lymphocytic leukemia patients: the significant decrease in T regulatory cells number.

    Science.gov (United States)

    Podhorecka, Monika; Goracy, Aneta; Szymczyk, Agnieszka; Kowal, Malgorzata; Ibanez, Blanca; Jankowska-Lecka, Olga; Macheta, Arkadiusz; Nowaczynska, Aleksandra; Drab-Urbanek, Elzbieta; Chocholska, Sylwia; Jawniak, Dariusz; Hus, Marek

    2017-05-23

    B cell receptor (BCR) stimulation signal plays an important role in the pathogenesis of chronic lymphocytic leukemia (CLL), and kinase inhibitors directed toward the BCR pathway are now the promising anti-leukemic drugs. Ibrutinib, a Bruton tyrosine kinase inhibitor, demonstrates promising clinical activity in CLL. It is reported that ibrutinib, additionally to directly targeting leukemic cells, also inhibits the interactions of these cells with T cells, macrophages and accessory cells. Assessment of these mechanisms is important because of their non -direct anti-leukemic effects and to identify possible side effects connected with long-term drug administration.The aim of this study was to assess the in vivo effects of ibrutinib on T-cell subpopulations and cytokine network in CLL. The analysis was performed on a group of 19 patients during first month of ibrutinib therapy. The standard multicolor flow cytometry and cytometric bead array methods were used for assessment of T-cell subsets and cytokines/chemokines, respectively.The data obtained indicates that Ibrutinib treatment results in changes in T-cell subpopulations and cytokine network in CLL patients. Particularly, a significant reduction of T regulatory cells in peripheral blood was observed. By targeting these populations of T cells Ibrutinib can stimulate rejection of tumor cells by the immune system.

  19. First Time Rapid and Accurate Detection of Massive Number of Metal Absorption Lines in the Early Universe Using Deep Neural Network

    Science.gov (United States)

    Zhao, Yinan; Ge, Jian; Yuan, Xiaoyong; Li, Xiaolin; Zhao, Tiffany; Wang, Cindy

    2018-01-01

    Metal absorption line systems in the distant quasar spectra have been used as one of the most powerful tools to probe gas content in the early Universe. The MgII λλ 2796, 2803 doublet is one of the most popular metal absorption lines and has been used to trace gas and global star formation at redshifts between ~0.5 to 2.5. In the past, machine learning algorithms have been used to detect absorption lines systems in the large sky survey, such as Principle Component Analysis, Gaussian Process and decision tree, but the overall detection process is not only complicated, but also time consuming. It usually takes a few months to go through the entire quasar spectral dataset from each of the Sloan Digital Sky Survey (SDSS) data release. In this work, we applied the deep neural network, or “ deep learning” algorithms, in the most recently SDSS DR14 quasar spectra and were able to randomly search 20000 quasar spectra and detect 2887 strong Mg II absorption features in just 9 seconds. Our detection algorithms were verified with previously released DR12 and DR7 data and published Mg II catalog and the detection accuracy is 90%. This is the first time that deep neural network has demonstrated its promising power in both speed and accuracy in replacing tedious, repetitive human work in searching for narrow absorption patterns in a big dataset. We will present our detection algorithms and also statistical results of the newly detected Mg II absorption lines.

  20. Chocolate Numbers

    OpenAIRE

    Ji, Caleb; Khovanova, Tanya; Park, Robin; Song, Angela

    2015-01-01

    In this paper, we consider a game played on a rectangular $m \\times n$ gridded chocolate bar. Each move, a player breaks the bar along a grid line. Each move after that consists of taking any piece of chocolate and breaking it again along existing grid lines, until just $mn$ individual squares remain. This paper enumerates the number of ways to break an $m \\times n$ bar, which we call chocolate numbers, and introduces four new sequences related to these numbers. Using various techniques, we p...

  1. Number theory

    CERN Document Server

    Andrews, George E

    1994-01-01

    Although mathematics majors are usually conversant with number theory by the time they have completed a course in abstract algebra, other undergraduates, especially those in education and the liberal arts, often need a more basic introduction to the topic.In this book the author solves the problem of maintaining the interest of students at both levels by offering a combinatorial approach to elementary number theory. In studying number theory from such a perspective, mathematics majors are spared repetition and provided with new insights, while other students benefit from the consequent simpl

  2. Research Article Special Issue

    African Journals Online (AJOL)

    2016-05-15

    May 15, 2016 ... twice in Iran (Department of Housing and Urban Development,2008,4). Thus, in recent years, ..... For example study of 1200 schoolchildren from four education regions in Tehran Showed that after ... In this case It is expected that be ... In a communication network issue Hierarchy, access and. Sidewalks are ...

  3. Automated conflict resolution issues

    Science.gov (United States)

    Wike, Jeffrey S.

    1991-01-01

    A discussion is presented of how conflicts for Space Network resources should be resolved in the ATDRSS era. The following topics are presented: a description of how resource conflicts are currently resolved; a description of issues associated with automated conflict resolution; present conflict resolution strategies; and topics for further discussion.

  4. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  5. Temporal Databases in Network Management

    National Research Council Canada - National Science Library

    Gupta, Ajay

    1998-01-01

    .... This thesis discusses issues involved with performing network management, specifically with means of reducing and storing the large quantity of data that networks management tools and systems generate...

  6. Nice numbers

    CERN Document Server

    Barnes, John

    2016-01-01

    In this intriguing book, John Barnes takes us on a journey through aspects of numbers much as he took us on a geometrical journey in Gems of Geometry. Similarly originating from a series of lectures for adult students at Reading and Oxford University, this book touches a variety of amusing and fascinating topics regarding numbers and their uses both ancient and modern. The author intrigues and challenges his audience with both fundamental number topics such as prime numbers and cryptography, and themes of daily needs and pleasures such as counting one's assets, keeping track of time, and enjoying music. Puzzles and exercises at the end of each lecture offer additional inspiration, and numerous illustrations accompany the reader. Furthermore, a number of appendices provides in-depth insights into diverse topics such as Pascal’s triangle, the Rubik cube, Mersenne’s curious keyboards, and many others. A theme running through is the thought of what is our favourite number. Written in an engaging and witty sty...

  7. Preparing tomorrow's network today: RTE at the crossroads of the European electricity system. Cross-border electricity interconnections Key issues and figures - 2014 Edition

    International Nuclear Information System (INIS)

    2014-10-01

    The interconnected electricity transmission network is a key element for ensuring security of supply, the creation of a single market and the integration of renewable energies. RTE and its European partners provide strengthened coordination by the use of interconnections to ensure solidarity between European countries. Interconnections also allow an electricity supplier to sell its energy to a customer located in another country in Europe. They contribute on a European scale to optimising the use of production means and in particular the integration of variable renewable energies. RTE, within the EnTSo-E (European Network of Transmission System Operators for Electricity), contributes to the publication of a common vision of the future of networks by 2030. The needs for new interconnection capacity are identified in the ten-year European network development plan (TYnDP) on the basis of a cost-benefit analysis. France is interconnected to all its neighbours via many cross-border links. However interconnection capacity with the various countries and its use differ widely. The usage profile of the interconnections is specific to each border and varies according to: - the characteristics of the production mix of each country, and in particular the level of production of renewable energies. - the level of consumption, which depends on the season, the type of day (working or non-working) the time of day, etc. - import and export capacity, which may be different depending on the internal constraints of the networks of each country

  8. Number names and number understanding

    DEFF Research Database (Denmark)

    Ejersbo, Lisser Rye; Misfeldt, Morten

    2014-01-01

    This paper concerns the results from the first year of a three-year research project involving the relationship between Danish number names and their corresponding digits in the canonical base 10 system. The project aims to develop a system to help the students’ understanding of the base 10 syste...... the Danish number names are more complicated than in other languages. Keywords: A research project in grade 0 and 1th in a Danish school, Base-10 system, two-digit number names, semiotic, cognitive perspectives....

  9. ALARA notes, Number 8

    International Nuclear Information System (INIS)

    Khan, T.A.; Baum, J.W.; Beckman, M.C.

    1993-10-01

    This document contains information dealing with the lessons learned from the experience of nuclear plants. In this issue the authors tried to avoid the 'tyranny' of numbers and concentrated on the main lessons learned. Topics include: filtration devices for air pollution abatement, crack repair and inspection, and remote handling equipment

  10. Funny Numbers

    Directory of Open Access Journals (Sweden)

    Theodore M. Porter

    2012-12-01

    Full Text Available The struggle over cure rate measures in nineteenth-century asylums provides an exemplary instance of how, when used for official assessments of institutions, these numbers become sites of contestation. The evasion of goals and corruption of measures tends to make these numbers “funny” in the sense of becoming dis-honest, while the mismatch between boring, technical appearances and cunning backstage manipulations supplies dark humor. The dangers are evident in recent efforts to decentralize the functions of governments and corporations using incen-tives based on quantified targets.

  11. Transcendental numbers

    CERN Document Server

    Murty, M Ram

    2014-01-01

    This book provides an introduction to the topic of transcendental numbers for upper-level undergraduate and graduate students. The text is constructed to support a full course on the subject, including descriptions of both relevant theorems and their applications. While the first part of the book focuses on introducing key concepts, the second part presents more complex material, including applications of Baker’s theorem, Schanuel’s conjecture, and Schneider’s theorem. These later chapters may be of interest to researchers interested in examining the relationship between transcendence and L-functions. Readers of this text should possess basic knowledge of complex analysis and elementary algebraic number theory.

  12. NST Quarterly - January 1998 issue

    International Nuclear Information System (INIS)

    1998-01-01

    NST Quarterly reports current development in Nuclear Science and Technology in Malaysia. In this issue it highlights MINT activities in proposal of national networking for biotechnology culture collection centre (NNBCCC)

  13. Deploying temporary networks for upscaling of sparse network stations

    Science.gov (United States)

    Coopersmith, Evan J.; Cosh, Michael H.; Bell, Jesse E.; Kelly, Victoria; Hall, Mark; Palecki, Michael A.; Temimi, Marouane

    2016-10-01

    Soil observations networks at the national scale play an integral role in hydrologic modeling, drought assessment, agricultural decision support, and our ability to understand climate change. Understanding soil moisture variability is necessary to apply these measurements to model calibration, business and consumer applications, or even human health issues. The installation of soil moisture sensors as sparse, national networks is necessitated by limited financial resources. However, this results in the incomplete sampling of the local heterogeneity of soil type, vegetation cover, topography, and the fine spatial distribution of precipitation events. To this end, temporary networks can be installed in the areas surrounding a permanent installation within a sparse network. The temporary networks deployed in this study provide a more representative average at the 3 km and 9 km scales, localized about the permanent gauge. The value of such temporary networks is demonstrated at test sites in Millbrook, New York and Crossville, Tennessee. The capacity of a single U.S. Climate Reference Network (USCRN) sensor set to approximate the average of a temporary network at the 3 km and 9 km scales using a simple linear scaling function is tested. The capacity of a temporary network to provide reliable estimates with diminishing numbers of sensors, the temporal stability of those networks, and ultimately, the relationship of the variability of those networks to soil moisture conditions at the permanent sensor are investigated. In this manner, this work demonstrates the single-season installation of a temporary network as a mechanism to characterize the soil moisture variability at a permanent gauge within a sparse network.

  14. Transfinite Numbers

    Indian Academy of Sciences (India)

    this is a characteristic difference between finite and infinite sets and created an immensely useful branch of mathematics based on this idea which had a great impact on the whole of mathe- matics. For example, the question of what is a number (finite or infinite) is almost a philosophical one. However Cantor's work turned it ...

  15. 77 FR 43567 - Medical Area Body Network

    Science.gov (United States)

    2012-07-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 2 and 95 [ET Docket No. 08-59; FCC 12-54] Medical... document requests comment on a number of issues related to the designation of Medical Body Area Network (``MBAN'') coordinator(s) for the 2360-2390 MHz band. Although the [[Page 43568

  16. Pragmatic Numbers

    DEFF Research Database (Denmark)

    Seabrooke, Leonard

    2012-01-01

    Sector Assessment Programme (FSAP). While the IMF is typically viewed as an institution that enforces global standards for economic governance through the imposition of quantitative targets (‘numbers’ for this special issue), I suggest that its use of benchmarking in the generation of financial data can...... market actors. This article suggests that we cannot simply view the IMF staff as hostage to their commanders. Rather, the IMF's use of ‘pragmatic numbers’ within FSAPs demonstrates one method by which an institution seeks to foster learning under constraint.......Do international organisations generate benchmarks as tools for policy enforcement or policy learning? This article suggests that the latter is possible even in unlikely scenarios. It does this through a case study on the ‘power of numbers’ in the International Monetary Fund's (IMF) Financial...

  17. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  18. Family Issues

    Science.gov (United States)

    ... es Autismo? Family Issues Home / Living with Autism / Family Issues Stress Siblings A child’s autism diagnosis affects every member of the family in different ways. Parents/caregivers must now place their ... may put stress on their marriage, other children, work, finances, and ...

  19. Global Issues

    Energy Technology Data Exchange (ETDEWEB)

    Seitz, J.L.

    2001-10-15

    Global Issues is an introduction to the nature and background of some of the central issues - economic, social, political, environmental - of modern times. This new edition of this text has been fully updated throughout and features expanded sections on issues such as global warming, biotechnology, and energy. Fully updated throughout and features expanded sections on issues such as global warming, biotechnology, and energy. An introduction to the nature and background of some of the central issues - economic, social, political, environmental - of modern times. Covers a range of perspectives on a variety of societies, developed and developing. Extensively illustrated with diagrams and photographs, contains guides to further reading, media, and internet resources, and includes suggestions for discussion and studying the material. (author)

  20. Intelligence in the power grid and services to the consumers. Issue paper - working group 4; Denmark. Smart Grid Network; Intelligens i el-nettet og serviceydelser til forbrugerne. Issue paper, arbejdsgruppe 4

    Energy Technology Data Exchange (ETDEWEB)

    Jonsen, B.O. (Solar Danmark A/S, Vejen (Denmark)); Hauge, B. (IT-Branchen, Copenhagen (Denmark)); Strunge, C. (Energinet.dk, Fredericia (Denmark)) (and others)

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 4 was to investigate what it takes to involve consumers in smart grid and how to create good conditions for new services related to smart grid. Against this background, the working group agreed the following recommendations: 1) Enhance consumer engagement. A prerequisite for electricity customers becoming involved in smart grid is that they have awareness and knowledge about the smart grid and their own possibilities for action in relation thereto. Therefore it is important that concepts such as smart grid and flexible electricity consumption gradually become popular among electric customers; 2) Minimize the risk. In order to promote electric customers' and other stakeholders' participation in the smart grid, the risk of this participation must be minimized. It is therefore recommended to enhance the skills of the professionals and to establish a common framework for security; 3) Make it easier to create new services. Part of the potential of smart grid can be realized through new services such as delivery of flexible electricity consumption for electric cars and heat pumps and the resale of local power generation at the customer. To facilitate the conditions for these services, the working group recommends that better access to relevant data is created, that the interoperability of smart grid solutions is strengthened, that requirements for buildings are made, that it is made easier to be an aggregator, and that test and inspiration laboratories for small and medium enterprises in the smart grid area are established. (LN)

  1. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2011-01-01

    is becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about how companies can organize these networks and coordinate between them effectively. The propositions are developed by employing the design science approach based on a literature......Production, innovation and service networks of companies all over the world become increasingly decentralized, specialized and interdependent. The three characteristics combined inevitably lead to the formation of complex configurations of assets and capabilities crossing both national...... and organisational borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that coordinating them and managing their interfaces in global operations context...

  2. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2012-01-01

    Production, innovation and service networks of companies all over the world become increasingly decentralised, specialised and interdependent. These three characteristics combined inevitably lead to the formation of complex configurations of resources, crossing both national and organisational...... borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gaps between these networks mean that coordinating them and managing their interfaces in a global operations context...... are becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about the development and organisation of these networks. The paper highlights the critical importance of engineering operations in this process. The propositions are developed...

  3. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  4. Networks of networks – An introduction

    International Nuclear Information System (INIS)

    Kenett, Dror Y.; Perc, Matjaž; Boccaletti, Stefano

    2015-01-01

    Graphical abstract: Interdependent network reciprocity. Only those blue cooperative domains that are initially present on both networks survive. Abstract: This is an introduction to the special issue titled “Networks of networks” that is in the making at Chaos, Solitons & Fractals. Recent research and reviews attest to the fact that networks of networks are the next frontier in network science [1–7]. Not only are interactions limited and thus inadequately described by well-mixed models, it is also a fact that the networks that should be an integral part of such models are often interconnected, thus making the processes that are unfolding on them interdependent. From the World economy and transportation systems to social media, it is clear that processes taking place in one network might significantly affect what is happening in many other networks. Within an interdependent system, each type of interaction has a certain relevance and meaning, so that treating all the links identically inevitably leads to information loss. Networks of networks, interdependent networks, or multilayer networks are therefore a much better and realistic description of such systems, and this Special Issue is devoted to their structure, dynamics and evolution, as well as to the study of emergent properties in multi-layered systems in general. Topics of interest include but are not limited to the spread of epidemics and information, percolation, diffusion, synchronization, collective behavior, and evolutionary games on networks of networks. Interdisciplinary work on all aspects of networks of networks, regardless of background and motivation, is very welcome.

  5. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  6. Social network and addiction.

    Science.gov (United States)

    La Barbera, Daniele; La Paglia, Filippo; Valsavoia, Rosaria

    2009-01-01

    In recent decades, the rapid development of innovative Internet-based communication technologies created a new field of academic study among scholars. Particularly, the attention of researchers is focusing on new ways to form relationship-thought social web. Social Network sites constitute a new form of web communities, where people meet and share interests and activities. Due to exponential growth of these sites, an increasing number of scholars are beginning to study the emergent phenomena in order to identify any psychopathological risk related to use of social web, such as addiction. This article examines the recent literature about this issue.

  7. Analytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs

    Directory of Open Access Journals (Sweden)

    Ali Soner Kilinc

    2017-08-01

    Full Text Available A Linear Wireless Sensor Network (LWSN is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be minimized by adjusting the distance between the sensor nodes which is known as hop length. In this paper, analytical and algorithmic approaches are presented to determine the number of hops and sensor nodes for minimum power consumption in a linear wireless sensor network including equidistantly placed sensor nodes.

  8. Higher Education Faculty in Mexico and the United States: Characteristics and Policy Issues. Understanding the Differences: A Working Paper Series on Higher Education in the U. S. and Mexico. Working Paper Number 2.

    Science.gov (United States)

    Lovell, Cheryl D.; Sanchez, Maria Dolores Soler

    This working paper analyzes higher education faculty characteristics in Mexico and the United States. The first section describes and compares Mexican and U.S. faculty characteristics and conditions, including total number of faculty, student-teacher ratios, full- versus part-time status, rank, tenure, average salaries, gender and ethnicity, and…

  9. An emergentist perspective on the origin of number sense.

    Science.gov (United States)

    Zorzi, Marco; Testolin, Alberto

    2017-02-19

    The finding that human infants and many other animal species are sensitive to numerical quantity has been widely interpreted as evidence for evolved, biologically determined numerical capacities across unrelated species, thereby supporting a 'nativist' stance on the origin of number sense. Here, we tackle this issue within the 'emergentist' perspective provided by artificial neural network models, and we build on computer simulations to discuss two different approaches to think about the innateness of number sense. The first, illustrated by artificial life simulations, shows that numerical abilities can be supported by domain-specific representations emerging from evolutionary pressure. The second assumes that numerical representations need not be genetically pre-determined but can emerge from the interplay between innate architectural constraints and domain-general learning mechanisms, instantiated in deep learning simulations. We show that deep neural networks endowed with basic visuospatial processing exhibit a remarkable performance in numerosity discrimination before any experience-dependent learning, whereas unsupervised sensory experience with visual sets leads to subsequent improvement of number acuity and reduces the influence of continuous visual cues. The emergent neuronal code for numbers in the model includes both numerosity-sensitive (summation coding) and numerosity-selective response profiles, closely mirroring those found in monkey intraparietal neurons. We conclude that a form of innatism based on architectural and learning biases is a fruitful approach to understanding the origin and development of number sense.This article is part of a discussion meeting issue 'The origins of numerical abilities'. © 2017 The Authors.

  10. Increase in the number of distributed power generation installations in electricity distribution grids - Simulation in a 16 kV medium-voltage network; Zunahme der dezentralen Energieerzeugungsanlagen in elektrischen Verteilnetzen: Simulationen im 16 kV Mittelspannungsnetz des AEW

    Energy Technology Data Exchange (ETDEWEB)

    Hoeckel, M.; Luechinger, P.

    2003-07-01

    This is the seventh part of a ten-part final report for the Swiss Federal Office of Energy (SFOE) on a project that looked into potential problems relating to the Swiss electricity distribution grid with respect to the increasing number of distributed power generation facilities being put into service. The identification of special conditions for the grid's operation and future development that take increasing decentralised power production into account are discussed. The results of the project activities encompass the analysis and evaluation of various problem areas associated with planning and management of the grid during normal operation and periods of malfunction, as well as required modifications to safety systems and grid configurations. This sixth appendix to the main report presents and discusses the results of simulations made on the basis of the real-life 16 kV medium-voltage distribution network operated by the Aargovian electricity utility AEW. This appendix describes the simulation methods used and the basic characteristics of medium-voltage networks and distributed generation facilities. Different types of load profiles, including domestic and industrial loads, are discussed. The results of the simulations are presented in graphical form and provide profiles of voltage and current, active and reactive power and further mains characteristics for varying load conditions. Also, daily profiles for situations with and without distributed generation are presented and short-circuit simulations and grid dynamics are discussed.

  11. Increase in the number of distributed power generation installations in electricity distribution grids - Simulation in a 400 V low-voltage network; Zunahme der dezentralen Energieerzeugungsanlagen in elektrischen Verteilnetzen: Simulationen im 400 V Niederspannungsnetz des ewz

    Energy Technology Data Exchange (ETDEWEB)

    Hoeckel, M.; Luechinger, P.

    2003-07-01

    This is the sixth part of a ten-part final report for the Swiss Federal Office of Energy (SFOE) on a project that looked into potential problems relating to the Swiss electricity distribution grid with respect to the increasing number of distributed power generation facilities being put into service. The identification of special conditions for the grid's operation and future development that take increasing decentralised power production into account are discussed. The results of the project activities encompass the analysis and evaluation of various problem areas associated with planning and management of the grid during normal operation and periods of malfunction, as well as required modifications to safety systems and grid configurations. This fifth appendix to the main report presents and discusses the results of simulations made on the basis of the real-life 400 V low-voltage distribution network operated by the public utilities of the City of Zurich, Switzerland. This comprehensive appendix describes the simulation methods used and the basic characteristics of low-voltage networks and distributed generation facilities. The 6 simulation variants used are also described. The results of the simulations are presented in graphical form and provide profiles of voltage and current, active and reactive power and further mains characteristics for varying load conditions. Also, short-circuit simulations and harmonics analysis are discussed.

  12. The Brothel Phone Number

    DEFF Research Database (Denmark)

    Korsby, Trine Mygind

    2017-01-01

    Taking a point of departure in negotiations for access to a phone number for a brothel abroad, the article demonstrates how a group of pimps in Eastern Romania attempt to extend their local business into the rest of the EU. The article shows how the phone number works as a micro-infrastructure in......Taking a point of departure in negotiations for access to a phone number for a brothel abroad, the article demonstrates how a group of pimps in Eastern Romania attempt to extend their local business into the rest of the EU. The article shows how the phone number works as a micro...... in turn cultivate and maximize uncertainty about themselves in others. When making the move to go abroad into unknown terrains, accessing the infrastructure generated by the phone number can provide certainty and consolidate one’s position within criminal networks abroad. However, at the same time......, mishandling the phone number can be dangerous and in that sense produce new doubts and uncertainties....

  13. A Framework for visualization of criminal networks

    DEFF Research Database (Denmark)

    Rasheed, Amer

    networks, network analysis, composites, temporal data visualization, clustering and hierarchical clustering of data but there are a number of areas which are overlooked by the researchers. Moreover there are some issues, for instance, lack of effective filtering techniques, computational overhead......This Ph.D. thesis describes research concerning the application of criminal network visualization in the field of investigative analysis. There are number of way with which the investigative analysis can locate the hidden motive behind any criminal activity. Firstly, the investigative analyst must...... have the ability to understand the criminal plot since a comprehensive plot is a pre-requisite to conduct an organized crime. Secondly, the investigator should understand the organization and structure of criminal network. The knowledge about these two aspects is vital in conducting an investigative...

  14. Five years of interdisciplinary research on ageing and technology: Outcomes of the Lower Saxony Research Network Design of Environments for Ageing (GAL)--an introduction to this Special Issue on Ageing and Technology.

    Science.gov (United States)

    Haux, Reinhold; Hein, Andreas; Kolb, Gerald; Künemund, Harald; Eichelberg, Marco

    2014-01-01

    This Special Issue of Informatics for Health and Social Care is presenting outcomes of the Lower Saxony Research Network Design of Environments for Ageing (abbreviated as GAL), probably one of the largest inter- and multidisciplinary research projects on aging and technology. In order to investigate and provide answers on whether new information and communication technologies can contribute to keeping, or even improving quality of life, health and self-sufficiency in ageing societies through new ways of living and new forms of care, GAL had been established as a five-year research project, running from 2008 to 2013. Ambient-assisted living technologies in personal and home environments were especially important. During the five years of research in GAL, more than seventy researchers from computer science, economics, engineering, geriatrics, gerontology, informatics, medicine, nursing science and rehabilitation pedagogy intensively collaborated in finding answers.

  15. Workforce Issues.

    Science.gov (United States)

    1996

    This document consists of four papers presented during a symposium on work force issues moderated by Jan DeJong at the 1996 conference of the Academy of Human Resource Development (AHRD). "Rethinking the Ties that Bind: An Exploratory Study of Employee Development in Utilities in Canada and the United States" (Michael Aherne, David…

  16. Sanskrit Issue.

    Science.gov (United States)

    Miller, Barbara Stoler, Ed.

    1971-01-01

    This issue of "Mahfil" is devoted to Sanskrit literature and contains a note on Sanskrit pronunciation and selections of Sanskrit literature. It also contains articles analyzing and discussing various aspects of the literature, including "Sanskrit Rhetoric and Poetic,""The Creative Role of the Goddess Vac in the…

  17. Bond Issues.

    Science.gov (United States)

    Pollack, Rachel H.

    2000-01-01

    Notes trends toward increased borrowing by colleges and universities and offers guidelines for institutions that are considering issuing bonds to raise money for capital projects. Discussion covers advantages of using bond financing, how use of bonds impacts on traditional fund raising, other cautions and concerns, and some troubling aspects of…

  18. High intensity proton accelerator controls network upgrade

    International Nuclear Information System (INIS)

    Krempaska, R.; Bertrand, A.; Lendzian, F.; Lutz, H.

    2012-01-01

    The High Intensity Proton Accelerator (HIPA) control system network is spread through a vast area in PSI and it was grown historically in an unorganized way. The miscellaneous network hardware infrastructure and the lack of the documentation and components overview could no longer guarantee the reliability of the control system and the facility operation. Therefore, a new network, based on modern network topology, PSI standard hardware with monitoring and detailed documentation and overview was needed. The number of active components has been reduced from 25 to 9 Cisco Catalyst 24- or 48-port switches. They are the same type as other PSI switches, thus a replacement emergency stock is not an issue anymore. We would like to present how we successfully achieved this goal and the advantages of the clean and well documented network infrastructure. (authors)

  19. IJIMAI Editors Note - Vol. 4 Issue 1

    Directory of Open Access Journals (Sweden)

    Mohamed Bahaj

    2016-09-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: Pattern Recognition, Multimedia Information Retrieval, Knowledge extraction and knowledge mining, Data mining, Intelligent Systems and Artificial Intelligence, Wireless Technology, Network Telecommunication, Security and Network Management, Advanced Network Technologies.

  20. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  1. Seeded Bayesian Networks: Constructing genetic networks from microarray data

    Directory of Open Access Journals (Sweden)

    Quackenbush John

    2008-07-01

    Full Text Available Abstract Background DNA microarrays and other genomics-inspired technologies provide large datasets that often include hidden patterns of correlation between genes reflecting the complex processes that underlie cellular metabolism and physiology. The challenge in analyzing large-scale expression data has been to extract biologically meaningful inferences regarding these processes – often represented as networks – in an environment where the datasets are often imperfect and biological noise can obscure the actual signal. Although many techniques have been developed in an attempt to address these issues, to date their ability to extract meaningful and predictive network relationships has been limited. Here we describe a method that draws on prior information about gene-gene interactions to infer biologically relevant pathways from microarray data. Our approach consists of using preliminary networks derived from the literature and/or protein-protein interaction data as seeds for a Bayesian network analysis of microarray results. Results Through a bootstrap analysis of gene expression data derived from a number of leukemia studies, we demonstrate that seeded Bayesian Networks have the ability to identify high-confidence gene-gene interactions which can then be validated by comparison to other sources of pathway data. Conclusion The use of network seeds greatly improves the ability of Bayesian Network analysis to learn gene interaction networks from gene expression data. We demonstrate that the use of seeds derived from the biomedical literature or high-throughput protein-protein interaction data, or the combination, provides improvement over a standard Bayesian Network analysis, allowing networks involving dynamic processes to be deduced from the static snapshots of biological systems that represent the most common source of microarray data. Software implementing these methods has been included in the widely used TM4 microarray analysis package.

  2. Estimating fuel cycle externalities: Analytical methods and issues. Report number 2 on the external costs and benefits of fuel cycles: A study by the U.S. Department of Energy and the Commission of the European Communities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-07-01

    This report, the second in a series of eight reports, is part of a joint study by the U.S. Department of Energy (DOE) and the Commission of the European Communities (EC) 'on the externalities of fuel cycles.' Part I illustrates the use of the atmospheric dispersion and transformation modeling that this study recommends for airborne pollutants in the coal, biomass, oil, and natural gas fuel cycles. Part II of this volume contains a paper which reviews the scientific literature on ecological impacts associated with power plant discharges. Part III contains papers summarizing the relevant health effects literature. Part IV contains papers on methods of economic evaluation. Part V contains four papers on various issues related to the estimation of externalities and their use in public policy. The final part is Part VI, and it contains a paper which describes a system for summarizing analysts' assessments of the quality of the information that an analysis uses to estimate externalities. This system allows analysts to provide information, not only on their best estimates, but also on a range of estimates, on uncertainty, on the quality of the data, and on other factors that better reflect the full dimension of making estimates under uncertainty. The system has broad applicability beyond fuel cycle externalities, as well.

  3. Estimating fuel cycle externalities: Analytical methods and issues. Report number 2 on the external costs and benefits of fuel cycles: A study by the U.S. Department of Energy and the Commission of the European Communities

    International Nuclear Information System (INIS)

    1994-07-01

    This report, the second in a series of eight reports, is part of a joint study by the U.S. Department of Energy (DOE) and the Commission of the European Communities (EC) 'on the externalities of fuel cycles.' Part I illustrates the use of the atmospheric dispersion and transformation modeling that this study recommends for airborne pollutants in the coal, biomass, oil, and natural gas fuel cycles. Part II of this volume contains a paper which reviews the scientific literature on ecological impacts associated with power plant discharges. Part III contains papers summarizing the relevant health effects literature. Part IV contains papers on methods of economic evaluation. Part V contains four papers on various issues related to the estimation of externalities and their use in public policy. The final part is Part VI, and it contains a paper which describes a system for summarizing analysts' assessments of the quality of the information that an analysis uses to estimate externalities. This system allows analysts to provide information, not only on their best estimates, but also on a range of estimates, on uncertainty, on the quality of the data, and on other factors that better reflect the full dimension of making estimates under uncertainty. The system has broad applicability beyond fuel cycle externalities, as well

  4. Issues and Challenges With Integrating Patient-Reported Outcomes in Clinical Trials Supported by the National Cancer Institute–Sponsored Clinical Trials Networks

    Science.gov (United States)

    Bruner, Deborah Watkins; Bryan, Charlene J.; Aaronson, Neil; Blackmore, C. Craig; Brundage, Michael; Cella, David; Ganz, Patricia A.; Gotay, Carolyn; Hinds, Pamela S.; Kornblith, Alice B.; Movsas, Benjamin; Sloan, Jeff; Wenzel, Lari; Whalen, Giles

    2016-01-01

    Purpose The objective of this report is to provide a historical overview of and the issues and challenges inherent in the incorporation of patient-reported outcomes (PROs) into multinational cancer clinical trials in the cancer cooperative groups. Methods An online survey of 12 cancer cooperative groups from the United States, Canada, and Europe was conducted between June and August of 2006. Each of the cooperative groups designated one respondent, who was a member of one of the PRO committees within the cooperative group. Results There was a 100% response rate, and all of the cancer clinical trial cooperative groups reported conducting PRO research. PRO research has been conducted in the cancer cooperative groups for an average of 15 years (range, 6 to 30 years), and all groups had multidisciplinary committees focused on the design of PRO end points and the choice of appropriate PRO measures for cancer clinical trials. The cooperative groups reported that 5% to 50% of cancer treatment trials and an estimated 50% to 75% of cancer control trials contained PRO primary and secondary end points. There was considerable heterogeneity among the cooperative groups with respect to the formal and informal policies and procedures or cooperative group culture towards PROs, investigator training/mentorship, and resource availability for the measurement and conduct of PRO research within the individual cooperatives. Conclusion The challenges faced by the cooperative groups to the incorporation of PROs into cancer clinical trials are varied. Some common opportunities for improvement include the adoption of standardized training/mentorship mechanisms for investigators for the conduct of PRO assessments and data collection and the development of minimal criteria for PRO measure acceptability. A positive cultural shift has occurred in most of the cooperative groups related to the incorporation of PROs in clinical trials; however, financial and other resource barriers remain and need

  5. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-03-07

    Mar 7, 2018 ... Labor deployment issues play an important role in analyzing their use at the country or regional level .... The growth of employment in the service sector since the 50s, as a result of the rapid ... Hotels and restaurants. 23,0 ..... for the better, its number decreases and the quality of labor resources deteriorates.

  6. Theoretical Issues

    Energy Technology Data Exchange (ETDEWEB)

    Marc Vanderhaeghen

    2007-04-01

    The theoretical issues in the interpretation of the precision measurements of the nucleon-to-Delta transition by means of electromagnetic probes are highlighted. The results of these measurements are confronted with the state-of-the-art calculations based on chiral effective-field theories (EFT), lattice QCD, large-Nc relations, perturbative QCD, and QCD-inspired models. The link of the nucleon-to-Delta form factors to generalized parton distributions (GPDs) is also discussed.

  7. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  8. Transmission issues

    International Nuclear Information System (INIS)

    Bradford, J.; Wilson, L.; Thon, S.; Millar, N.

    2005-01-01

    This session on transmission issues focused on the role that transmission plays in electricity markets and the importance of getting the market structure right in terms of generation divestiture with buy back contracts, demand side responsive programs, transmission upgrades and long term contracts. The difficulties of distinguishing between market power and scarcity were examined along with some of the complications that ensue if transmission experiences congestion, as exemplified by the August 2003 blackout in eastern North America. The presentations described the best ways to handle transmission issues, and debated whether transmission should be deregulated or follow market forces. Issues of interconnections and reliability of connections were also debated along with the attempt to integrate renewables into the grid. Some presentations identified what new transmission must be built and what must be done to ensure that transmission gets built. The challenges and business opportunities for transmission in Alberta were discussed with reference to plans to invest in new infrastructure, where it is going outside of the province and how it works with other jurisdictions. Manitoba's Conawapa Hydro Project and its 2000 MW tie line to Ontario was also discussed. Some examples of non-optimal use of interconnections in Europe were also discussed in an effort to learn from these mistakes and avoid them in Canada. tabs., figs

  9. Miscellaneous issues

    International Nuclear Information System (INIS)

    2002-01-01

    The New Brunswick Market Design Committee has examined several issues regarding the restructuring of the province's electricity sector. This report presents issues that require guidance for implementation, with particular focus on options available for their resolutions. The issues include: (1) rate principles for stranded offer service (SOS) supply, (2) the ability of contestable customers to return to SOS after having left it, (3) whether loads embedded in distribution systems are eligible to participate in the bilateral contract market, (4) whether generators or suppliers can offer capacity and energy to SOS suppliers in competition with the SOS supplier, and (5) details for the balancing market, including pricing, bidding protocols, settlements and how intermittent power sources can participate in the market. A section on pricing for SOS explains pricing principles, the use of export profits, pricing for SOS capacity, and time of use pricing. The Committee has made recommendations for the electricity system in the province to have an energy imbalance service that can move towards a market in order to develop an efficient and effective service. This report also explains pricing in the balancing market, penalties, and settlements. 7 refs

  10. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  11. Energy- Efficient Routing Protocols For Wireless Sensor Network A Review

    Directory of Open Access Journals (Sweden)

    Pardeep Kaur

    2017-12-01

    Full Text Available There has been plenty of interest in building and deploying sensor networks. Wireless sensor network is a collection of a large number of small nodes which acts as routers also. These nodes carry very limited power source which is non-rechargeable and non-replaceable which makes energy consumption an significant issue. Energy conservation is a very important issue for prolonging the lifetime of the network. As the sensor nodes act like routers as well the determination of routing technique plays a key role in controlling the consumption of energy. This paper describes the framework of wireless sensor network and the analysis and study of various research work related to Energy Efficient Routing in Wireless Sensor Networks.

  12. Synergistic effects in threshold models on networks

    Science.gov (United States)

    Juul, Jonas S.; Porter, Mason A.

    2018-01-01

    Network structure can have a significant impact on the propagation of diseases, memes, and information on social networks. Different types of spreading processes (and other dynamical processes) are affected by network architecture in different ways, and it is important to develop tractable models of spreading processes on networks to explore such issues. In this paper, we incorporate the idea of synergy into a two-state ("active" or "passive") threshold model of social influence on networks. Our model's update rule is deterministic, and the influence of each meme-carrying (i.e., active) neighbor can—depending on a parameter—either be enhanced or inhibited by an amount that depends on the number of active neighbors of a node. Such a synergistic system models social behavior in which the willingness to adopt either accelerates or saturates in a way that depends on the number of neighbors who have adopted that behavior. We illustrate that our model's synergy parameter has a crucial effect on system dynamics, as it determines whether degree-k nodes are possible or impossible to activate. We simulate synergistic meme spreading on both random-graph models and networks constructed from empirical data. Using a heterogeneous mean-field approximation, which we derive under the assumption that a network is locally tree-like, we are able to determine which synergy-parameter values allow degree-k nodes to be activated for many networks and for a broad family of synergistic models.

  13. A novel approach to Service Discovery in Mobile Adhoc Network

    OpenAIRE

    Islam, Noman; Shaikh, Zubair A.

    2015-01-01

    Mobile Adhoc Network (MANET) is a network of a number of mobile routers and associated hosts, organized in a random fashion via wireless links. During recent years MANET has gained enormous amount of attention and has been widely used for not only military purposes but for search-and-rescue operations, intelligent transportation system, data collection, virtual classrooms and ubiquitous computing. Service Discovery is one of the most important issues in MANET. It is defined as the process of ...

  14. Mapping Koch curves into scale-free small-world networks

    International Nuclear Information System (INIS)

    Zhang Zhongzhi; Gao Shuyang; Zhou Shuigeng; Chen Lichao; Zhang Hongjuan; Guan Jihong

    2010-01-01

    The class of Koch fractals is one of the most interesting families of fractals, and the study of complex networks is a central issue in the scientific community. In this paper, inspired by the famous Koch fractals, we propose a mapping technique converting Koch fractals into a family of deterministic networks called Koch networks. This novel class of networks incorporates some key properties characterizing a majority of real-life networked systems-a power-law distribution with exponent in the range between 2 and 3, a high clustering coefficient, a small diameter and average path length and degree correlations. Besides, we enumerate the exact numbers of spanning trees, spanning forests and connected spanning subgraphs in the networks. All these features are obtained exactly according to the proposed generation algorithm of the networks considered. The network representation approach could be used to investigate the complexity of some real-world systems from the perspective of complex networks.

  15. Organizational Issues, Structure, and Processes of Care in 257 ICUs in Latin America: A Study From the Latin America Intensive Care Network.

    Science.gov (United States)

    Estenssoro, Elisa; Alegría, Leyla; Murias, Gastón; Friedman, Gilberto; Castro, Ricardo; Nin Vaeza, Nicolas; Loudet, Cecilia; Bruhn, Alejandro; Jibaja, Manuel; Ospina-Tascon, Gustavo; Ríos, Fernando; Machado, Flavia R; Biasi Cavalcanti, Alexandre; Dubin, Arnaldo; Hurtado, F Javier; Briva, Arturo; Romero, Carlos; Bugedo, Guillermo; Bakker, Jan; Cecconi, Maurizio; Azevedo, Luciano; Hernandez, Glenn

    2017-08-01

    Latin America bears an important burden of critical care disease, yet the information about it is scarce. Our objective was to describe structure, organization, processes of care, and research activities in Latin-American ICUs. Web-based survey submitted to ICU directors. ICUs located in nine Latin-American countries. Individual ICUs. None. Two hundred fifty-seven of 498 (52%) of submitted surveys responded: 51% from Brazil, 17% Chile, 13% Argentina, 6% Ecuador, 5% Uruguay, 3% Colombia, and 5% between Mexico, Peru, and Paraguay. Seventy-nine percent of participating hospitals had less than 500 beds; most were public (59%) and academic (66%). ICUs were mainly medical-surgical (75%); number of beds was evenly distributed in the entire cohort; 77% had 24/7 intensivists; 46% had a physician-to-patient ratio between 1:4 and 7; and 69% had a nurse-to-patient ratio of 1 ≥ 2.1. The 24/7 presence of other specialists was deficient. Protocols in use averaged 9 ± 3. Brazil (vs the rest) had larger hospitals and ICUs and more quality, surveillance, and prevention committees, but fewer 24/7 intensivists and poorer nurse-to-patient ratio. Although standard monitoring, laboratory, and imaging practices were almost universal, more complex measurements and treatments and portable equipment were scarce after standard working hours, and in public hospitals. Mortality was 17.8%, without differences between countries. This multinational study shows major concerns in the delivery of critical care across Latin America, particularly in human resources. Technology was suboptimal, especially in public hospitals. A 24/7 availability of supporting specialists and of key procedures was inadequate. Mortality was high in comparison to high-income countries.

  16. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  17. Prostate Cancer Biorepository Network

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-14-2-0185 TITLE: Prostate Cancer Biorepository Network PRINCIPAL INVESTIGATOR: Jonathan Melamed, MD CONTRACTING ORGANIZATION...AND SUBTITLE 5a. CONTRACT NUMBER Prostate Cancer Biorepository Network 5b. GRANT NUMBER W81XWH-14-2-0185 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...infrastructure and operations of the Prostate Cancer Biorepository Network (PCBN). The aim of the PCBN is to provide prostate researchers with high-quality

  18. Reliability issues in PACS

    Science.gov (United States)

    Taira, Ricky K.; Chan, Kelby K.; Stewart, Brent K.; Weinberg, Wolfram S.

    1991-07-01

    Reliability is an increasing concern when moving PACS from the experimental laboratory to the clinical environment. Any system downtime may seriously affect patient care. The authors report on the several classes of errors encountered during the pre-clinical release of the PACS during the past several months and present the solutions implemented to handle them. The reliability issues discussed include: (1) environmental precautions, (2) database backups, (3) monitor routines of critical resources and processes, (4) hardware redundancy (networks, archives), and (5) development of a PACS quality control program.

  19. Maintenance simulation: Software issues

    Energy Technology Data Exchange (ETDEWEB)

    Luk, C.H.; Jette, M.A.

    1995-07-01

    The maintenance of a distributed software system in a production environment involves: (1) maintaining software integrity, (2) maintaining and database integrity, (3) adding new features, and (4) adding new systems. These issues will be discussed in general: what they are and how they are handled. This paper will present our experience with a distributed resource management system that accounts for resources consumed, in real-time, on a network of heterogenous computers. The simulated environments to maintain this system will be presented relate to the four maintenance areas.

  20. Integrating Networking into ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2018-01-01

    Networking is foundational to the ATLAS distributed infrastructure and there are many ongoing activities related to networking both within and outside of ATLAS. We will report on the progress in a number of areas exploring ATLAS's use of networking and our ability to monitor the network, analyze metrics from the network, and tune and optimize application and end-host parameters to make the most effective use of the network. Specific topics will include work on Open vSwitch for production systems, network analytics, FTS testing and tuning, and network problem alerting and alarming.

  1. Key Issue

    Directory of Open Access Journals (Sweden)

    Oya Y Rieger

    2012-03-01

    Full Text Available A few months ago, while I was participating in a conference about open access infrastructures, a delegate from a governmental agency asked, “Why does each library need to maintain a repository for their own scientists?” He was rightfully wondering if a broad collaboration in building a network of archives will provide a durable and extensible technology and service framework for ever-increasing digital scholarly content. The ensuing discussion did not offer a plausible response but accentuated that we do not have in place a plan for building an expandable infrastructure to facilitate communication and exchange of information among rapidly proliferating distinct instances of institutional and subject repositories.

  2. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  3. Mathematical model of highways network optimization

    Science.gov (United States)

    Sakhapov, R. L.; Nikolaeva, R. V.; Gatiyatullin, M. H.; Makhmutov, M. M.

    2017-12-01

    The article deals with the issue of highways network design. Studies show that the main requirement from road transport for the road network is to ensure the realization of all the transport links served by it, with the least possible cost. The goal of optimizing the network of highways is to increase the efficiency of transport. It is necessary to take into account a large number of factors that make it difficult to quantify and qualify their impact on the road network. In this paper, we propose building an optimal variant for locating the road network on the basis of a mathematical model. The article defines the criteria for optimality and objective functions that reflect the requirements for the road network. The most fully satisfying condition for optimality is the minimization of road and transport costs. We adopted this indicator as a criterion of optimality in the economic-mathematical model of a network of highways. Studies have shown that each offset point in the optimal binding road network is associated with all other corresponding points in the directions providing the least financial costs necessary to move passengers and cargo from this point to the other corresponding points. The article presents general principles for constructing an optimal network of roads.

  4. A Constructive Neural-Network Approach to Modeling Psychological Development

    Science.gov (United States)

    Shultz, Thomas R.

    2012-01-01

    This article reviews a particular computational modeling approach to the study of psychological development--that of constructive neural networks. This approach is applied to a variety of developmental domains and issues, including Piagetian tasks, shift learning, language acquisition, number comparison, habituation of visual attention, concept…

  5. Licensing issues

    International Nuclear Information System (INIS)

    Roberts, J.P.; Desell, L.J.; Birch, M.L.; Berkowitz, L.; Bader, J.F.

    1992-01-01

    To provide guidance for the Department of Energy's (DOE) Civilian Radioactive Waste Management Program, the Nuclear Regulatory Commission (NRC) has issued a draft regulatory guide on the Format and Content for the License Application for the High-Level Waste Repository (FCRG). To facilitate the development of the FCRG, NRC suggested that DOE use the draft guide as the basis for preparing an annotated outline for a license application. DOE is doing so using an iterative process called the Annotated Outline Initiative. DOE;s use of the Initiative will assist in achieving the desired incorporation of actual experience in the FCRG, contribute to the development of shared interpretation and understanding of NRC regulations, and provide other important programmatic benefits described in this paper

  6. Preface JFDE Special Issue Glass

    Directory of Open Access Journals (Sweden)

    Ulrich Knaack

    2015-05-01

    Full Text Available Facade Design and Engineering is a multidisciplinary field that touches many other scientific disciplines. Glass is one of the key materials for building envelopes, and a strong scientific community has developed over the last decade. Designers love glass for its transparency. It is strong but brittle and very demanding in terms of engineering. We continuously see new innovative developments in terms of its climatic performance, structural possibilities, construction design and new applications. Reason enough to dedicate this special issue to the topic. The issue would not have been possible without the contribution of our special editors Jan Belis and Christian Louter, who contributed through their outstanding editorial work and network. Most of the papers in this issue were carefully selected from of a number of invited submissions and conference papers of the COST Action TU0905 Mid-Term Conference, April 17+18 2013, Porec, (CRC Press/Balkema, Leiden and subsequently subjected to the regular blind review process of the journal. Glass as a building material demonstrates the nature of the architectural discipline, where science and building practice are closely linked. Buildings are the live testing bed for scientific research and, at the same time, building practice formulates new research questions. We found that many articles sent to us deal with this relation. Therefore we decided to introduce the new category ’Applied Practice’ for certain journal paper contributions, which from now on can be found at the end of each issue. Although they do not need to be purely scientific, ’Applied Practice’ papers will always discuss new developments, will have a clear structure and are subjected to the strict JFDE review process. Façade Design and Engineering is a peer reviewed, open access journal, funded by The Netherlands Organisation for Scientific Research NWO (www.nwo.nl. We see ’open access’ as the future publishing model. But it

  7. Professional Emergence on Transnational Issues

    DEFF Research Database (Denmark)

    Seabrooke, Leonard; Tsingou, Eleni

    2015-01-01

    Addressing complex transnational problems requires coordination from different professionals. The emergence of new actors and issues has been addressed by those interested in studies of organizations through concepts and methods that highlight the importance of communities, fields, and networks...... they are conceptually linked by actors and organizations. A linked ecologies approach asks us to displace locating known actors within structures and instead pays attention to professional interactions on how ‘issue distinctions’ are made, the relationship between issue distinctions and professional tasks, and who...

  8. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project.......Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  9. Issues related to geothermal development

    International Nuclear Information System (INIS)

    Lesperance, G.O.

    1990-01-01

    This paper reports on a number of potential barriers to geothermal development in Hawaii which have been overcome but some remain. Efforts continue to address issues relating to transmission, project economics, the regulatory process, resource verification, and public acceptance

  10. The transportation issue management system: A tool for issue resolution

    International Nuclear Information System (INIS)

    Branch, K.M.; Boryczka, M.K.

    1987-01-01

    During the last decade, issue management programs have been developed and used by a number of large corporations in the United States. These systems have generally been designed to help senior program managers identify issues, develop strategic plans, and resolve issues. These systems involve scanning and abstracting literature to create a database that is then used for 1) issue identification, 2) issue analysis, 3) priority assessment, 4) development of corporate position/strategic options, and 5) action planning and implementation. Most of the existing systems rely on staff to identify trends in the computerized output, analyze the importance of the issue to the company, and assist in developing corporate responses. The Department of Energy has recently developed an issue management system for the Office of Civilian Radioactive Waste Management's (OCRWM) transportation program. This system is designed to help DOE identify institutional issues related to radioactive waste transportation, analyze the issues, and resolve them in a manner that is responsive to interested parties. The system will contain pertinent information from DOE technical reports, other federal documents, correspondence, professional journals, popular literature, newsclips, legislation and testimony. The program is designed around a number of institutional issues including: prenotification, physical protection procedures; highway, rail, and barge routing; inspections and enforcement of shipments; emergency response; liability, cask design and testing; overweight trucks; rail service; modal mix; infrastructure improvements; training standards, and operational procedures

  11. Virtual Networking Performance in OpenStack Platform for Network Function Virtualization

    Directory of Open Access Journals (Sweden)

    Franco Callegati

    2016-01-01

    Full Text Available The emerging Network Function Virtualization (NFV paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.

  12. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  13. Transitional issues

    International Nuclear Information System (INIS)

    1998-01-01

    This discussion paper, the fifth in the series developed at the IPPSO Market Design Conference, addressed the issue of the need to prevent Ontario Hydro from taking unfair advantage of independent producers and other stakeholders through activities and investments in new power generating capacity in the transitional period leading up to deregulation. The need for controls is predicated on the assumption that the short-term actions and investments of Ontario Hydro could seriously compromise the position of independent generators, and that without such controls the level playing field essential to the operation of a competitive market, does not exist. Various actual and potential actions of Ontario Hydro were discussed, all of which point to the need for strict controls over Ontario Hydro exercising its dominant market power in an unfair way. It was recommended that as a minimum, the provincial government should no longer provide guarantees for Ontario Hydro capital projects, and that Ontario Hydro be instructed to defer any investment on new or returning generating capacity until the new market is in place. Limits could also be placed on Ontario Hydro's marketing efforts to enter into contracts during the transition period, and Ontario Hydro and municipal utilities should be required to keep separate accounts of their commercial preparation, and to settle such accounts separate from ratepayer revenue

  14. Social network characteristics associated with health promoting behaviors among Latinos.

    Science.gov (United States)

    Marquez, Becky; Elder, John P; Arredondo, Elva M; Madanat, Hala; Ji, Ming; Ayala, Guadalupe X

    2014-06-01

    This study examined the relationship between social network characteristics and health promoting behaviors (having a routine medical check-up, consuming no alcohol, consuming no fast food, and meeting recommendations for leisure-time physical activity and sleep duration) among Latinos to identify potential targets for behavioral interventions. Personal network characteristics and health behavior data were collected from a community sample of 393 adult Latinos (73% women) in San Diego County, California. Network characteristics consisted of size and composition. Network size was calculated by the number of alters listed on a name generator questionnaire eliciting people with whom respondents discussed personal issues. Network composition variables were the proportion of Latinos, Spanish-speakers, females, family, and friends listed in the name generator. Additional network composition variables included marital status and the number of adults or children in the household. Network members were predominately Latinos (95%), Spanish-speakers (80%), females (64%), and family (55%). In multivariate logistic regression analyses, gender moderated the relationship between network composition, but not size, and a health behavior. Married women were more likely to have had a routine medical check-up than married men. For both men and women, having a larger network was associated with meeting the recommendation for leisure-time physical activity. Few social network characteristics were significantly associated with health promoting behaviors, suggesting a need to examine other aspects of social relationships that may influence health behaviors. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  15. Agricultural freight : network access and issues.

    Science.gov (United States)

    2010-04-01

    Objectives: Better understand inherent risk of highly : contagious disease spread among : Vermont dairy farms; Better prepare response agencies and : individuals; Stimulate continuity of business planning : among producers and allied industry

  16. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  17. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

  18. Leading Edge. Volume 7, Issue Number 4, 2012

    Science.gov (United States)

    2012-01-01

    Trek popular- ized the notion of using DE for weapons in years past, today— through persistent DEW RDT&E— Navy leadership is realizing the great...supporting platforms. The Pictured here is the National Aeronautics and Space Administra- tion / National Oceanic and Atmospheric Administration ( NASA ...procured by Boeing Launch Services on 4 March 2010. Built by Boeing Space and Intelli- gence Systems, GOES-P will provide NOAA and NASA scien- tists

  19. Defense Acquisition Review Journal. Volume 17, Number 1, Issue 53

    Science.gov (United States)

    2010-01-01

    2010 | 1 5 0 stYle We will require you to submit your final draft of the manuscript, especially citations (endnotes instead of footnotes), in the...format specified in two specific style manuals. The ARJ follows the author (date) form of citation . We expect you to use the Publication Manual of the...a reference librarian in completing citation of government documents because standard formulas of citations may provide incomplete information in

  20. Defense Acquisition Review Journal. Volume 17, Number 2, Issue 54

    Science.gov (United States)

    2010-04-01

    especially citations (endnotes instead of footnotes), in the format specified in two specific style manuals. The ARJ follows the author (date) form of... citation . We expect you to use the Publication Manual of the American Psychological Association (6th Edition) and the Chicago Manual of Style (15th...Edition). Contributors are encouraged to seek the advice of a reference librarian in completing citation of government documents because standard formulas

  1. Defense Acquisition Research Journal. Volume 22, Number 2, Issue 73

    Science.gov (United States)

    2015-04-01

    advice of a reference librarian in completing citation of government documents because standard for- mulas of citations may provide incomplete...published or has expertise in the manuscript’s subject. Authors should be familiar with the style and format of previous Defense ARJs and adhere to...designated style guides. It is also the responsibility of the corresponding author to furnish a government agency/employer clearance with each submission

  2. Defense Acquisition Research Journal. Volume 24, Number 1, Issue 80

    Science.gov (United States)

    2017-01-01

    The Effect on Organizational Commitment and Organizational Citizenship Behavior Robert L. Shepherd The Defense Acquisition Professional Reading...publication may be digitally enhanced. Articles represent the views of the authors and do not necessarily reflect the opinion of DAU or the Department of...Beliles Production Manager, Visual Arts & Press Frances Battle Lead Graphic Designer Diane Fleischer Graphic Designer, Digital Publications Nina Austin

  3. Erratum Special issue Journal of Biosciences Volume 32, Number 1 ...

    Indian Academy of Sciences (India)

    Administrator

    bone structure in terms of protein blocks from sequence; J. Biosci. ... Rodier F and Janin J 2007 Peptide segments in protein-protein interfaces; J. Biosci. 32 ... H and Miyano S 2007 Modelling and simulation of signal transductions in an apop-.

  4. Asygnosis and asygnotic networks

    Directory of Open Access Journals (Sweden)

    Edward M. Roche

    2016-05-01

    Full Text Available The purpose of this paper is to create a dialogue between disparate academic disciplines around the topics of decision making, human communication networks, and information exchange. The emergence of modern telecommunications, including social media, gaming platforms, and instant messaging has enabled the emergence of massive online global communities numbering into the tens and hundreds of millions of persons regardless of culture and language capable of exchanging ideas, images, and impressions in real time. The unprecedented scope and scale of these networks challenges contemporary theories in management and decision making, political organization and governance of institutions, sociology, and communications. Our argument is that these theories are outdated and must be rethought. We propose a simple model, "asygnosis", in which decisions and strategies are the product of the continuous (non-discrete flows of information, ideas and impressions (“memes” along ever-changing communication pathways between individuals and/or machines. These networks reflect the undirected emergence, exchange and demise of knowledge that forms around a specific idea or activity. They challenge traditional assumptions about rationality, causality, and the use of organizational structures as control mechanisms which form the basis of most social, economic and political theories. After developing the concept in detail of asyngnosis and asyngnotic networks, we apply it to current issues including unpredictable events that takes place without direct control such as the rise of spontaneous terrorism, and other social and political phenomenon such as the Arab Spring and Occupy Wall Street. Finally, the paper suggests areas of future research in a number of disciplines that might help develop the concept further, test assumptions, and lead to new insights into this emerging phenomenon.

  5. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  6. Error monitoring issues for common channel signaling

    Science.gov (United States)

    Hou, Victor T.; Kant, Krishna; Ramaswami, V.; Wang, Jonathan L.

    1994-04-01

    Motivated by field data which showed a large number of link changeovers and incidences of link oscillations between in-service and out-of-service states in common channel signaling (CCS) networks, a number of analyses of the link error monitoring procedures in the SS7 protocol were performed by the authors. This paper summarizes the results obtained thus far and include the following: (1) results of an exact analysis of the performance of the error monitoring procedures under both random and bursty errors; (2) a demonstration that there exists a range of error rates within which the error monitoring procedures of SS7 may induce frequent changeovers and changebacks; (3) an analysis of the performance ofthe SS7 level-2 transmission protocol to determine the tolerable error rates within which the delay requirements can be met; (4) a demonstration that the tolerable error rate depends strongly on various link and traffic characteristics, thereby implying that a single set of error monitor parameters will not work well in all situations; (5) some recommendations on a customizable/adaptable scheme of error monitoring with a discussion on their implementability. These issues may be particularly relevant in the presence of anticipated increases in SS7 traffic due to widespread deployment of Advanced Intelligent Network (AIN) and Personal Communications Service (PCS) as well as for developing procedures for high-speed SS7 links currently under consideration by standards bodies.

  7. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  8. Data Storage for Social Networks A Socially Aware Approach

    CERN Document Server

    Tran, Duc A

    2012-01-01

    Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large number of users. Storing user data for the entire network on a single server can quickly lead to a bottleneck, and, consequently, more servers are needed to expand storage capacity and lower data request traffic per server. Adding more servers is just one step

  9. Properties of healthcare teaming networks as a function of network construction algorithms.

    Directory of Open Access Journals (Sweden)

    Martin S Zand

    Full Text Available Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year, making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast

  10. Accelerating networks

    International Nuclear Information System (INIS)

    Smith, David M D; Onnela, Jukka-Pekka; Johnson, Neil F

    2007-01-01

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  11. RELATIONSHIP BETWEEN MOBILE NUMBER PORTABILITY AND CONSUMER CHOICE OF ACTIVE MULTIPLE MOBILE PHONE NUMBERS IN GHANA

    OpenAIRE

    Solomon A. Keelson; Addo J. Odei

    2014-01-01

    The use of multiple mobile phone numbers in Ghana has become a dominate phenomenon in recent years. The introduction of mobile number portability (MNP) makes it possible for a subscriber to conveniently switch from one mobile network to another without losing his or her number. Because of mobile number portability, we expected that use of multiple numbers would become less attractive. This study examines how mobile number portability has affected the use of multiple phone numbers. We use top,...

  12. Number Sense on the Number Line

    Science.gov (United States)

    Woods, Dawn Marie; Ketterlin Geller, Leanne; Basaraba, Deni

    2018-01-01

    A strong foundation in early number concepts is critical for students' future success in mathematics. Research suggests that visual representations, like a number line, support students' development of number sense by helping them create a mental representation of the order and magnitude of numbers. In addition, explicitly sequencing instruction…

  13. IJIMAI Editor's Note - Vol. 3 Issue 1

    Directory of Open Access Journals (Sweden)

    Ruben Gonzalez Crespo

    2014-12-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: bayesian networks, evolutionary algorithms, virtual reality, web advertising, 3D technologies, traffic expression, Smart Cities, computational sustainability, computer vision, image recognition, deep neural networks, graphical models, mobile devices, human/complex system interactions, multi-agent systems, Physics inspired behaviours, etc.

  14. IJIMAI Editor's Note - Vol. 3 Issue 7

    Directory of Open Access Journals (Sweden)

    Oscar Sanjuan-Martinez

    2016-06-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: SVM and ANN Based Classification, Security in Android, Semantic Data, Planning and Software Agents, Mission Planning, Clustering in Text Mining, Mobile Networks, Weather Radars, Human Activity Recognition, LIF Neurons and DDF, Theft Prevention, Constraint Programming, Measuring Meditations Effects, Neural Networks and Deep Learning.

  15. Finding numbers in the brain.

    Science.gov (United States)

    Gallistel, C R

    2017-02-19

    After listing functional constraints on what numbers in the brain must do, I sketch the two's complement fixed-point representation of numbers because it has stood the test of time and because it illustrates the non-obvious ways in which an effective coding scheme may operate. I briefly consider its neurobiological implementation. It is easier to imagine its implementation at the cell-intrinsic molecular level, with thermodynamically stable, volumetrically minimal polynucleotides encoding the remembered numbers, than at the circuit level, with plastic synapses encoding them.This article is part of a discussion meeting issue 'The origins of numerical abilities'. © 2017 The Author(s).

  16. PREFACE: CEWQO Topical Issue CEWQO Topical Issue

    Science.gov (United States)

    Bozic, Mirjana; Man'ko, Margarita

    2009-09-01

    by Adam et al. In the paper by V Man'ko et al the diagonal representation of the density operator (usually called P-function of Glauber-Sudarshan) is related to the star-product quantization method and to the tomographic-probability representation of quantum states. Laskowski et al suggest an elegant geometrical criterion for the separability, which is based on the local correlation measurements readily available in the laboratory. Mizrahi describes a method to derive the Pauli-Schrödinger equation starting from a simple model of a qubit carried by a massive particle. By analyzing unavoidable quantum losses as they appear in neutron phase-echo and spin rotation experiments, Rauch concludes that basic quantum irreversibility exists in neutron interferometry. Rauch also shows how entanglement effects in a single particle system demonstrate quantum contextuality, and then argues that a quantum system carries much more information than is usually extracted. Kupczynski advocates various statistical tests which could be used to search for a fine structure in experimental data in order to answer the question: is quantum theory predictably complete? For an ion confined within a Paul trap, Mihalcea constructs an invariant operator based on the Lews and Riesenfeld approach and determines the spectrum of the quasienergy operator. Popov et al construct pair-coherent states of the Barut-Girardello kind for two noninteracting subsystems of pseudoharmonic oscillators and examine their statistical properties in different regions of parameters. The property of entanglement, considered to be the most intriguing property of composite quantum systems, has been an important research subject in recent years. It is considered to be a possible resource for quantum computation and communication. Therefore, a substantial number of papers in this topical issue is devoted to entanglement. Leon et al write that two-photon emission from two atoms initially excited in a common electromagnetic

  17. The Super Patalan Numbers

    OpenAIRE

    Richardson, Thomas M.

    2014-01-01

    We introduce the super Patalan numbers, a generalization of the super Catalan numbers in the sense of Gessel, and prove a number of properties analagous to those of the super Catalan numbers. The super Patalan numbers generalize the super Catalan numbers similarly to how the Patalan numbers generalize the Catalan numbers.

  18. Optimal Fragile Financial Networks

    NARCIS (Netherlands)

    Castiglionesi, F.; Navarro, N.

    2007-01-01

    We study a financial network characterized by the presence of depositors, banks and their shareholders. Belonging to a financial network is beneficial for both the depositors and banks' shareholders since the return to investment increases with the number of banks connected. However, the network is

  19. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  20. The impact of meeting donor management goals on the number of organs transplanted per donor: results from the United Network for Organ Sharing Region 5 prospective donor management goals study.

    Science.gov (United States)

    Malinoski, Darren J; Patel, Madhukar S; Daly, Michael C; Oley-Graybill, Chrystal; Salim, Ali

    2012-10-01

    Many organ procurement organizations have implemented critical care end points as donor management goals in efforts to increase organs transplanted per donor after neurologic determination of death. Although retrospective studies have demonstrated an association between meeting donor management goals and organ yield, prospective studies are lacking. In June 2008, nine donor management goals were prospectively implemented as a checklist and every donor after neurologic determination of death was managed to meet them. The donor management goals represented normal cardiovascular, pulmonary, renal, and endocrine end points. Data were collected for 7 months. Donor management goals "met" was defined a priori as achieving any seven of the nine donor management goals, and this was recorded at the time of consent, 12-18 hrs later, and prior to organ recovery. The primary outcome measure was ≥4 organs transplanted per donor, and binary logistic regression was used to identify independent predictors of this outcome with a porgan procurement organizations in the five Southwestern United States (United Network for Organ Sharing Region 5). All standard criteria donors after neurologic determination of deaths. Prospective implementation of a donor management goal checklist. There were 380 standard criteria donors with 3.6±1.7 organs transplanted per donor. Fifteen percent had donor management goals met at the time of consent, 33% at 12-18 hrs, and 38% prior to organ recovery. Forty-eight percent had ≥4 organs transplanted per donor. Donors with ≥4 organs transplanted per donor had significantly more individual donor management goals met at all three time points. Independent predictors of ≥4 organs transplanted per donor were age (odds ratio=0.95 per year), final creatinine (odds ratio=0.75 per 1-unit increase), donor management goals "met" at consent (odds ratio=2.03), donor management goals "met" prior to organ recovery (odds ratio=2.34), and a change in the number of

  1. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  2. Recent developments in Lambda networking

    Science.gov (United States)

    de Laat, C.; Grosso, P.

    About 6 years ago the first baby-steps were made on opening up dark fiber and DWDM infrastructure for direct use by ISP's after the transformation of the old style Telecom sector into a market driven business. Since then Lambda workshops, community groups like GLIF and a number of experiments have led to many implementations of hybrid national research and education networks and lightpath-based circuit exchanges as pioneered by SURFnet in GigaPort and NetherLight in collaboration with StarLight in Chicago and Canarie in Canada. This article looks back on those developments, describes some current open issues and research developments and proposes a concept of terabit networking.

  3. Multilevel method for modeling large-scale networks.

    Energy Technology Data Exchange (ETDEWEB)

    Safro, I. M. (Mathematics and Computer Science)

    2012-02-24

    Understanding the behavior of real complex networks is of great theoretical and practical significance. It includes developing accurate artificial models whose topological properties are similar to the real networks, generating the artificial networks at different scales under special conditions, investigating a network dynamics, reconstructing missing data, predicting network response, detecting anomalies and other tasks. Network generation, reconstruction, and prediction of its future topology are central issues of this field. In this project, we address the questions related to the understanding of the network modeling, investigating its structure and properties, and generating artificial networks. Most of the modern network generation methods are based either on various random graph models (reinforced by a set of properties such as power law distribution of node degrees, graph diameter, and number of triangles) or on the principle of replicating an existing model with elements of randomization such as R-MAT generator and Kronecker product modeling. Hierarchical models operate at different levels of network hierarchy but with the same finest elements of the network. However, in many cases the methods that include randomization and replication elements on the finest relationships between network nodes and modeling that addresses the problem of preserving a set of simplified properties do not fit accurately enough the real networks. Among the unsatisfactory features are numerically inadequate results, non-stability of algorithms on real (artificial) data, that have been tested on artificial (real) data, and incorrect behavior at different scales. One reason is that randomization and replication of existing structures can create conflicts between fine and coarse scales of the real network geometry. Moreover, the randomization and satisfying of some attribute at the same time can abolish those topological attributes that have been undefined or hidden from

  4. Boundary issues

    Science.gov (United States)

    Townsend, Alan R.; Porder, Stephen

    2011-03-01

    What is our point of no return? Caesar proclaimed 'the die is cast' while crossing the Rubicon, but rarely does modern society find so visible a threshold in our continued degradation of ecosystems and the services they provide. Humans have always used their surroundings to make a living— sometimes successfully, sometimes not (Diamond 2005)—and we intuitively know that there are boundaries to our exploitation. But defining these boundaries has been a challenge since Malthus first prophesied that nature would limit the human population (Malthus 1798). In 2009, Rockström and colleagues tried to quantify what the 6.8 billion (and counting) of us could continue to get away with, and what we couldn't (Rockström et al 2009). In selecting ten 'planetary boundaries', the authors contend that a sustainable human enterprise requires treating a number of environmental thresholds as points of no return. They suggest we breach these Rubicons at our own peril, and that we've already crossed three: biodiversity loss, atmospheric CO2, and disruption of the global nitrogen (N) cycle. As they clearly hoped, the very act of setting targets has provoked scientific inquiry about their accuracy, and about the value of hard targets in the first place (Schlesinger 2009). Such debate is a good thing. Despite recent emphasis on the science of human-ecosystem interactions, understanding of our planetary boundaries is still in its infancy, and controversy can speed scientific progress (Engelhardt and Caplan 1987). A few weeks ago in this journal, Carpenter and Bennett (2011) took aim at one of the more controversial boundaries in the Rockström analysis: that for human alteration of the global phosphorus (P) cycle. Rockström's group chose riverine P export as the key indicator, suggesting that humans should not exceed a value that could trigger widespread marine anoxic events—and asserting that we have not yet crossed this threshold. There are defensible reasons for a marine

  5. Adventures in the evolution of a high-bandwidth network for central servers

    International Nuclear Information System (INIS)

    Swartz, K.L.; Cottrell, L.; Dart, M.

    1994-08-01

    In a small network, clients and servers may all be connected to a single Ethernet without significant performance concerns. As the number of clients on a network grows, the necessity of splitting the network into multiple sub-networks, each with a manageable number of clients, becomes clear. Less obvious is what to do with the servers. Group file servers on subnets and multihomed servers offer only partial solutions -- many other types of servers do not lend themselves to a decentralized model, and tend to collect on another, well-connected but overloaded Ethernet. The higher speed of FDDI seems to offer an easy solution, but in practice both expense and interoperability problems render FDDI a poor choice. Ethernet switches appear to permit cheaper and more reliable networking to the servers while providing an aggregate network bandwidth greater than a simple Ethernet. This paper studies the evolution of the server networks at SLAC. Difficulties encountered in the deployment of FDDI are described, as are the tools and techniques used to characterize the traffic patterns on the server network. Performance of Ethernet, FDDI, and switched Ethernet networks is analyzed, as are reliability and maintainability issues for these alternatives. The motivations for re-designing the SLAC general server network to use a switched Ethernet instead of FDDI are described, as are the reasons for choosing FDDI for the farm and firewall networks at SLAC. Guidelines are developed which may help in making this choice for other networks

  6. Local Area Networks.

    Science.gov (United States)

    Marks, Kenneth E.; Nielsen, Steven

    1991-01-01

    Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)

  7. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  8. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  9. Identity Management issues in Cloud Computing

    OpenAIRE

    Saini, Smita; Mann, Deep

    2014-01-01

    Cloud computing is providing a low cost on demand services to the users, omnipresent network,large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application,cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is to preserve the sensitive information of the cloud consumer and the major issues to the privacy are un...

  10. Research on 6R Military Logistics Network

    Science.gov (United States)

    Jie, Wan; Wen, Wang

    The building of military logistics network is an important issue for the construction of new forces. This paper has thrown out a concept model of 6R military logistics network model based on JIT. Then we conceive of axis spoke y logistics centers network, flexible 6R organizational network, lean 6R military information network based grid. And then the strategy and proposal for the construction of the three sub networks of 6Rmilitary logistics network are given.

  11. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  12. Current Issues in Maritime Health

    DEFF Research Database (Denmark)

    Wagtmann, Maria Anne

    2008-01-01

     In the early part of 2008, Maria Anne Wagtmann had the opportunity to interview the former president of the International Maritime Health Association, Dr. Tim Carter, in London about a number of current maritime health issues. In this interview, Dr. Tim Carter, who is cur­rently employed...... as the Chief Medical Advisor for the British government's Department for Transport, gives his personal - and thus non-official - opinions on these issues....

  13. Combinatorial explosion in model gene networks

    Science.gov (United States)

    Edwards, R.; Glass, L.

    2000-09-01

    The explosive growth in knowledge of the genome of humans and other organisms leaves open the question of how the functioning of genes in interacting networks is coordinated for orderly activity. One approach to this problem is to study mathematical properties of abstract network models that capture the logical structures of gene networks. The principal issue is to understand how particular patterns of activity can result from particular network structures, and what types of behavior are possible. We study idealized models in which the logical structure of the network is explicitly represented by Boolean functions that can be represented by directed graphs on n-cubes, but which are continuous in time and described by differential equations, rather than being updated synchronously via a discrete clock. The equations are piecewise linear, which allows significant analysis and facilitates rapid integration along trajectories. We first give a combinatorial solution to the question of how many distinct logical structures exist for n-dimensional networks, showing that the number increases very rapidly with n. We then outline analytic methods that can be used to establish the existence, stability and periods of periodic orbits corresponding to particular cycles on the n-cube. We use these methods to confirm the existence of limit cycles discovered in a sample of a million randomly generated structures of networks of 4 genes. Even with only 4 genes, at least several hundred different patterns of stable periodic behavior are possible, many of them surprisingly complex. We discuss ways of further classifying these periodic behaviors, showing that small mutations (reversal of one or a few edges on the n-cube) need not destroy the stability of a limit cycle. Although these networks are very simple as models of gene networks, their mathematical transparency reveals relationships between structure and behavior, they suggest that the possibilities for orderly dynamics in such

  14. PROVISIONING RESTORABLE VIRTUAL PRIVATE NETWORKS USING BARABASI AND WAXMAN TOPOLOGY GENERATION MODEL

    Directory of Open Access Journals (Sweden)

    R. Ravi

    2010-12-01

    Full Text Available As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called “Tunneling”, data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. Our proposed Provisioning Restorable Virtual Private Networks Algorithm (PRA is used to combine the provisioning and restoration algorithms to achieve better results than the ones obtained by independent restoration and provisioning. In order to ensure service quality and availability in Virtual Private Networks, seamless recovery from failures is essential. The quality of service of the Virtual Private Networks is also improved due to the combination of provisioning and restoration. The bandwidth sharing concept is also applied in link to improve the quality of service in the Virtual Private Network. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, the number of VPN nodes, delay, asymmetric ratio and delay with constraints with

  15. The role of networking for nuclear education

    International Nuclear Information System (INIS)

    Gowin, P.

    2004-01-01

    Full text: Nuclear knowledge is the basis for almost all nuclear activities. Education and training are the most fundamental means to transfer knowledge from one generation to the next. The paper gives a working definition of 'nuclear knowledge' and reviews the history of nuclear knowledge, it's accumulation over past decades and trends in it's dissemination - either favouring networking and sharing knowledge, e.g. for sustainable development, or restricting such sharing, e.g. in the case of commercially used knowledge. In the past years, a number of trends and questions in nuclear knowledge, education and training have emerged. With declining student enrolment numbers and a general stagnation of the use of nuclear power in some of the IAEA's Member States, the issue of a slow erosion of the knowledge base and the possibility of loosing knowledge has become increasingly important, in particular if seen against the background of a possible renaissance of nuclear power in the future. In other Member States, an expansion of nuclear power is expected, with a corresponding need for human resources. As a result, in many Member States education and training of the next generation and succession planning have become key issues. Several actions are being taken in the nuclear education and training sector, ranging from governmental programs to industry recruitment efforts, but most importantly a trend to increased networking and sharing of resources and facilities has become apparent. After a brief overview about the theory of networking, network types and characteristics, the paper presents selected networks in nuclear education and training as examples, including the IAEA initiative Asian Network for Education in Nuclear Technology (ANENT). Based on a review of the key factors leading to the success of those networks, it can be concluded that networking already is a key element in shaping the nuclear educational sector, and that networking nuclear education and training

  16. Number Worlds: Visual and Experimental Access to Elementary Number Theory Concepts

    Science.gov (United States)

    Sinclair, Nathalie; Zazkis, Rina; Liljedahl, Peter

    2004-01-01

    Recent research demonstrates that many issues related to the structure of natural numbers and the relationship among numbers are not well grasped by students. In this article, we describe a computer-based learning environment called "Number Worlds" that was designed to support the exploration of elementary number theory concepts by…

  17. Designing value-creating supply chain networks

    CERN Document Server

    Martel, Alain

    2016-01-01

    Focusing on the design of robust value-creating supply chain networks (SCN) and key strategic issues related to the number; location, capacity and mission of supply chain facilities (plants, distribution centers) – as well as the network structure required to provide flexibility and resilience in an uncertain world – this book presents an innovative methodology for SCN reengineering that can be used to significantly improve the bottom line of supply chain dependent businesses. Providing readers with the tools needed to analyze and model value creation activities, Designing Value-Creating Supply Chain Networks examines the risks faced by modern supply chains, and shows how to develop plausible future scenarios to evaluate potential SCN designs. The design methods proposed are based on a visual representation formalism that facilitates the analysis and modeling of SCN design problems, book chapters incorporate several example problems and exercises which can be solved with Excel tools (Analysis tools and So...

  18. On the sample complexity of learning for networks of spiking neurons with nonlinear synaptic interactions.

    Science.gov (United States)

    Schmitt, Michael

    2004-09-01

    We study networks of spiking neurons that use the timing of pulses to encode information. Nonlinear interactions model the spatial groupings of synapses on the neural dendrites and describe the computations performed at local branches. Within a theoretical framework of learning we analyze the question of how many training examples these networks must receive to be able to generalize well. Bounds for this sample complexity of learning can be obtained in terms of a combinatorial parameter known as the pseudodimension. This dimension characterizes the computational richness of a neural network and is given in terms of the number of network parameters. Two types of feedforward architectures are considered: constant-depth networks and networks of unconstrained depth. We derive asymptotically tight bounds for each of these network types. Constant depth networks are shown to have an almost linear pseudodimension, whereas the pseudodimension of general networks is quadratic. Networks of spiking neurons that use temporal coding are becoming increasingly more important in practical tasks such as computer vision, speech recognition, and motor control. The question of how well these networks generalize from a given set of training examples is a central issue for their successful application as adaptive systems. The results show that, although coding and computation in these networks is quite different and in many cases more powerful, their generalization capabilities are at least as good as those of traditional neural network models.

  19. An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks

    OpenAIRE

    Albu, Roxana; Labit, Yann; Thierry, Gayraud; Pascal, Berthou

    2010-01-01

    5p.; International audience; The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol...

  20. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  1. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  2. Navigator. Volume 45, Number 2, Winter 2009

    Science.gov (United States)

    National Science Education Leadership Association, 2009

    2009-01-01

    The National Science Education Leadership Association (NSELA) was formed in 1959 to meet a need to develop science education leadership for K-16 school systems. "Navigator" is published by NSELA to provide the latest NSELA events. This issue of "Navigator" contains the following reports: (1) A Message from the President: Creating Networks of…

  3. Trimaran Resistance Artificial Neural Network

    Science.gov (United States)

    2011-01-01

    11th International Conference on Fast Sea Transportation FAST 2011, Honolulu, Hawaii, USA, September 2011 Trimaran Resistance Artificial Neural Network Richard...Trimaran Resistance Artificial Neural Network 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e... Artificial Neural Network and is restricted to the center and side-hull configurations tested. The value in the parametric model is that it is able to

  4. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  5. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  6. Network migration for printers

    CERN Multimedia

    2016-01-01

    Further to the recent General Purpose (office) Network reorganisation (as announced in the Bulletin - see here), please note that the majority of print devices will be automatically migrated to the new network IP address range on Tuesday 27 September.   This change should be transparent for these devices and therefore end-users, provided you have installed the printers from the Print Service website. A small number of devices will require manual intervention from the Printer Support team in order to migrate correctly. These devices will not change their IP address until the manual intervention, which will be carried out before Monday 3rd October. However, if you have mistakenly connected directly to the printer’s IP address, then your printing will be affected – please uninstall the printer (for help, see: KB3785), and re-install it from the Print Service website (or follow instructions for visitor machines). Please do this as soon as possible in order to avoid printing issues, t...

  7. Number words and number symbols a cultural history of numbers

    CERN Document Server

    Menninger, Karl

    1992-01-01

    Classic study discusses number sequence and language and explores written numerals and computations in many cultures. "The historian of mathematics will find much to interest him here both in the contents and viewpoint, while the casual reader is likely to be intrigued by the author's superior narrative ability.

  8. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    2011-01-01

    In the present article, we examine the network structure and governance of inter-organisational innovation networks over time. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals...

  9. Inferring general relations between network characteristics from specific network ensembles.

    Science.gov (United States)

    Cardanobile, Stefano; Pernice, Volker; Deger, Moritz; Rotter, Stefan

    2012-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their ability to generate networks with large structural variability. In particular, we consider the statistical constraints which the respective construction scheme imposes on the generated networks. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This makes it possible to infer global features from local ones using regression models trained on networks with high generalization power. Our results confirm and extend previous findings regarding the synchronization properties of neural networks. Our method seems especially relevant for large networks, which are difficult to map completely, like the neural networks in the brain. The structure of such large networks cannot be fully sampled with the present technology. Our approach provides a method to estimate global properties of under-sampled networks in good approximation. Finally, we demonstrate on three different data sets (C. elegans neuronal network, R. prowazekii metabolic network, and a network of synonyms extracted from Roget's Thesaurus) that real-world networks have statistical relations compatible with those obtained using regression models.

  10. Minimizing communication cost among distributed controllers in software defined networks

    Science.gov (United States)

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  11. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  12. Increasing Scalability of Researcher Network Extraction from the Web

    Science.gov (United States)

    Asada, Yohei; Matsuo, Yutaka; Ishizuka, Mitsuru

    Social networks, which describe relations among people or organizations as a network, have recently attracted attention. With the help of a social network, we can analyze the structure of a community and thereby promote efficient communications within it. We investigate the problem of extracting a network of researchers from the Web, to assist efficient cooperation among researchers. Our method uses a search engine to get the cooccurences of names of two researchers and calculates the streangth of the relation between them. Then we label the relation by analyzing the Web pages in which these two names cooccur. Research on social network extraction using search engines as ours, is attracting attention in Japan as well as abroad. However, the former approaches issue too many queries to search engines to extract a large-scale network. In this paper, we propose a method to filter superfluous queries and facilitates the extraction of large-scale networks. By this method we are able to extract a network of around 3000-nodes. Our experimental results show that the proposed method reduces the number of queries significantly while preserving the quality of the network as compared to former methods.

  13. The role of networking for nuclear education

    International Nuclear Information System (INIS)

    Gowin, P.; Yanev, Y.

    2004-01-01

    Nuclear knowledge is the basis for almost all nuclear activities, and education and training are the most fundamental means to transfer knowledge from one generation to the next. Understanding means and trends in knowledge transfer through education and training thus deserves a closer examination. In the past years, a number of trends and questions in nuclear knowledge, education and training have emerged. With declining student enrolment numbers and a general stagnation of the use of nuclear power in some of the IAEA's Member States, the issue of a slow erosion of the knowledge base and the possibility of loosing knowledge has become increasingly important, in particular if seen against the background of a possible renaissance of nuclear power in the future. In other Member States, an expansion of nuclear power is expected, with a corresponding need for human resources. As a result, in many Member States education and training of the next generation and succession planning have become key issues. Several actions are being taken in the nuclear education and training sector, ranging from governmental programs to industry recruitment efforts, but most importantly a trend to increased networking and sharing of resources and facilities has become apparent. This paper starts with a working definition of 'nuclear knowledge' and a review of the history of nuclear knowledge, its accumulation over past decades and trends in its dissemination - either favouring networking and sharing knowledge, e.g. for sustainable development, or restricting such sharing, e.g. in the case of commercially used knowledge. It then examines the present trend to and motivation for increased networking of nuclear education and training as a part of transfer of that knowledge from one generation to the next. After a brief overview about the theory of networking, it can be said that networking can contribute to efficiency, sharing of resources, the effectiveness of programs, the timeliness of

  14. Hyperreal Numbers for Infinite Divergent Series

    OpenAIRE

    Bartlett, Jonathan

    2018-01-01

    Treating divergent series properly has been an ongoing issue in mathematics. However, many of the problems in divergent series stem from the fact that divergent series were discovered prior to having a number system which could handle them. The infinities that resulted from divergent series led to contradictions within the real number system, but these contradictions are largely alleviated with the hyperreal number system. Hyperreal numbers provide a framework for dealing with divergent serie...

  15. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  16. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  17. Human centred design of software agent in social network service against privacy concerns

    OpenAIRE

    Kim, Hojung

    2016-01-01

    This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London The rapid growth and influence of social network services has led many scholars to focus on privacy issues. However, the research described in this thesis was motivated by the small number of design studies that have focused on practical approaches to identifying tacit information from users’ instant non-verbal responses to privacy issues. The research therefore aimed to propose pers...

  18. Feminist issues in development.

    Science.gov (United States)

    Antrobus, P

    1987-01-01

    The United Nations Decade for the Advancement of Women, from 1975 to 1985, leaves a legacy of a deeper understanding of the issues, and the emergence of new networks with the experience and commitment to work for further changes. However, the role and status of women did not improve. There is a new commitment to struggle for the ending of all oppression, injustice and violence of all kinds at all levels. Feminism is a consciousness of all forms of women's oppression and a commitment to work against them. Feminist critiques illuminate the larger structures that oppress both women and men. New development theories embracing feminism are necessary to understand how patriarchy and economic systems propogate oppression. The production-oriented approach to rural development is flawed n failing to address women's lack of access to land, credit, training and new technologies. Overwhelming household tasks, cultural norms, and traditional attitudes limit women's involvement in training programs and other development activities. The basic needs approach to rural development provides access to vital services to meet a family's basic needs for nutrition, housing and clothing, and allows people's participation in decision making. However, women have little actual role in decision making so their needs, concerns and perspectives are not taken into account. Women are treated as instruments to achieve goals without appreciating their perspective. Project-based approached emphasize short term goals rather than laying the foundation for longterm changes. Few projects address structural issues or empower women. Projects must include education to increase personal growth and self reliance. Development planning can be enormously enhanced by taking gender differences into account and recognizing that people, specially poor women, can promote their own devleopment. Longterm strategies that challenge existing structures, address the existing economic order, and, most of all, recognize

  19. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  20. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described......Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  1. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  2. SDN controllers security issues

    OpenAIRE

    Imran, Ayesha

    2017-01-01

    Software-Defined Networking (SDN) is essentially varying the way we design and manage networks, which makes a communication network programmable. In SDN, a logically centralized controller has straight control over the packet-handling functions of the network switches, using a standard, open API (Application Programming Interface) such as OpenFlow. OpenFlow is a broadly used protocol for software-defined networks (SDNs) that presents a new model in which the control plane is inattentive from ...

  3. Diamond Fuzzy Number

    Directory of Open Access Journals (Sweden)

    T. Pathinathan

    2015-01-01

    Full Text Available In this paper we define diamond fuzzy number with the help of triangular fuzzy number. We include basic arithmetic operations like addition, subtraction of diamond fuzzy numbers with examples. We define diamond fuzzy matrix with some matrix properties. We have defined Nested diamond fuzzy number and Linked diamond fuzzy number. We have further classified Right Linked Diamond Fuzzy number and Left Linked Diamond Fuzzy number. Finally we have verified the arithmetic operations for the above mentioned types of Diamond Fuzzy Numbers.

  4. Those fascinating numbers

    CERN Document Server

    Koninck, Jean-Marie De

    2009-01-01

    Who would have thought that listing the positive integers along with their most remarkable properties could end up being such an engaging and stimulating adventure? The author uses this approach to explore elementary and advanced topics in classical number theory. A large variety of numbers are contemplated: Fermat numbers, Mersenne primes, powerful numbers, sublime numbers, Wieferich primes, insolite numbers, Sastry numbers, voracious numbers, to name only a few. The author also presents short proofs of miscellaneous results and constantly challenges the reader with a variety of old and new n

  5. Improved Vehicular Information Network Architecture Using Fuzzy Based Named Data NetworkingNDN

    Directory of Open Access Journals (Sweden)

    Kanwalpreet Kaur

    2015-08-01

    Full Text Available Vehicular Ad-hoc System VANETs is really a component with smart transport systems. It has ability to prevent accidents and the road congestion issues on highways but it suffers from the accomplishment and scalability issues. To handle these difficulties from the Inter Vehicular Communication IVC we apply Name Data Networking NDN. All though in NDN the users are only concerned about necessary data and give no attention on the number of locations from where the data is coming. The NDN layout is usually much more worthy for IVC circumstance getting the ordered material labeling design as well as amp64258exible material retrieval. In this report we propose vehicular network dependent on fuzzy membership function which offers the fundamental NDN style to improve support location dependent forwarding content aggregation and distributed mobility management. This paper finally winds up the several boundaries regarding earlier approaches.

  6. Communication on the structure of biological networks

    Indian Academy of Sciences (India)

    Introduction. Over the past few years, network science has drawn attention from a large number of ... The qualitative properties of biological networks cannot ... Here, we study the underlying undirected structure of empirical biological networks.

  7. Unpredictability and the transmission of numbers

    Science.gov (United States)

    Myers, John M.; Madjid, F. Hadi

    2016-03-01

    Curiously overlooked in physics is its dependence on the transmission of numbers. For example, the transmission of numerical clock readings is implicit in the concept of a coordinate system. The transmission of numbers and other logical distinctions is often achieved over a computer-mediated communications network in the face of an unpredictable environment. By unpredictable we mean something stronger than the spread of probabilities over given possible outcomes, namely an opening to unforeseeable possibilities. Unpredictability, until now overlooked in theoretical physics, makes the transmission of numbers interesting. Based on recent proofs within quantum theory that provide a theoretical foundation to unpredictability, here we show how regularities in physics rest on a background of channels over which numbers are transmitted. As is known to engineers of digital communications, numerical transmissions depend on coordination reminiscent of the cycle of throwing and catching by players tossing a ball back and forth. In digital communications, the players are computers, and the required coordination involves unpredictably adjusting "live clocks" that step these computers through phases of a cycle. We show how this phasing, which we call logical synchronization, constrains number-carrying networks, and, if a spacetime manifold in invoked, put "stripes" on spacetime. Via its logically synchronized channels, a network of live clocks serves as a reference against which to locate events. Such a network in any case underpins a coordinate frame, and in some cases the direct use of a network can be tailored to investigate an unpredictable environment. Examples include explorations of gravitational variations near Earth.

  8. Show me your friends and I will tell you what type of person you are: how own profile, number of friends, and type of friends influence impression formation on social network sites

    NARCIS (Netherlands)

    Utz, S.

    2010-01-01

    This experiment examines how far extraversion of the target (self-generated information), extraversion of the target's friends (friends-generated information), and number of friends (system-generated information) influence the perceived popularity, communal orientation, and social attractiveness of

  9. Report made on the behalf of the Commission for Economic Affairs on the bill project, after accelerated procedure, ratifying decrees number 2016-1019 of July 27, 2016 related to electric power self-consumption, and number 2016-1059 of August 3, 2016 related to the production of electric power from renewable energies and aiming at adapting some arrangements related to power and gas networks and to renewable energies (number 4122). Nr 4192 + Impact study and Recommendations of the Council of State

    International Nuclear Information System (INIS)

    Santais, Beatrice

    2016-01-01

    This official report contains re-transcriptions of debates of a commission about decrees containing measures related to power grids and gas networks, to renewable energies, and self-consumption of electric power, which are useful and even necessary for an efficient implementation of the law on energy transition and for a 'green' growth. These debates addressed and discussed the content of the various articles which are more precisely presented and commented in the second part of the report. For each article, the report contains a synthesis of the Commission's opinion and possible amendments. The articles concerns the ratification of the two decrees, the definition of self-consumed production, the modification of some basic notions appearing in the Code of Energy, the exclusion of net-metering systems, the interdiction of a valorisation of original guarantees of renewable electric power production already benefiting of a public support, a new tariffing of these installations, the modification of the type of gas introduced in networks, and the possibility of using a bidding procedure to develop biogas production capacities. An impact study and the recommendations of the Council of State are attached in appendix

  10. Building Numbers from Primes

    Science.gov (United States)

    Burkhart, Jerry

    2009-01-01

    Prime numbers are often described as the "building blocks" of natural numbers. This article shows how the author and his students took this idea literally by using prime factorizations to build numbers with blocks. In this activity, students explore many concepts of number theory, including the relationship between greatest common factors and…

  11. Introduction to number theory

    CERN Document Server

    Vazzana, Anthony; Garth, David

    2007-01-01

    One of the oldest branches of mathematics, number theory is a vast field devoted to studying the properties of whole numbers. Offering a flexible format for a one- or two-semester course, Introduction to Number Theory uses worked examples, numerous exercises, and two popular software packages to describe a diverse array of number theory topics.

  12. Modeling the dynamics of evaluation: a multilevel neural network implementation of the iterative reprocessing model.

    Science.gov (United States)

    Ehret, Phillip J; Monroe, Brian M; Read, Stephen J

    2015-05-01

    We present a neural network implementation of central components of the iterative reprocessing (IR) model. The IR model argues that the evaluation of social stimuli (attitudes, stereotypes) is the result of the IR of stimuli in a hierarchy of neural systems: The evaluation of social stimuli develops and changes over processing. The network has a multilevel, bidirectional feedback evaluation system that integrates initial perceptual processing and later developing semantic processing. The network processes stimuli (e.g., an individual's appearance) over repeated iterations, with increasingly higher levels of semantic processing over time. As a result, the network's evaluations of stimuli evolve. We discuss the implications of the network for a number of different issues involved in attitudes and social evaluation. The success of the network supports the IR model framework and provides new insights into attitude theory. © 2014 by the Society for Personality and Social Psychology, Inc.

  13. Border detection in complex networks

    International Nuclear Information System (INIS)

    Travencolo, Bruno A N; Viana, Matheus Palhares; Costa, Luciano da Fontoura

    2009-01-01

    One important issue implied by the finite nature of real-world networks regards the identification of their more external (border) and internal nodes. The present work proposes a formal and objective definition of these properties, founded on the recently introduced concept of node diversity. It is shown that this feature does not exhibit any relevant correlation with several well-established complex networks measurements. A methodology for the identification of the borders of complex networks is described and illustrated with respect to theoretical (geographical and knitted networks) as well as real-world networks (urban and word association networks), yielding interesting results and insights in both cases.

  14. Computing preimages of Boolean networks.

    Science.gov (United States)

    Klotz, Johannes; Bossert, Martin; Schober, Steffen

    2013-01-01

    In this paper we present an algorithm based on the sum-product algorithm that finds elements in the preimage of a feed-forward Boolean networks given an output of the network. Our probabilistic method runs in linear time with respect to the number of nodes in the network. We evaluate our algorithm for randomly constructed Boolean networks and a regulatory network of Escherichia coli and found that it gives a valid solution in most cases.

  15. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  16. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  17. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  18. On the number of special numbers

    Indian Academy of Sciences (India)

    without loss of any generality to be the first k primes), then the equation a + b = c has .... This is an elementary exercise in partial summation (see [12]). Thus ... This is easily done by inserting a stronger form of the prime number theorem into the.

  19. Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Adnan, Md. Akhtaruzzaman; Razzaque, Mohammd Abdur; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2014-01-01

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted. PMID:24368702

  20. Bio-mimic optimization strategies in wireless sensor networks: a survey.

    Science.gov (United States)

    Adnan, Md Akhtaruzzaman; Abdur Razzaque, Mohammd; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2013-12-24

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.

  1. The EU network on trace element speciation in full swing

    DEFF Research Database (Denmark)

    Cornelis, R.; Camara, C.; Ebdon, L.

    2000-01-01

    health and hygiene. The network covers a number of important issues including organotin compounds, chromium and nickel species, chemical characterisation of environmental and industrial particulate samples, risk assessment, selenium and a series of other essential and toxic elements in food, as well......The EC-funded thematic network 'Speciation 21' links scientists in analytical chemistry working in method development for the chemical speciation of trace elements, and potential users from industry and representatives of legislative agencies, in the field of environment, food and occupational...

  2. Data mining techniques in sensor networks summarization, interpolation and surveillance

    CERN Document Server

    Appice, Annalisa; Fumarola, Fabio; Malerba, Donato

    2013-01-01

    Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates. As data analysis requests may concern both present and past data, the server is forced to store the entire stream. But the limited storage capacity of a server may reduce the amount of data stored on the disk. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data.

  3. Innovation in Multiple Networks and Networks of Networks: The Case of the Fruit Sector in Emilia‐Romagna

    Directory of Open Access Journals (Sweden)

    Davide Viaggi

    2013-02-01

    Full Text Available In the paper we examine the issue of food systems in which farms participate in multiple networks that, for their part, tend also to be members of networks of networks. The issue is addressed through a descriptive analysis of the fruit sector in Emilia‐Romagna (Italy. The farms in the area tend to join a different network for each product/product type. Innovation networks are embedded in commercialization or input provider networks, but separate (parallel networks also exist, particularly for basic research activities. Networks of networks are largely a product of the cooperative system. The paper concludes by emphasising the need for further research in multiple networking strategies and the connection betweencommercialisation networks and innovation.

  4. The Power of Numbers in Global Governance

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Mühlen-Schulte, Arthur

    2012-01-01

    of the historical and contemporary role of numbers in different governance settings. It includes a discussion of the capacity of numbers to foster social identities, relations and truths across national boundaries, to construct issue areas and to enable various modes of surveillance, communication and action...... and relations, as well as in relation to processes of politicisation and de-politicisation that transcend national spaces....

  5. On the Concept Image of Complex Numbers

    Science.gov (United States)

    Nordlander, Maria Cortas; Nordlander, Edvard

    2012-01-01

    A study of how Swedish students understand the concept of complex numbers was performed. A questionnaire was issued reflecting the student view of own perception. Obtained answers show a variety of concept images describing how students adopt the concept of complex numbers. These concept images are classified into four categories in order to…

  6. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated. Additionally...... with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with elevation......Aim Interacting communities of species are organized into complex networks, and network analysis is reckoned to be a strong tool for describing their architecture. Many species assemblies show strong macroecological patterns, e.g. increasing species richness with decreasing latitude, but whether...

  7. Congestion control and routing over satellite networks

    Science.gov (United States)

    Cao, Jinhua

    Satellite networks and transmissions find their application in fields of computer communications, telephone communications, television broadcasting, transportation, space situational awareness systems and so on. This thesis mainly focuses on two networking issues affecting satellite networking: network congestion control and network routing optimization. Congestion, which leads to long queueing delays, packet losses or both, is a networking problem that has drawn the attention of many researchers. The goal of congestion control mechanisms is to ensure high bandwidth utilization while avoiding network congestion by regulating the rate at which traffic sources inject packets into a network. In this thesis, we propose a stable congestion controller using data-driven, safe switching control theory to improve the dynamic performance of satellite Transmission Control Protocol/Active Queue Management (TCP/AQM) networks. First, the stable region of the Proportional-Integral (PI) parameters for a nominal model is explored. Then, a PI controller, whose parameters are adaptively tuned by switching among members of a given candidate set, using observed plant data, is presented and compared with some classical AQM policy examples, such as Random Early Detection (RED) and fixed PI control. A new cost detectable switching law with an interval cost function switching algorithm, which improves the performance and also saves the computational cost, is developed and compared with a law commonly used in the switching control literature. Finite-gain stability of the system is proved. A fuzzy logic PI controller is incorporated as a special candidate to achieve good performance at all nominal points with the available set of candidate controllers. Simulations are presented to validate the theory. An effocient routing algorithm plays a key role in optimizing network resources. In this thesis, we briefly analyze Low Earth Orbit (LEO) satellite networks, review the Cross Entropy (CE

  8. Security And Privacy Issues in Health Monitoring Systems: eCare@Home Case Study

    DEFF Research Database (Denmark)

    Wearing, Thomas; Dragoni, Nicola

    2016-01-01

    Automated systems for monitoring elderly people in their home are becoming more and more common. Indeed, an increasing number of home sensor networks for healthcare can be found in the recent literature, indicating a clear research direction in smart homes for health-care. Although the huge amount...... of sensitive data these systems deal with and expose to the external world, security and privacy issues are surpris-ingly not taken into consideration. The aim of this paper is to raise some key security and privacy issues that home health monitor systems should face with. The analysis is based on a real world...... monitoring sensor network for healthcare built in the context of the eCare@Home project....

  9. p-adic numbers

    OpenAIRE

    Grešak, Rozalija

    2015-01-01

    The field of real numbers is usually constructed using Dedekind cuts. In these thesis we focus on the construction of the field of real numbers using metric completion of rational numbers using Cauchy sequences. In a similar manner we construct the field of p-adic numbers, describe some of their basic and topological properties. We follow by a construction of complex p-adic numbers and we compare them with the ordinary complex numbers. We conclude the thesis by giving a motivation for the int...

  10. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  11. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-03-22

    Mar 22, 2018 ... Keywords: artificial neural network; fault types classification; distribution ... However, this paper only applicable on the transmission line. ... the program. ... After that, the data set was declared in neural network tool in MATLAB.

  12. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2017-11-24

    Nov 24, 2017 ... Journal of Fundamental and Applied Sciences is licensed under a Creative ... In today's business operations, reliable network connectivity is a must in order to ..... Top-down network design, 3rd ed., Cisco Press, Indianapolis,.

  13. Research Article Special Issue

    African Journals Online (AJOL)

    2017-09-15

    Sep 15, 2017 ... things which are connected using the wireless and wired networks of the Internet network ... achievable by reducing energy loss, fuel consumption and ... transmission and reduce greenhouse gas emissions by facilitation of its ...

  14. Research Article Special Issue

    African Journals Online (AJOL)

    2017-09-10

    Sep 10, 2017 ... IP USING SIP SERVER: WIDE AREA NETWORK PERFORMA. ANALYSIS ... by using network performance monitoring tool available thes ... for VoIP traffic is far less than its maximal 11Mbps data rate it currently supports [4].

  15. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  16. On the number of special numbers

    Indian Academy of Sciences (India)

    We now apply the theory of the Thue equation to obtain an effective bound on m. Indeed, by Lemma 3.2, we can write m2 = ba3 and m2 − 4 = cd3 with b, c cubefree. By the above, both b, c are bounded since they are cubefree and all their prime factors are less than e63727. Now we have a finite number of. Thue equations:.

  17. A mathematical programming approach for sequential clustering of dynamic networks

    Science.gov (United States)

    Silva, Jonathan C.; Bennett, Laura; Papageorgiou, Lazaros G.; Tsoka, Sophia

    2016-02-01

    A common analysis performed on dynamic networks is community structure detection, a challenging problem that aims to track the temporal evolution of network modules. An emerging area in this field is evolutionary clustering, where the community structure of a network snapshot is identified by taking into account both its current state as well as previous time points. Based on this concept, we have developed a mixed integer non-linear programming (MINLP) model, SeqMod, that sequentially clusters each snapshot of a dynamic network. The modularity metric is used to determine the quality of community structure of the current snapshot and the historical cost is accounted for by optimising the number of node pairs co-clustered at the previous time point that remain so in the current snapshot partition. Our method is tested on social networks of interactions among high school students, college students and members of the Brazilian Congress. We show that, for an adequate parameter setting, our algorithm detects the classes that these students belong more accurately than partitioning each time step individually or by partitioning the aggregated snapshots. Our method also detects drastic discontinuities in interaction patterns across network snapshots. Finally, we present comparative results with similar community detection methods for time-dependent networks from the literature. Overall, we illustrate the applicability of mathematical programming as a flexible, adaptable and systematic approach for these community detection problems. Contribution to the Topical Issue "Temporal Network Theory and Applications", edited by Petter Holme.

  18. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  19. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  20. Persistent homology of complex networks

    International Nuclear Information System (INIS)

    Horak, Danijela; Maletić, Slobodan; Rajković, Milan

    2009-01-01

    Long-lived topological features are distinguished from short-lived ones (considered as topological noise) in simplicial complexes constructed from complex networks. A new topological invariant, persistent homology, is determined and presented as a parameterized version of a Betti number. Complex networks with distinct degree distributions exhibit distinct persistent topological features. Persistent topological attributes, shown to be related to the robust quality of networks, also reflect the deficiency in certain connectivity properties of networks. Random networks, networks with exponential connectivity distribution and scale-free networks were considered for homological persistency analysis

  1. Power quality issues current harmonics

    CERN Document Server

    Mikkili, Suresh

    2015-01-01

    Power Quality Issues: Current Harmonics provides solutions for the mitigation of power quality problems related to harmonics. Focusing on active power filters (APFs) due to their excellent harmonic and reactive power compensation in two-wire (single phase), three-wire (three-phase without neutral), and four-wire (three-phase with neutral) AC power networks with nonlinear loads, the text:Introduces the APF technology, describing various APF configurations and offering guidelines for the selection of APFs for specific application considerationsCompares shunt active filter (SHAF) control strategi

  2. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  3. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  4. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Jimenez, Tamara

    2013-01-01

    The use of cognition is a promising element for the control of heterogeneous optical networks. Not only are cognitive networks able to sense current network conditions and act according to them, but they also take into account the knowledge acquired through past experiences; that is, they include...... learning with the aim of improving performance. In this paper, we review the fundamentals of cognitive networks and focus on their application to the optical networking area. In particular, a number of cognitive network architectures proposed so far, as well as their associated supporting technologies......, are reviewed. Moreover, several applications, mainly developed in the framework of the EU FP7 Cognitive Heterogeneous Reconfigurable Optical Network (CHRON) project, are also described....

  5. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  6. Number projection method

    International Nuclear Information System (INIS)

    Kaneko, K.

    1987-01-01

    A relationship between the number projection and the shell model methods is investigated in the case of a single-j shell. We can find a one-to-one correspondence between the number projected and the shell model states

  7. Numbers and brains.

    Science.gov (United States)

    Gallistel, C R

    2017-12-01

    The representation of discrete and continuous quantities appears to be ancient and pervasive in animal brains. Because numbers are the natural carriers of these representations, we may discover that in brains, it's numbers all the way down.

  8. Delay tolerant networks

    CERN Document Server

    Gao, Longxiang; Luan, Tom H

    2015-01-01

    This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

  9. Trading volume and the number of trades

    OpenAIRE

    Marwan Izzeldin

    2007-01-01

    Trading volume and the number of trades are both used as proxies for market activity, with disagreement as to which is the better proxy for market activity. This paper investigates this issue using high frequency data for Cisco and Intel in 1997. A number of econometric methods are used, including GARCH augmented with lagged trading volume and number of trades, tests based on moment restrictions, regression analysis of volatility on volume and trades, normality of returns when standardized by...

  10. Number in Dinka

    DEFF Research Database (Denmark)

    Andersen, Torben

    2014-01-01

    had a marked singular and an unmarked plural. Synchronically, however, the singular is arguably the basic member of the number category as revealed by the use of the two numbers. In addition, some nouns have a collective form, which is grammatically singular. Number also plays a role...

  11. Safety-in-numbers

    DEFF Research Database (Denmark)

    Elvik, Rune; Bjørnskau, Torkel

    2017-01-01

    Highlights •26 studies of the safety-in-numbers effect are reviewed. •The existence of a safety-in-numbers effect is confirmed. •Results are consistent. •Causes of the safety-in-numbers effect are incompletely known....

  12. Discovery: Prime Numbers

    Science.gov (United States)

    de Mestre, Neville

    2008-01-01

    Prime numbers are important as the building blocks for the set of all natural numbers, because prime factorisation is an important and useful property of all natural numbers. Students can discover them by using the method known as the Sieve of Eratosthenes, named after the Greek geographer and astronomer who lived from c. 276-194 BC. Eratosthenes…

  13. Serial Network Flow Monitor

    Science.gov (United States)

    Robinson, Julie A.; Tate-Brown, Judy M.

    2009-01-01

    Using a commercial software CD and minimal up-mass, SNFM monitors the Payload local area network (LAN) to analyze and troubleshoot LAN data traffic. Validating LAN traffic models may allow for faster and more reliable computer networks to sustain systems and science on future space missions. Research Summary: This experiment studies the function of the computer network onboard the ISS. On-orbit packet statistics are captured and used to validate ground based medium rate data link models and enhance the way that the local area network (LAN) is monitored. This information will allow monitoring and improvement in the data transfer capabilities of on-orbit computer networks. The Serial Network Flow Monitor (SNFM) experiment attempts to characterize the network equivalent of traffic jams on board ISS. The SNFM team is able to specifically target historical problem areas including the SAMS (Space Acceleration Measurement System) communication issues, data transmissions from the ISS to the ground teams, and multiple users on the network at the same time. By looking at how various users interact with each other on the network, conflicts can be identified and work can begin on solutions. SNFM is comprised of a commercial off the shelf software package that monitors packet traffic through the payload Ethernet LANs (local area networks) on board ISS.

  14. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  15. Learning Networks Distributed Environment

    NARCIS (Netherlands)

    Martens, Harrie; Vogten, Hubert; Koper, Rob; Tattersall, Colin; Van Rosmalen, Peter; Sloep, Peter; Van Bruggen, Jan; Spoelstra, Howard

    2005-01-01

    Learning Networks Distributed Environment is a prototype of an architecture that allows the sharing and modification of learning materials through a number of transport protocols. The prototype implements a p2p protcol using JXTA.

  16. Characterizing Sleep Issues Using Twitter.

    Science.gov (United States)

    McIver, David J; Hawkins, Jared B; Chunara, Rumi; Chatterjee, Arnaub K; Bhandari, Aman; Fitzgerald, Timothy P; Jain, Sachin H; Brownstein, John S

    2015-06-08

    Sleep issues such as insomnia affect over 50 million Americans and can lead to serious health problems, including depression and obesity, and can increase risk of injury. Social media platforms such as Twitter offer exciting potential for their use in studying and identifying both diseases and social phenomenon. Our aim was to determine whether social media can be used as a method to conduct research focusing on sleep issues. Twitter posts were collected and curated to determine whether a user exhibited signs of sleep issues based on the presence of several keywords in tweets such as insomnia, "can't sleep", Ambien, and others. Users whose tweets contain any of the keywords were designated as having self-identified sleep issues (sleep group). Users who did not have self-identified sleep issues (non-sleep group) were selected from tweets that did not contain pre-defined words or phrases used as a proxy for sleep issues. User data such as number of tweets, friends, followers, and location were collected, as well as the time and date of tweets. Additionally, the sentiment of each tweet and average sentiment of each user were determined to investigate differences between non-sleep and sleep groups. It was found that sleep group users were significantly less active on Twitter (P=.04), had fewer friends (Pcost-effective, and customizable data to be gathered.

  17. Defense Horizons. Number 79, April 2015

    Science.gov (United States)

    2015-04-01

    law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB...79, April 2015 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...aggression. Even more issues emerged following the downing of Malaysian Airlines Flight 17 over Ukraine in July 2014, and cross-border ar- tillery renewed

  18. Talking probabilities: communicating probalistic information with words and numbers

    NARCIS (Netherlands)

    Renooij, S.; Witteman, C.L.M.

    1999-01-01

    The number of knowledge-based systems that build on Bayesian belief networks is increasing. The construction of such a network however requires a large number of probabilities in numerical form. This is often considered a major obstacle, one of the reasons being that experts are reluctant to provide

  19. Talking probabilities: communicating probabilistic information with words and numbers

    NARCIS (Netherlands)

    Renooij, S.; Witteman, C.L.M.

    1999-01-01

    The number of knowledge-based systems that build on Bayesian belief networks is increasing. The construction of such a network however requires a large number of probabilities in numerical form. This is often considered a major obstacle, one of the reasons being that experts are reluctant to

  20. Analysis and visualization of citation networks

    CERN Document Server

    Zhao, Dangzhi

    2015-01-01

    Citation analysis-the exploration of reference patterns in the scholarly and scientific literature-has long been applied in a number of social sciences to study research impact, knowledge flows, and knowledge networks. It has important information science applications as well, particularly in knowledge representation and in information retrieval.Recent years have seen a burgeoning interest in citation analysis to help address research, management, or information service issues such as university rankings, research evaluation, or knowledge domain visualization. This renewed and growing interest

  1. Virtual private network (VPN)

    International Nuclear Information System (INIS)

    Caskey, Susan

    2006-01-01

    A virtual private network (VPN) is the essential security feature that allows remote monitoring systems to take advantage of the low communications cost of the internet. This paper introduces the VPN concept and summarizes the networking and security principles. The mechanics of security, for example, types of encryption and protocols for exchange of keys between partners, are explained. Important issues for partners in different countries include the interoperability and mutual accreditations of systems. (author)

  2. Graph regularized nonnegative matrix factorization for temporal link prediction in dynamic networks

    Science.gov (United States)

    Ma, Xiaoke; Sun, Penggang; Wang, Yu

    2018-04-01

    Many networks derived from society and nature are temporal and incomplete. The temporal link prediction problem in networks is to predict links at time T + 1 based on a given temporal network from time 1 to T, which is essential to important applications. The current algorithms either predict the temporal links by collapsing the dynamic networks or collapsing features derived from each network, which are criticized for ignoring the connection among slices. to overcome the issue, we propose a novel graph regularized nonnegative matrix factorization algorithm (GrNMF) for the temporal link prediction problem without collapsing the dynamic networks. To obtain the feature for each network from 1 to t, GrNMF factorizes the matrix associated with networks by setting the rest networks as regularization, which provides a better way to characterize the topological information of temporal links. Then, the GrNMF algorithm collapses the feature matrices to predict temporal links. Compared with state-of-the-art methods, the proposed algorithm exhibits significantly improved accuracy by avoiding the collapse of temporal networks. Experimental results of a number of artificial and real temporal networks illustrate that the proposed method is not only more accurate but also more robust than state-of-the-art approaches.

  3. Network security: a survey of modern approaches

    International Nuclear Information System (INIS)

    Zafar, M.F.; Naheed, F.; Ahmad, Z.; Anwar, M.M.

    2008-01-01

    Security is an essential element of information technology (IT) infrastructure and applications. Concerns about security of networks and information systems have been growing along with the rapid increase in the number of network users and the value of their transactions. The hasty security threats have driven the development of security products known as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and protect the network, server and desktop infrastructure ahead of the threat. Authentication and signing techniques are used to prevent integrity threats. Users, devices, and applications should always be authenticated and authorized before they are allowed to access networking resources. Though a lot of information is available on the internet about IDS and IPS but it all is spread on so many sites and one has to spend a considerable part of his precious time to search it. In this regard a thorough survey has been conducted to facilitate and assist the researchers. The issues and defend challenges in fighting with cyber attacks have been discussed. A comparison of the categories of network security technologies has been presented. In this paper an effort has been made to gather the scattered information and present it at one place. This survey will provide best available up-to-date advancement in the area. A brief description of open source IPS has also been presented. (author)

  4. Asymptotic numbers: Pt.1

    International Nuclear Information System (INIS)

    Todorov, T.D.

    1980-01-01

    The set of asymptotic numbers A as a system of generalized numbers including the system of real numbers R, as well as infinitely small (infinitesimals) and infinitely large numbers, is introduced. The detailed algebraic properties of A, which are unusual as compared with the known algebraic structures, are studied. It is proved that the set of asymptotic numbers A cannot be isomorphically embedded as a subspace in any group, ring or field, but some particular subsets of asymptotic numbers are shown to be groups, rings, and fields. The algebraic operation, additive and multiplicative forms, and the algebraic properties are constructed in an appropriate way. It is shown that the asymptotic numbers give rise to a new type of generalized functions quite analogous to the distributions of Schwartz allowing, however, the operation multiplication. A possible application of these functions to quantum theory is discussed

  5. Applied number theory

    CERN Document Server

    Niederreiter, Harald

    2015-01-01

    This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interrelations between these areas.  Number theory, which Carl-Friedrich Gauss famously dubbed the queen of mathematics, has always been considered a very beautiful field of mathematics, producing lovely results and elegant proofs. While only very few real-life applications were known in the past, today number theory can be found in everyday life: in supermarket bar code scanners, in our cars’ GPS systems, in online banking, etc.  Starting with a brief introductory course on number theory in Chapter 1, which makes the book more accessible for undergraduates, the authors describe the four main application areas in Chapters...

  6. On Maximizing the Lifetime of Wireless Sensor Networks by Optimally Assigning Energy Supplies

    Science.gov (United States)

    Asorey-Cacheda, Rafael; García-Sánchez, Antonio Javier; García-Sánchez, Felipe; García-Haro, Joan; Gonzalez-Castaño, Francisco Javier

    2013-01-01

    The extension of the network lifetime of Wireless Sensor Networks (WSN) is an important issue that has not been appropriately solved yet. This paper addresses this concern and proposes some techniques to plan an arbitrary WSN. To this end, we suggest a hierarchical network architecture, similar to realistic scenarios, where nodes with renewable energy sources (denoted as primary nodes) carry out most message delivery tasks, and nodes equipped with conventional chemical batteries (denoted as secondary nodes) are those with less communication demands. The key design issue of this network architecture is the development of a new optimization framework to calculate the optimal assignment of renewable energy supplies (primary node assignment) to maximize network lifetime, obtaining the minimum number of energy supplies and their node assignment. We also conduct a second optimization step to additionally minimize the number of packet hops between the source and the sink. In this work, we present an algorithm that approaches the results of the optimization framework, but with much faster execution speed, which is a good alternative for large-scale WSN networks. Finally, the network model, the optimization process and the designed algorithm are further evaluated and validated by means of computer simulation under realistic conditions. The results obtained are discussed comparatively. PMID:23939582

  7. On Maximizing the Lifetime of Wireless Sensor Networks by Optimally Assigning Energy Supplies

    Directory of Open Access Journals (Sweden)

    Francisco Javier González-Castano

    2013-08-01

    Full Text Available The extension of the network lifetime of Wireless Sensor Networks (WSN is an important issue that has not been appropriately solved yet. This paper addresses this concern and proposes some techniques to plan an arbitrary WSN. To this end, we suggest a hierarchical network architecture, similar to realistic scenarios, where nodes with renewable energy sources (denoted as primary nodes carry out most message delivery tasks, and nodes equipped with conventional chemical batteries (denoted as secondary nodes are those with less communication demands. The key design issue of this network architecture is the development of a new optimization framework to calculate the optimal assignment of renewable energy supplies (primary node assignment to maximize network lifetime, obtaining the minimum number of energy supplies and their node assignment. We also conduct a second optimization step to additionally minimize the number of packet hops between the source and the sink. In this work, we present an algorithm that approaches the results of the optimization framework, but with much faster execution speed, which is a good alternative for large-scale WSN networks. Finally, the network model, the optimization process and the designed algorithm are further evaluated and validated by means of computer simulation under realistic conditions. The results obtained are discussed comparatively.

  8. Rapid Production Ramp-up for International Collaborative Supply Network in Electronics Goods Industry (X-Box, PS II, I-Pod, Etc) A Review of Existing Practices, Issues, and Challenges

    OpenAIRE

    Hu, Ning

    2006-01-01

    The fierce competition of international consumer electronics market has brought more pressures on the manufacturing section especially in the context of globalization. The global producers have to find effective solution to cope with the challenges such as shorter and shorter product life, less and less customer loyalty and resources limitation. The fact that rapid production ramp up and supply network collaboration could benefit their performance has been recognized by many business giants s...

  9. Microsoft Support Phone Number +1-877-353-1149(toll-free) Microsoft Helpline Phone Number

    OpenAIRE

    Allina willson

    2018-01-01

    Microsoft Helpline Phone Number Call Now: +1-877-353-1149 for Microsoft support and services. This is Trusted Microsoft Support number provide instant support.if you get any problem while using Microsoft office just relaxed because Microsoft support phone number +1-877-353-1149 is here to provide instant help of microsoft issues. Just dial our Microsoft support phone number +1-877-353-1149 and get instant online support.

  10. Evolving production network structures

    DEFF Research Database (Denmark)

    Grunow, Martin; Gunther, H.O.; Burdenik, H.

    2007-01-01

    When deciding about future production network configurations, the current structures have to be taken into account. Further, core issues such as the maturity of the products and the capacity requirements for test runs and ramp-ups must be incorporated. Our approach is based on optimization...... modelling and assigns products and capacity expansions to production sites under the above constraints. It also considers the production complexity at the individual sites and the flexibility of the network. Our implementation results for a large manufacturing network reveal substantial possible cost...

  11. Predicting Lotto Numbers

    DEFF Research Database (Denmark)

    Jørgensen, Claus Bjørn; Suetens, Sigrid; Tyran, Jean-Robert

    numbers based on recent drawings. While most players pick the same set of numbers week after week without regards of numbers drawn or anything else, we find that those who do change, act on average in the way predicted by the law of small numbers as formalized in recent behavioral theory. In particular......We investigate the “law of small numbers” using a unique panel data set on lotto gambling. Because we can track individual players over time, we can measure how they react to outcomes of recent lotto drawings. We can therefore test whether they behave as if they believe they can predict lotto......, on average they move away from numbers that have recently been drawn, as suggested by the “gambler’s fallacy”, and move toward numbers that are on streak, i.e. have been drawn several weeks in a row, consistent with the “hot hand fallacy”....

  12. Invitation to number theory

    CERN Document Server

    Ore, Oystein

    2017-01-01

    Number theory is the branch of mathematics concerned with the counting numbers, 1, 2, 3, … and their multiples and factors. Of particular importance are odd and even numbers, squares and cubes, and prime numbers. But in spite of their simplicity, you will meet a multitude of topics in this book: magic squares, cryptarithms, finding the day of the week for a given date, constructing regular polygons, pythagorean triples, and many more. In this revised edition, John Watkins and Robin Wilson have updated the text to bring it in line with contemporary developments. They have added new material on Fermat's Last Theorem, the role of computers in number theory, and the use of number theory in cryptography, and have made numerous minor changes in the presentation and layout of the text and the exercises.

  13. [Building epilepsy care network in Japan].

    Science.gov (United States)

    Otsuki, Taisuke

    2012-01-01

    Number of epilepsy patient in Japan officially surveyed by our government in 2008 is 219,000, which is only 0.17% of the total population and less than one third of the prevalence rate reported in Western countries. Number of epilepsy surgery per year in Japan is also low and less than half of other countries such as US, UK and Korea. These numbers may suggest that epilepsy care in Japan is not sufficient to cover all hidden medical needs of people with epilepsy at present. To solve this issue, our research group funded by the government have started to build an epilepsy care network among primary care physicians, secondary care neurology specialists and tertiary care epilepsy centers by utilizing a web site: Epilepsy Care Network-Japan (http://www.ecn-japan.com/) from July 2012. We are also proposing an epilepsy care algorithm suitable for our complex medical community consisted with various neurology specialists such as pediatric and adult neurologists, neurosurgeons and psychiatrists. Building Epilepsy Care Network in Japan may facilitate better medical and social support for people with epilepsy in Japan.

  14. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  15. China-U.S. Trade Issues

    National Research Council Canada - National Science Library

    Morrison, Wayne M

    2005-01-01

    .... With a huge population and a rapidly expanding economy, China is becoming a large market for U.S. exporters. Yet, U.S.-China commercial ties have been strained by a number of issues, including a surging...

  16. Research Article Special Issue

    African Journals Online (AJOL)

    2016-05-15

    May 15, 2016 ... Near-fault earthquake issue is almost a new issue in earthquake engineering. ... although those countries had advanced regulations for seismic design of ... allocating the plastic joints according to development guideline and ...

  17. Future accelerators: physics issues

    International Nuclear Information System (INIS)

    Bjorken, J.D.

    1977-11-01

    High energy physics of the future using future accelerators is discussed. The proposed machines and instruments, physics issues and opportunities including brief sketches of outstanding recent results, and the way the proposed machines address these issues are considered. 42 references

  18. Medical Issues: Orthopedics

    Science.gov (United States)

    ... Information Packets Equipment Pool Living With SMA Medical Issues Palliative Breathing Orthopedics Nutrition Equipment Daily Life At ... curesma.org > support & care > living with sma > medical issues > orthopedics Orthopedics In SMA, muscle weakness can cause ...

  19. Medical Issues: Equipment

    Science.gov (United States)

    ... Information Packets Equipment Pool Living With SMA Medical Issues Palliative Breathing Orthopedics Nutrition Equipment Daily Life At ... curesma.org > support & care > living with sma > medical issues > equipment Equipment Individuals with SMA often require a ...

  20. Health Issues and Treatments

    Science.gov (United States)

    ... About Us Information For… Media Policy Makers Health Issues & Treatments Language: English (US) Español (Spanish) Recommend on ... people with spina bifida are exactly alike. Health issues and treatments for people with spina bifida will ...